Verifiable generation of weak symmetric keys for strong algorithms
First Claim
Patent Images
1. A method for producing a cryptographic key, comprising:
- a communication device generating a first key having a first apparent size and a first effective size that is less than a predetermined key size;
determining a fixed key;
choosing a fixed cryptographic algorithm;
using the fixed key and the chosen algorithm to project the first key onto a second larger key space to create a second key, wherein the second key has a second apparent size that is larger than the predetermined key size and the first effective size that is less than the predetermined key size; and
distributing the second key to at least one recipient communication device.
5 Assignments
0 Petitions
Accused Products
Abstract
The present invention provides a method, system, and device for producing cryptographic keys. More specifically, the cryptographic keys may be produced such that they have an effective key size and an apparent key size that differs from the effective key size. Generally, the effective key size is not restricted by export regulations and the apparent key size may be restricted by export regulations.
-
Citations
30 Claims
-
1. A method for producing a cryptographic key, comprising:
-
a communication device generating a first key having a first apparent size and a first effective size that is less than a predetermined key size; determining a fixed key; choosing a fixed cryptographic algorithm; using the fixed key and the chosen algorithm to project the first key onto a second larger key space to create a second key, wherein the second key has a second apparent size that is larger than the predetermined key size and the first effective size that is less than the predetermined key size; and distributing the second key to at least one recipient communication device. - View Dependent Claims (3, 4, 5, 6, 7, 8, 9, 10, 28, 30)
-
-
2. (canceled)
-
11. A device for producing a cryptographic key, comprising:
-
a computer readable medium comprising processor executable instructions, the instructions comprising; a key generator operable to produce at least a first key having a first apparent size and a first effective size; a key expansion member operable to expand the first key in order to form a second key by concatenating the first key with M-bits of zeros and/or ones in order to form the second key, wherein M is greater than or equal to one, and wherein the M-bits of zeros and/or ones are distributed within the first key according to a predetermined pattern, wherein the second key has a second apparent size and the first effective; and a key encryptor operable to utilize a fixed key and a cryptographic algorithm to scramble the second key. - View Dependent Claims (13, 14, 15, 16, 17, 18, 19, 29)
-
-
12. (canceled)
-
20. A method for producing a cryptographic key, comprising:
-
a communication device generating a first key having a first key strength and a first apparent size; expanding the first key to create a second key, wherein the second key has a second key strength and a second apparent size, the second key strength being at least the first key strength but less than the key strength based on the second apparent size of the second key, and wherein the second apparent size is larger than the first apparent size; determining a fixed key; scrambling the second key using the fixed key; and distributing the second key to at least one recipient communication device. - View Dependent Claims (22, 23, 24, 25, 26, 27)
-
-
21. (canceled)
Specification