METHOD FOR ENCRYPTING INFORMATION AND DEVICE FOR REALIZATION OF THE METHOD
First Claim
Patent Images
1. A method for encrypting data comprising:
- (a) receiving plaintext corresponding to data to be encrypted;
(b) determining a number (n) of rounds of encryption to be performed on the data;
(c) repeating steps 1-3 below until n rounds of encryption are completed;
(1) damaging at least a portion of the data to create ciphertext comprising at least two components corresponding to the encrypted plaintext, wherein the at least two components include a core and a flag;
(2) generating a key for each damaging incident corresponding to the core and flag created in the current round of encryption;
(3) storing the key, core and flag from the current round of encryption in one or more data channels; and
(d) outputting ciphertext corresponding to the nth round of encryption, the outputted ciphertext including the one or more cores and one or more flags corresponding to each round of encryption, along with each key associated to the one or more cores and one or more flags, wherein each key, core and flag are required to decrypt the ciphertext.
1 Assignment
0 Petitions
Accused Products
Abstract
The cryptographic system and method for securing data from unauthorized access includes, in one embodiment, an iterative probabilistic cipher for converting plaintext into ciphertext comprising at least two components, a core and a flag. A corresponding key and the core and flag may be output in one or more data channels. For each round of encryption additional keys, cores and flags can be generated. Unless all keys, cores and flags are known, no recovery of the plaintext can be possible.
-
Citations
28 Claims
-
1. A method for encrypting data comprising:
-
(a) receiving plaintext corresponding to data to be encrypted;
(b) determining a number (n) of rounds of encryption to be performed on the data;
(c) repeating steps 1-3 below until n rounds of encryption are completed;
(1) damaging at least a portion of the data to create ciphertext comprising at least two components corresponding to the encrypted plaintext, wherein the at least two components include a core and a flag;
(2) generating a key for each damaging incident corresponding to the core and flag created in the current round of encryption;
(3) storing the key, core and flag from the current round of encryption in one or more data channels; and
(d) outputting ciphertext corresponding to the nth round of encryption, the outputted ciphertext including the one or more cores and one or more flags corresponding to each round of encryption, along with each key associated to the one or more cores and one or more flags, wherein each key, core and flag are required to decrypt the ciphertext. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17)
-
-
18. A method of encrypting data comprising:
-
(a) encoding data corresponding to plaintext according to at least one of a plurality of file characteristics;
(b) determining a number (n) of rounds of encryption to be performed on the encoded data based at least in part upon one of the plurality of file characteristics;
(c) determining a transformation characteristic based at least in part upon the number (n) of rounds of encryption;
(d) transforming the data according to the transformation characteristic;
(e) forming a core and a corresponding flag as a result of the current transformation of data;
(f) generating a tracking key corresponding to the core and flag;
(g) repeating steps (c)-(f) until n rounds of encryption are completed;
(h) outputting each tracking key along with the encrypted data having at least two parts, the first part including the flags from each round of encryption and the second part including the corresponding core, wherein each key, core and flag are required to decrypt the encrypted data. - View Dependent Claims (19, 20, 21, 22, 23)
-
-
24. A device for encrypting data, the device capable of performing one or more rounds of encryption, comprising:
-
an input unit for receiving plaintext corresponding to data to be encrypted;
a key database for computing a tracking key corresponding to the current round of encryption;
a transformation unit in communication with the input unit and key database for transforming data corresponding to the plaintext according to the tracking key computed during the current round of encryption, the transformed data having at least two parts, a core and a flag;
a core storage unit in communication with the transformation unit for accumulating cores corresponding to each round of encryption;
a flag storage unit in communication with the transformation unit for accumulating flags corresponding to each round of encryption; and
a decision making unit in communication with at least the core storage unit for determining whether additional rounds of encryption remain and for signaling the transformed data to return to the transformation unit for additional transformation should additional rounds of encryption remain; and
an output unit in communication with the core storage unit and flag storage unit for outputting ciphertext composed of each core and flag pair from each round of encryption and the tracking keys corresponding to each core and flag pair;
wherein each tracking key, core and flag is required to decrypt the ciphertext back into plaintext. - View Dependent Claims (25, 26, 27, 28)
-
Specification