Method and system for encrypting and decrypting a transport stream using multiple algorithms
First Claim
1. A method for encrypting a data stream, said method comprising:
- encrypting a first portion of said data stream with a first algorithm utilizing a first key to generate a first encrypted portion;
transmitting data indicating said first algorithm and said first key;
transmitting said first encrypted portion;
encrypting a second portion of said data stream with a second algorithm utilizing a second key to generate a second encrypted portion;
transmitting data indicating said second algorithm and said second key; and
transmitting said second encrypted portion.
4 Assignments
0 Petitions
Accused Products
Abstract
There is provided a method for encrypting a data stream using multiple algorithms. In one embodiment, a first portion of the data stream is encrypted with a first algorithm utilizing a first key to generate a first encrypted portion. The first algorithm can be, for example, a Triple Data Encryption Algorithm (TDEA). Data indicating the first algorithm and the first key is then transmitted. Then, the first encrypted portion of the data stream is transmitted. Thereafter, a second portion of the data stream is encrypted with a second algorithm utilizing a second key to generate a second encrypted portion. The second algorithm can be, for example, a Single Data Encryption Algorithm (SDEA). Next, data indicating the second algorithm and the second key is transmitted. Thereafter, the first encrypted portion of the data stream is transmitted.
-
Citations
20 Claims
-
1. A method for encrypting a data stream, said method comprising:
-
encrypting a first portion of said data stream with a first algorithm utilizing a first key to generate a first encrypted portion; transmitting data indicating said first algorithm and said first key; transmitting said first encrypted portion; encrypting a second portion of said data stream with a second algorithm utilizing a second key to generate a second encrypted portion; transmitting data indicating said second algorithm and said second key; and transmitting said second encrypted portion. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A method for decrypting an encrypted data stream, said method comprising:
-
receiving data indicating a first algorithm and a first key; receiving a first encrypted portion of said encrypted data stream; decrypting said first encrypted portion using said first algorithm and said first key; receiving data indicating a second algorithm and a second key; receiving a second encrypted portion of said encrypted data stream; decrypting said second encrypted portion using said second algorithm and said second key. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. An encryption device for encrypting a data stream, said device comprising:
-
a data stream receiver for receiving said data stream; a key generation module for generating first and second keys; an algorithm controller module comprising a first algorithm and a second algorithm; wherein said algorithm controller module is configured to encrypt a first portion of said data stream with said first algorithm utilizing said first key and to encrypt a second portion of said data stream with said second algorithm utilizing said second key. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification