Encryption Data Integrity Check With Dual Parallel Encryption Engines
First Claim
Patent Images
1. A method of encrypting data, comprising:
- encrypting a clear text using a first encryption engine to produce a first cipher text;
encrypting said clear text using a second encryption engine to produce a second cipher text; and
,comparing said first cipher text with said second cipher text.
1 Assignment
0 Petitions
Accused Products
Abstract
An encryption method encrypts a clear text twice using a first encryption engine to produce a first cipher text and a second encryption engine to produce a second cipher text. The method compares the first cipher text with the second cipher text, or compares a checksum of the first cipher text with a checksum of the second cipher text. If the comparison succeeds, the method transmits the data. In some embodiments, the method uses a first instance of an encryption key to produce the first cipher text and a second instance of the encryption key to produce the second cipher text.
-
Citations
19 Claims
-
1. A method of encrypting data, comprising:
-
encrypting a clear text using a first encryption engine to produce a first cipher text; encrypting said clear text using a second encryption engine to produce a second cipher text; and
,comparing said first cipher text with said second cipher text. - View Dependent Claims (2, 6, 7)
-
-
3. The method as claimed in 2, further comprising:
-
generating a first checksum on said clear text prior to said encrypting steps; and
,checking said first checksum after said decrypting step. - View Dependent Claims (4, 5)
-
-
8. A method of encrypting data, comprising:
-
using a first instance of an encryption key to encrypt a clear text using a first encryption engine to produce said first cipher text; using a second instance of said encryption key to encrypt said clear text using a second encryption engine to produce said second cipher text; comparing said first cipher text with said second cipher text; storing one of said cipher texts if said first cipher text matches said second cipher text. - View Dependent Claims (9, 13)
-
-
10. The method as claimed in 9, further comprising:
-
generating a first checksum on said clear text prior to said encrypting steps; and
,checking said first checksum after said decrypting step. - View Dependent Claims (11, 12)
-
-
14. An encryption method, which comprises:
-
encrypting a clear text using a first encryption engine to produce a first cipher text; encrypting said clear text using a second encryption engine to produce a second cipher text; comparing said first cipher text with said second cipher text; and
,transmitting one of said cipher texts if said first cipher text and said second cipher text match. - View Dependent Claims (15, 16, 17, 18, 19)
-
Specification