SECURE APPROACH TO SEND DATA FROM ONE SYSTEM TO ANOTHER
First Claim
1. A method for communicating messages, said method comprising:
- receiving in a first packaged message, by a receiver from a sender, an encrypted second message and a first digital signature, wherein the encrypted second message had been generated by said sender by encryption of a second message using a public key of the receiver, wherein the second message had been generated by said sender from an original message via performance of a first computational logic of said original message and a first random message to generate said second message, and wherein the first random message consists of a first random number, and wherein the first digital signature had been generated by the sender by via encryption of a first message digest using a private key of the sender;
decrypting, by the receiver, the encrypted second message received from the sender, using a private key of the receiver to generate the second message;
performing, by said receiver, a second computational logic of said decrypted encrypted second message and a second random message to generate a third message, wherein said second random message differs from said first random message, and wherein the second random message consists of a second random number;
encrypting, by the receiver, the third message using a public key of the sender to generate an encrypted third message;
generating, by the receiver, a second message digest by performing a one way encryption of the encrypted third message through use of a hashing algorithm;
encrypting, by the receiver, the second message digest to generate a second digital signature using the private key of the receiver to generate a digital signature;
sending in a second packaged message, by the receiver, the encrypted third message and the second digital signature to the sender, resulting in receipt of the encrypted third message and the second digital signature by the sender.
3 Assignments
0 Petitions
Accused Products
Abstract
A secure approach for sending a original message from a sender to a receiver. The sender may encrypt the original message by performing an XOR (or XNOR) operation of the original message and a first random message (same size as original message) on a bit by basis to generate a second message. The receiver may also perform an XOR of the second message with a locally generated second random message. The resulting message is sent to the sender system. The sender system may again perform XOR operation of the received message and the first random message, and send the resulting message to receiver. The receiver may perform XOR operation on the received output to generate the original message sent by the sender. Other technologies such as digital signatures and key pairs (public key infrastructure) may be used in each communication between the sender and receiver to further enhance security.
-
Citations
20 Claims
-
1. A method for communicating messages, said method comprising:
-
receiving in a first packaged message, by a receiver from a sender, an encrypted second message and a first digital signature, wherein the encrypted second message had been generated by said sender by encryption of a second message using a public key of the receiver, wherein the second message had been generated by said sender from an original message via performance of a first computational logic of said original message and a first random message to generate said second message, and wherein the first random message consists of a first random number, and wherein the first digital signature had been generated by the sender by via encryption of a first message digest using a private key of the sender; decrypting, by the receiver, the encrypted second message received from the sender, using a private key of the receiver to generate the second message; performing, by said receiver, a second computational logic of said decrypted encrypted second message and a second random message to generate a third message, wherein said second random message differs from said first random message, and wherein the second random message consists of a second random number; encrypting, by the receiver, the third message using a public key of the sender to generate an encrypted third message; generating, by the receiver, a second message digest by performing a one way encryption of the encrypted third message through use of a hashing algorithm; encrypting, by the receiver, the second message digest to generate a second digital signature using the private key of the receiver to generate a digital signature; sending in a second packaged message, by the receiver, the encrypted third message and the second digital signature to the sender, resulting in receipt of the encrypted third message and the second digital signature by the sender. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A computer program product for use with a digital system, said computer program product comprising a computer usable medium having computer readable program code embodied therein, said computer readable program code containing instructions that when executed by a processor of said digital system implement a method for communicating messages, said method comprising:
-
receiving in a first packaged message, by a receiver from a sender, an encrypted second message and a first digital signature, wherein the encrypted second message had been generated by said sender by encryption of a second message using a public key of the receiver, wherein the second message had been generated by said sender from an original message via performance of a first computational logic of said original message and a first random message to generate said second message, and wherein the first random message consists of a first random number, and wherein the first digital signature had been generated by the sender by via encryption of a first message digest using a private key of the sender; decrypting, by the receiver, the encrypted second message received from the sender, using a private key of the receiver to generate the second message; performing, by said receiver, a second computational logic of said decrypted encrypted second message and a second random message to generate a third message, wherein said second random message differs from said first random message, and wherein the second random message consists of a second random number; encrypting, by the receiver, the third message using a public key of the sender to generate an encrypted third message; generating, by the receiver, a second message digest by performing a one way encryption of the encrypted third message through use of a hashing algorithm; encrypting, by the receiver, the second message digest to generate a second digital signature using the private key of the receiver to generate a digital signature; sending in a second packaged message, by the receiver, the encrypted third message and the second digital signature to the sender, resulting in receipt of the encrypted third message and the second digital signature by the sender. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. A digital system comprising a processor and a computer readable memory unit coupled to the processor, said memory unit containing program code configured to be executed by the processor to implement a method for communicating messages, said method comprising:
-
receiving in a first packaged message, by a receiver from a sender, an encrypted second message and a first digital signature, wherein the encrypted second message had been generated by said sender by encryption of a second message using a public key of the receiver, wherein the second message had been generated by said sender from an original message via performance of a first computational logic of said original message and a first random message to generate said second message, and wherein the first random message consists of a first random number, and wherein the first digital signature had been generated by the sender by via encryption of a first message digest using a private key of the sender; decrypting, by the receiver, the encrypted second message received from the sender, using a private key of the receiver to generate the second message; performing, by said receiver, a second computational logic of said decrypted encrypted second message and a second random message to generate a third message, wherein said second random message differs from said first random message, and wherein the second random message consists of a second random number; encrypting, by the receiver, the third message using a public key of the sender to generate an encrypted third message; generating, by the receiver, a second message digest by performing a one way encryption of the encrypted third message through use of a hashing algorithm; encrypting, by the receiver, the second message digest to generate a second digital signature using the private key of the receiver to generate a digital signature; sending in a second packaged message, by the receiver, the encrypted third message and the second digital signature to the sender, resulting in receipt of the encrypted third message and the second digital signature by the sender. - View Dependent Claims (20)
-
Specification