ENCRYPTION ALGORITHM WITH RANDOMIZED BUFFER
First Claim
Patent Images
1. A method, comprising:
- obtaining a first item of plaintext and an encryption key;
encrypting the first item of plaintext using an encryption algorithm and the encryption key to produce first ciphertext;
obtaining a second item of plaintext, wherein the second item of plaintext is identical to the first item of plaintext; and
encrypting the second item of plaintext using the encryption algorithm and the encryption key to produce second ciphertext, where the second ciphertext is different than the first ciphertext.
3 Assignments
0 Petitions
Accused Products
Abstract
A system obtains a key and first and second plaintext, where the first plaintext is identical to the second plaintext. The system uses the key to encrypt the first plaintext to a first ciphertext and the second plaintext to a second ciphertext using a same encryption algorithm, where the first ciphertext is different than the second ciphertext.
24 Citations
20 Claims
-
1. A method, comprising:
-
obtaining a first item of plaintext and an encryption key; encrypting the first item of plaintext using an encryption algorithm and the encryption key to produce first ciphertext; obtaining a second item of plaintext, wherein the second item of plaintext is identical to the first item of plaintext; and encrypting the second item of plaintext using the encryption algorithm and the encryption key to produce second ciphertext, where the second ciphertext is different than the first ciphertext. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A system, comprising:
-
a first data buffer configured to store first and second plaintext, where the first plaintext is identical to the second plaintext; and an encryption module configured to use a key to encrypt the first plaintext to a first ciphertext and the second plaintext to a second ciphertext using a same encryption algorithm, wherein the first ciphertext is different than the second ciphertext. - View Dependent Claims (10, 11, 12, 13, 14, 15)
-
-
16. A method, comprising:
-
obtaining plaintext and an encryption key; obtaining randomized data; appending the randomized data to the plaintext; and encrypting the randomized data together with the plaintext using the encryption key to produce ciphertext. - View Dependent Claims (17, 18, 19)
-
-
20. A method, comprising:
-
obtaining plaintext and an encryption key; segmenting the plaintext into multiple data portions; altering the encryption key to obtain a different key value for each portion of the multiple portions of plaintext; determining a different cipher value for each portion of the multiple portions of plaintext based on the different key value; and generating ciphertext for the plaintext based on the different cipher value for each portion of the plaintext.
-
Specification