Method And System For The Accelerated Decryption Of Cryptographically Protected User Data Units
1 Assignment
0 Petitions
Accused Products
Abstract
A method and system for accelerated decryption of a cryptographically protected user data unit, wherein a transmitter initially generates a cryptographic key that is provided with a related key identification. The transmitter then performs asymmetrical encryption of the generated cryptographic key using a public cryptographic key and encryption of at least one user data unit using the generated cryptographic key. The encrypted user data unit, the asymmetrically encrypted cryptographic key and the related key identification of the cryptographic key are transported to a receiver that decrypts the received asymmetrically encrypted key using a private key, if verification of the received related key identification of the cryptographic key indicates the cryptographic key is not present in a decrypted state in the receiver. The receiver then decrypts the received cryptographically encrypted user data unit using the cryptographic key in the receiver or with the cryptographic key decrypted using the private key.
35 Citations
33 Claims
-
1-15. -15. (canceled)
-
16. A method for accelerated decryption of cryptographically protected user data units, comprising:
-
(a) decrypting, by a receiver, a received asymmetrically encrypted key using a private key, if verification of a received related key identification of the cryptographic key shows that a cryptographic key is not yet present in a decrypted state in the receiver; and (b) decrypting a received cryptographically encrypted user data unit using the cryptographic key present in the receiver or using the cryptographic key decrypted using the private key, if it is determined that the cryptographic key is not present in the receiver. - View Dependent Claims (17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29)
-
-
30. A system for accelerated decryption of cryptographically protected user data units, comprising:
-
(a) a transmitter including; a first encryption unit configured to asymmetrically encrypt a cryptographic key using a public key; a second encryption unit configured to encrypt at least one user data unit using the cryptographic key; and an interface for making available the at least one encrypted user data unit, the asymmetrically encrypted key and a related key identification of the cryptographic key; (b) a transportation device configured to transport the encrypted user data unit, the asymmetrically encrypted key and the related key identification of the cryptographic key; and (c) a receiver comprising; a testing unit configured to verify, using the received key identification of the cryptographic key, whether the transported asymmetrically encrypted key is already present in an encrypted form in the receiver; a first decryption unit configured to decrypt the received asymmetrically encrypted key using a private key, if the verification of the related key identification of the cryptographic key shows that the received encrypted cryptographic key is not yet present in a decrypted form in the receiver; and a second decryption unit configured to decrypt the received cryptographically encrypted user data unit using one of the cryptographic key already present in the receiver in encrypted form or the cryptographic key decrypted by the first decryption unit.
-
-
31. A transmitter for a system for accelerated decryption of cryptographically protected user data units, comprising:
-
a first encryption unit configured to asymmetrically encrypt a cryptographic key using a public key; a second encryption unit configured to encrypt at least one user data unit using the cryptographic key; and an interface for making available the encrypted user data unit, the asymmetrically encrypted key and a related key identification of the cryptographic key.
-
-
32. A receiver for a system for accelerated decryption of cryptographically protected user data units, comprising:
-
a testing unit configured to verify, using a received related key identification of the cryptographic key, whether a received asymmetrically encrypted key is already present in an encrypted form in the receiver; a first decryption unit configured to decrypt the received asymmetrically encrypted key using a private key if verification of the received related key identification of the cryptographic key shows that the received encrypted cryptographic key is not yet present in a decrypted form; a second decryption unit configured to decrypt the received cryptographically encrypted user data unit using one of the cryptographic key already present in an encrypted form in the receiver or the cryptographic key decrypted by the first decryption unit.
-
-
33. A process in which a computer executes instructions set forth in a computer program executing in a processor which, when used on the computer causes the processor to accelerate decryption of cryptographically protected user data units, the computer program comprising:
-
(a) program code for decrypting, by a receiver, a received asymmetrically encrypted key using a private key, if verification of a received related key identification of the cryptographic key shows that a cryptographic key is not yet present in a decrypted state in the receiver; and (b) program code for decrypting a received cryptographically encrypted user data unit using the cryptographic key present in the receiver or using the cryptographic key decrypted using the private key, if it is determined that the cryptographic key is not present in the receiver.
-
Specification