METHOD FOR SECURE COMMUNICATION USING ASYMMETRIC & SYMMETRIC ENCRYPTION OVER INSECURE COMMUNICATIONS
First Claim
Patent Images
1. A method of encrypting a set of data with a first computing device, the method comprising:
- a) generating a symmetric key;
b) encrypting the set of data with the symmetric key, thereby converting the set of data into a set of symmetrically encrypted data; and
c) encrypting the symmetric key and a portion of the symmetrically encrypted data with a public key of an asymmetric key pair, thereby converting the symmetric key into an asymmetrically encrypted symmetric key, thereby converting the portion of the symmetrically encrypted data into a portion of doubly encrypted data, and thereby generating a total set of encrypted data, the total set of encrypted data comprising the asymmetrically encrypted symmetric key, the portion of doubly encrypted data, and a remainder of symmetrically encrypted data.
2 Assignments
0 Petitions
Accused Products
Abstract
Data may be protected using a combination of symmetric and asymmetric cryptography. A symmetric key may be generated and the data may be encrypted with the symmetric key. The symmetric key and a only a portion of the symmetrically encrypted data may then be encrypted with an asymmetric public key. The entire set of encrypted data, including the asymmetrically encrypted symmetric key, the doubly encrypted portion of data, and the remainder of the symmetrically encrypted data may then be sent to a remote device using insecure communications.
40 Citations
18 Claims
-
1. A method of encrypting a set of data with a first computing device, the method comprising:
-
a) generating a symmetric key; b) encrypting the set of data with the symmetric key, thereby converting the set of data into a set of symmetrically encrypted data; and c) encrypting the symmetric key and a portion of the symmetrically encrypted data with a public key of an asymmetric key pair, thereby converting the symmetric key into an asymmetrically encrypted symmetric key, thereby converting the portion of the symmetrically encrypted data into a portion of doubly encrypted data, and thereby generating a total set of encrypted data, the total set of encrypted data comprising the asymmetrically encrypted symmetric key, the portion of doubly encrypted data, and a remainder of symmetrically encrypted data. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A system comprising:
-
a processor, a memory, instructions embodied in the memory and executable by the processor to perform a method of encrypting a set of data, the method comprising; a) generating a symmetric key; b) encrypting the set of data with the symmetric key, thereby converting the set of data into a set of symmetrically encrypted data; and c) encrypting the symmetric key and a portion of the symmetrically encrypted data with a public key of an asymmetric key pair, thereby converting the symmetric key into an asymmetrically encrypted symmetric key, thereby converting the portion of the symmetrically encrypted data into a portion of doubly encrypted data, and thereby generating a total set of encrypted data, the total set of encrypted data comprising the asymmetrically encrypted symmetric key, the portion of doubly encrypted data, and a remainder of symmetrically encrypted data. - View Dependent Claims (11, 12)
-
-
13. A non-transitory computer readable medium having processor-executable instructions embodied therein, wherein execution of the instructions by a processor causes the processor to perform a method of encrypting a set of data, the method comprising:
-
a) generating a symmetric key; b) encrypting the set of data with the symmetric key, thereby converting the set of data into a set of symmetrically encrypted data; and c) encrypting the symmetric key and a portion of the symmetrically encrypted data with a public key of an asymmetric key pair, thereby converting the symmetric key into an asymmetrically encrypted symmetric key, thereby converting the portion of the symmetrically encrypted data into a portion of doubly encrypted data, and thereby generating a total set of encrypted data, the total set of encrypted data comprising the asymmetrically encrypted symmetric key, the portion of doubly encrypted data, and a remainder of symmetrically encrypted data.
-
-
14. A method of decrypting a total set of encrypted data with a second computing device, the total set of encrypted data comprising an asymmetrically encrypted symmetric key, a portion of doubly encrypted data, and a remainder of symmetrically encrypted data, the method comprising:
-
e) decrypting the asymmetrically encrypted symmetric key and the portion of doubly encrypted data with a private key of an asymmetric key pair, thereby converting the asymmetrically encrypted symmetric key into a decrypted symmetric key, thereby converting the portion of doubly encrypted data into a partially decrypted symmetrically encrypted portion of data; and f) decrypting the partially decrypted symmetrically encrypted portion of data and the remainder of symmetrically encrypted data with the symmetric key. - View Dependent Claims (15, 16)
-
-
17. A system comprising:
-
a processor, a memory, instructions embodied in the memory and executable by the processor to perform a method of decrypting a total set of encrypted data, the total set of encrypted data comprising an asymmetrically encrypted symmetric key, a portion of doubly encrypted data, and a remainder of symmetrically encrypted data, the method comprising; e) decrypting the asymmetrically encrypted symmetric key and the portion of doubly encrypted data with a private key of an asymmetric key pair, thereby converting the asymmetrically encrypted symmetric key into a decrypted symmetric key, thereby converting the portion of doubly encrypted data into a partially decrypted symmetrically encrypted portion of data; and f) decrypting the partially decrypted symmetrically encrypted portion of data and the remainder of symmetrically encrypted data with the symmetric key.
-
-
18. A non-transitory computer readable medium having processor-executable instructions embodied therein, wherein execution of the instructions by a processor causes the processor to perform a method of decrypting a total set of encrypted data, the total set of encrypted data comprising an asymmetrically encrypted symmetric key, a portion of doubly encrypted data, and a remainder of symmetrically encrypted data, the method comprising:
-
e) decrypting the asymmetrically encrypted symmetric key and the portion of doubly encrypted data with a private key of an asymmetric key pair, thereby converting the asymmetrically encrypted symmetric key into a decrypted symmetric key, thereby converting the portion of doubly encrypted data into a partially decrypted symmetrically encrypted portion of data; and f) decrypting the partially decrypted symmetrically encrypted portion of data and the remainder of symmetrically encrypted data with the symmetric key.
-
Specification