WIDELY DISTRIBUTED PARAMETERIZATION
First Claim
1. A method of encrypting comprising:
- querying a computing environment to discover a set of widely dispersed parameters;
transforming the widely dispersed parameter set into a cryptographic key;
using the cryptographic key to encrypt a message; and
communicating the encrypted message and sufficient information to enable a further end point to derive the same or an associated cryptographic key to decrypt the message without communicating or revealing the cryptographic key.
1 Assignment
0 Petitions
Accused Products
Abstract
This technology mitigates the vulnerabilities of parameter storage by calculating parameters dynamically rather than storing and using static parameters. This example non-limiting technology derives parameters “on-demand” from a subset of widely distributed parameters determined by a random string generated for each encrypted session. The subset of widely distributed parameters will be different each time a new subset is generated as the individual parameters are randomly selected. Thus the individual encrypted message (or document) will be encrypted differently using a different set of parameters each time. Some of these parameters bind the encrypted message to a specific user account and user device making the resulting encrypted message highly secure.
4 Citations
12 Claims
-
1. A method of encrypting comprising:
-
querying a computing environment to discover a set of widely dispersed parameters; transforming the widely dispersed parameter set into a cryptographic key; using the cryptographic key to encrypt a message; and communicating the encrypted message and sufficient information to enable a further end point to derive the same or an associated cryptographic key to decrypt the message without communicating or revealing the cryptographic key. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A method of decrypting comprising:
-
receiving a secure, encrypted message; detecting a random string, at least one identifier, a passphrase hash and ciphertext; using the passphrase hash to generate a parameter set comprising widely dispersed parameters; using the parameter set to derive a cryptographic key; and applying the cryptographic key to decrypt the ciphertext.
-
-
12. A system for exchanging secure messages comprising:
-
an encryptor; a decryptor; a widely dispersed parameter data structure containing parameters that are derived from a user-specific computing environment; a key deriver that derives at least one cryptographic key from the parameter set; and a controller that controls the encryptor and/or decryptor transform between plaintext and ciphertext using the derived cryptographic key.
-
Specification