×

Apparatus and method for encrypting communications without exchanging an encryption key

  • US 5,455,862 A
  • Filed: 12/02/1993
  • Issued: 10/03/1995
  • Est. Priority Date: 12/02/1993
  • Status: Expired due to Term
First Claim
Patent Images

1. A method for establishing secure communications between a first station and a second station that are coupled together by an unsecure communication link, comprising the steps of:

  • (a) providing the first and the second stations with a plurality of seed keys that are common to both stations, but are not publicly known;

    (b) at the first station, randomly selecting a first pointer value, and at the second station, randomly selecting a second pointer value;

    (c) at each station, cyclically and repetitively encrypting a succession of values using one of the seed keys as an encryption key, each encrypted value determining a new value that is then encrypted, a first value of the succession of values that is initially thus encrypted being determined as a function of at least one of the plurality of seed keys, encryption of the succession of values occurring for a number of times determined as a function of the first pointer value at the first station, and as a function of the second pointer value at the second station, a last encrypted value thus determined at the first station corresponding to a first portion of a session data encryption key, and a last encrypted value thus determined at the second station corresponding to a second portion of the session data encryption key, said first and second portions of the session data encryption keys being temporarily stored at the respective stations;

    (d) using one of the seed keys as an encryption key, encrypting the first pointer at the first station and the second pointer at the second station, to produce a first encrypted header at the first station and a second encrypted header at the second station, respectively;

    (e) interchanging the first and the second encrypted headers between the first and the second stations;

    (f) using said one seed key, decrypting the first encrypted header at the second station and the second encrypted header at the first station to recover the first and second pointers, respectively;

    (g) repeating step (c), to determine the first portion of the session data encryption key as a function of the first pointer at the second station, and to determine the second portion of the session data encryption key as a function of the second pointer at the first station, respectively;

    (g) at each station, combining the first and second portions of the session data encryption key to determine a final session data encryption key; and

    (h) using the final session data encryption key at each station to encrypt and decrypt data exchanged between the two stations.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×