Coercion resistant one-time-pad cryptosystem that facilitates transmission of messages having different levels of security
First Claim
1. In a one-time pad (OTP) cryptosystem for use with a sending computer system and a receiving computing system connected via a communications link, a method comprising the steps of:
- composing a high security message and a decoy message;
providing random bit strings and low security messages;
producing a set of OTP keys and cyphertexts from the high security message, the decoy message, the random bit strings and the low security messages, wherein the high security message and the decoy message are embedded in the set of OTP keys and cyphertexts, and wherein the high security message is distributed among a subset of the OTP keys and the cyphertexts; and
transmitting the OTP keys and the cyphertexts over the communications link to the receiver.
2 Assignments
0 Petitions
Accused Products
Abstract
A protocol is provided for transmitting low security messages and high security messages with one-time-pad cryptosystem. In one implementation of the present invention, low security messages are encrypted using random bit strings in accordance with a one-time-pad encryption scheme. A high security message and a decoy message are embedded within a set of encryption keys and cyphertexts that is to be transmitted from a sender to a receiver. The encryption keys are transmitted over a secure channel from the sender to the receiver, and the cyphertexts are transmitted over a publicly accessible channel from the sender to the receiver. The receiver uses the encryption keys and knowledge regarding keys for a high security message and a decoy message to decrypt the low security messages, extract the high security message and/or decoy message, and decrypt the high security message and/or decoy message. The provision of the decoy message is revealed when duress is applied to coerce the receiver into revealing the key for a supposedly high security message.
-
Citations
64 Claims
-
1. In a one-time pad (OTP) cryptosystem for use with a sending computer system and a receiving computing system connected via a communications link, a method comprising the steps of:
-
composing a high security message and a decoy message; providing random bit strings and low security messages; producing a set of OTP keys and cyphertexts from the high security message, the decoy message, the random bit strings and the low security messages, wherein the high security message and the decoy message are embedded in the set of OTP keys and cyphertexts, and wherein the high security message is distributed among a subset of the OTP keys and the cyphertexts; and transmitting the OTP keys and the cyphertexts over the communications link to the receiver. - View Dependent Claims (19)
-
-
2. In a one-time pad (OTP) cryptosystem for use with a sending computer system and a receiving computing system connected via a communications link, a method comprising the steps of:
-
composing a high security message and a decoy message; providing random bit strings and low security messages; producing a set of OTP keys and cyphertexts from the high security message, the decoy message, the random bit strings and the low security messages, wherein the high security message and the decoy message are embedded in the set of OTP keys and cyphertexts, and wherein the decoy message is distributed among a subset of the OTP keys and the cyphertexts; and transmitting the OTP keys and the cyphertexts over the communications link to the receiver. - View Dependent Claims (20)
-
-
3. In a computer system, a method comprising:
-
generating, using a plurality of keys, a plurality of cyphertexts for transmission to a receiver; embedding a message within the plurality of keys; and transmitting the plurality of keys to the receiver. - View Dependent Claims (4, 5, 6, 7, 17, 18)
-
-
8. In a computer system, a method comprising:
-
receiving a plurality of cyphertexts;
receiving a plurality of encryption keys within which is embedded at least one secure message;decrypting, using the plurality of encryption keys, a number of the plurality of cyphertexts to yield plaintext messages; and extracting the at least one secure message from the plurality of encryption keys. - View Dependent Claims (9, 10, 11, 12, 13, 14, 21)
-
-
15. In a one-time pad (OTP) cryptosystem for use with a sending computer system and a receiving computing system connected via a communications link, a computer-readable medium holding computer-executable instructions for performing, a method comprising the steps of:
-
composing a high security message and a decoy message; providing random bit strings and low security messages; producing a set of OTP keys and cyphertexts from the high security message, the decoy message, the random bit strings and the low security messages, wherein the high security message and the decoy message are embedded in the set of OTP keys and cyphertexts, wherein the high security message is distributed among a subset of the OTP keys and the cyphertexts; and transmitting the OTP keys and the cyphertexts over the communications link to the receiver. - View Dependent Claims (22)
-
-
16. In a one-time pad (OTP) cryptosystem for use with a sending computer system and a receiving computing system connected via a communications link, a computer-readable medium holding computer-executable instructions for performing, a method comprising the steps of:
-
composing a high security message and a decoy message; providing random bit strings and low security messages; producing a set of OTP keys and cyphertexts from the high security message, the decoy message, the random bit strings and the low security messages, wherein the high security message and the decoy message are embedded in the set of OTP keys and cyphertexts, wherein the decoy message is distributed among a subset of the OTP keys and the cyphertexts; and transmitting the OTP keys and the cyphertexts over the communications link to the receiver. - View Dependent Claims (23)
-
-
24. A method comprising:
-
generating a plurality of keys; generating, using the plurality of keys, a plurality of cyphertexts; and transmitting, as a set of keys, the plurality of keys and an encrypted high security message to a receiver. - View Dependent Claims (25, 26, 27)
-
-
28. In a system having a sender and a receiver, a method comprising:
-
generating a first key; generating a plurality of additional keys; generating, based at least in part on the plurality of additional keys, a plurality of cyphertexts for transmission from the sender to the receiver; determining, based at least in part on the first key, whether to embed a secure message within the plurality of additional keys or the plurality of cyphertexts; embedding the secure message within either the plurality of additional keys or the plurality of cyphertexts based on the determining; and transmitting the plurality of additional keys and the plurality of cyphertexts to the receiver. - View Dependent Claims (29, 30, 31, 32, 33, 34, 35, 36, 37, 38, 39, 40, 41, 42, 43, 44)
-
-
45. A computer system comprising:
-
a processor; a memory device, coupled to the processor, storing one or more programs that, when executed by the processor, cause the processor to; generate a first key; generate a plurality of additional keys; generate a plurality of cyphertexts for transmission from the computer system to a receiver; determine, based at least in part on the first key, whether to embed a high security message within the plurality of additional keys or the plurality of cyphertexts; embed the high security message within either the plurality of additional keys or the plurality of cyphertexts based on the determining; and transmit the plurality of additional keys and the plurality of cyphertexts to the receiver. - View Dependent Claims (46)
-
-
47. In a system having a sender and a receiver, a method comprising:
-
receiving a first key from the sender; receiving a plurality of additional keys from the sender; receiving a plurality of cyphertexts from the sender; determining, based at least in part on the first key, whether a secure message is embedded within the plurality of additional keys or the plurality of cyphertexts; and retrieving the secure message from either the plurality of additional keys or the plurality of cyphertexts based on the determining. - View Dependent Claims (48, 49, 50, 51, 52, 53, 54, 55, 56)
-
-
57. A system comprising:
-
a sending computer system to, generate a plurality of keys, generate a plurality of low security message cyphertexts based at least in part on both the plurality of keys and a plurality of low security messages, generate a cyphertext for a high security message based at least in part on the plurality of keys and the plurality of low security message cyphertexts, and generate a cyphertext for a decoy message based at least in part on the plurality of keys and the plurality of low security message cyphertexts; and a receiving computer system to, receive the plurality of keys, the plurality of low security message cyphertexts, the cyphertext for the high security message, and the cyphertext for the decoy message from the sending computer system, and decrypt the high security message from the cyphertext for the high security message. - View Dependent Claims (58, 59, 60)
-
-
61. One or more computer-readable storage media having stored thereon a computer program, the program comprising the following steps:
-
identifying a first key corresponding to a high security message; identifying a second key corresponding to a decoy message; generating a plurality of one-time pad (OTP) keys; generating a plurality of cyphertexts based at least in part on both the plurality of OTP keys and a plurality of low security messages; determining, using the first key, whether to embed the high security message in the plurality of OTP keys or the plurality of cyphertexts; determining, using the second key, whether to embed the decoy message in the plurality of OTP keys or the plurality of cyphertexts; encrypting the high security message using both the plurality of cyphertexts and the plurality of OTP keys; embedding the high security message in either the plurality of OTP keys or the plurality of cyphertexts; encrypting the decoy message using both the plurality of cyphertexts and the plurality of OTP keys; and embedding the decoy message in either the plurality of OTP keys or the plurality of cyphertexts. - View Dependent Claims (62, 63, 64)
-
Specification