Encryption of data packets using a sequence of private keys generated from a public key exchange
First Claim
1. A private key generator, comprising:
- a first generator for generating a private key;
a second generator initialized with the private key for generating a first cipher stream;
a partitioner that partitions the first cipher stream into a plurality of secondary keys for use in generating corresponding second cipher streams to encrypt plaintext information into ciphertext information; and
an indexer for indexing the plurality of secondary keys, an index included with the ciphertext information identifying which of the indexed plurality of secondary keys was used in encrypting the plaintext information.
6 Assignments
0 Petitions
Accused Products
Abstract
A first cipher stream generated from a private key negotiated as a result of a public key exchange is partitioned to form a sequence of secondary keys. The secondary keys are then indexed. In one instance, each plaintext data packet is encrypted with a second cipher streams generated from a different one of the secondary keys. In another instance, a second cipher stream generated from a single secondary key is used to encrypt a plurality of plaintext data packets. A new second cipher stream generated from another one of the secondary keys is then used for encryption following each instance of the loss of a ciphertext data packet. The index is communicated with the ciphertext to identify which secondary key is to be used in generating the second cipher stream needed for decryption. With knowledge of the secondary key to be used, re-synchronization (along with new private key negotiation) at each instance of a ciphertext data packet loss is obviated.
-
Citations
20 Claims
-
1. A private key generator, comprising:
-
a first generator for generating a private key; a second generator initialized with the private key for generating a first cipher stream; a partitioner that partitions the first cipher stream into a plurality of secondary keys for use in generating corresponding second cipher streams to encrypt plaintext information into ciphertext information; and an indexer for indexing the plurality of secondary keys, an index included with the ciphertext information identifying which of the indexed plurality of secondary keys was used in encrypting the plaintext information. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A method for generating a private key, comprising the steps of:
-
generating a private key; generating a first cipher stream initialized from the generated private key; partitioning the first cipher stream into a plurality of secondary keys for use in generating corresponding second cipher streams to encrypt plaintext information into ciphertext information; and indexing the plurality of secondary keys, an index included with the ciphertext information identifying which of the indexed plurality of secondary keys was used in encrypting the plaintext information. - View Dependent Claims (7, 8, 9, 10)
-
-
11. An encryption device, comprising:
-
a first generator for generating a private key; a second generator initialized with the private key for generating a first cipher stream; a partitioner for partitioning the first cipher stream into a plurality of secondary keys; an indexer for indexing the plurality of secondary keys; means for encrypting plaintext information into ciphertext information using second cipher streams generated from the plurality of secondary keys; and means for including an index with the ciphertext information identifying which of the indexed plurality of secondary keys was used in encrypting the plaintext information. - View Dependent Claims (12, 13, 14, 15)
-
-
16. A method for encrypting, comprising the steps of:
-
generating a private key; generating a first cipher stream initialized from the generated private key; partitioning the first cipher stream into a plurality of secondary keys; indexing the plurality of secondary keys; encrypting plaintext information into ciphertext information using second cipher streams generated from the plurality of secondary keys; and including with the ciphertext information an index identifying which of the indexed plurality of secondary keys was used in encrypting the plaintext information. - View Dependent Claims (17, 18, 19, 20)
-
Specification