Method and system for secure key exchange
First Claim
1. A method for secure transmission of a data message between a sender and a receiver, the method comprising:
- locking, at the sender, the data message using a first lock;
prior to locking the data message at the sender, encoding the data message, said encoding including partitioning the data message into partition blocks and encoding each partition block by performing one or more operations selected from the set comprising;
rearranging data within the block when the partition block matches a first predefined data pattern, expanding the partition block by adding one or more predefined data values when the partition block matches a second predefined data pattern, and expanding the partition by adding a data value obtained by performing a mathematical linear operation on one or more data values within the partition block;
transmitting the locked data message to the receiver;
double-locking, at the receiver, the locked data message using a second lock;
transmitting the double-locked data message back to the sender;
unlocking, at the sender, the first lock of the double-locked data message using a first key, leaving the data message single-locked by the second lock;
transmitting the single-locked data message back to the receiver; and
unlocking, at the receiver, the second lock of the single-locked data message using a second key to generate the data message;
wherein the locking and unlocking at the sender comprise mathematical linear computations.
2 Assignments
0 Petitions
Accused Products
Abstract
A method for secure transmission of a data message locks, at the sender, the data message using a first lock. The locked data message is transmitted to the receiver. Next, the locked data message is double-locked, at the receiver, using a second lock. Then, this double-locked data message is transmitted back to the sender. The first lock of the double-locked data message is then unlocked, at the sender, using a first key, leaving the data message single-locked by the second lock. The single-locked data message is transmitted back to the receiver, where the second lock of the single-locked data message is unlocked, using a second key, to generate the data message, completing the secure transmission.
48 Citations
43 Claims
-
1. A method for secure transmission of a data message between a sender and a receiver, the method comprising:
-
locking, at the sender, the data message using a first lock;
prior to locking the data message at the sender, encoding the data message, said encoding including partitioning the data message into partition blocks and encoding each partition block by performing one or more operations selected from the set comprising;
rearranging data within the block when the partition block matches a first predefined data pattern, expanding the partition block by adding one or more predefined data values when the partition block matches a second predefined data pattern, and expanding the partition by adding a data value obtained by performing a mathematical linear operation on one or more data values within the partition block;
transmitting the locked data message to the receiver;
double-locking, at the receiver, the locked data message using a second lock;
transmitting the double-locked data message back to the sender;
unlocking, at the sender, the first lock of the double-locked data message using a first key, leaving the data message single-locked by the second lock;
transmitting the single-locked data message back to the receiver; and
unlocking, at the receiver, the second lock of the single-locked data message using a second key to generate the data message;
wherein the locking and unlocking at the sender comprise mathematical linear computations. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A method for secure key exchange between a sender and a receiver, the method comprising:
-
generating a plurality of sender lock-key pairs for the sender and a plurality of receiver lock-key pairs for the receiver;
encrypting, at the sender, a secret key to be transmitted from the sender to the receiver, using one or more locks of the plurality of sender lock-key pairs;
transmitting the sender-encrypted secret key to the receiver;
encrypting, at the receiver, the sender-encrypted secret key using one or more locks of the plurality of receiver lock-key pairs;
transmitting the receiver- and sender-encrypted secret key back to the sender;
decrypting, at the sender, the sender-encrypted portion of the receiver- and sender-encrypted secret key, using one or more keys of the plurality of sender lock-key pairs, leaving the secret key receiver-encrypted;
transmitting the receiver-encrypted secret key back to the receiver;
decrypting, at the receiver, the receiver-encrypted secret key using one or more keys of the plurality of receiver lock-key pairs, to generate the secret key;
encrypting at the sender a data message using the secret key to generate an encrypted data message, and transmitting the encrypted data message to the receiver; and
decrypting at the receiver the encrypted data message using the secret key so as to regenerate the data message at the receiver. - View Dependent Claims (14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30)
-
-
31. A method for secure key exchange between a sender and a receiver, the method comprising:
-
encrypting, at the sender, a secret key to be transmitted from the sender to the receiver, using one or more locks of a plurality of sender lock-key pairs;
transmitting the sender-encrypted secret key to the receiver;
encrypting, at the receiver, the sender-encrypted secret key using one or more locks of a plurality of receiver lock-key pairs;
transmitting the receiver- and sender-encrypted secret key back to the sender;
decrypting, at the sender, the sender-encrypted portion of the receiver- and sender-encrypted secret key, using one or more keys of the plurality of sender lock-key pairs, leaving the secret key receiver-encrypted;
transmitting the receiver-encrypted secret key back to the receiver;
decrypting, at the receiver, the receiver-encrypted secret key using one or more keys of the plurality of receiver lock-key pairs, to generate the secret key;
wherein each lock of the plurality of sender lock-key pairs comprises a plurality of values capable of forming a lock matrix, and further wherein each key corresponding to each lock of the plurality of sender lock-key pairs comprises a plurality of values capable of forming a key matrix, and further wherein the key matrix is the inverse of the lock matrix. - View Dependent Claims (32, 33)
-
-
34. A method for secure key exchange between a sender and a receiver, the method comprising:
-
encrypting, at the sender, a secret key to be transmitted from the sender to the receiver, using one or more locks of a plurality of sender lock-key pairs;
transmitting the sender-encrypted secret key to the receiver;
encrypting, at the receiver, the sender-encrypted secret key using one or more locks of a plurality of receiver lock-key pairs;
transmitting the receiver- and sender-encrypted secret key back to the sender;
decrypting, at the sender, the sender-encrypted portion of the receiver- and sender-encrypted secret key, using one or more keys of the plurality of sender lock-key pairs, leaving the secret key receiver-encrypted;
transmitting the receiver-encrypted secret key back to the receiver;
decrypting, at the receiver, the receiver-encrypted secret key using one or more keys of the plurality of receiver lock-key pairs, to generate the secret key;
encrypting at the sender a data message using the secret key to generate an encrypted data message, and transmitting the encrypted data message to the receiver; and
decrypting at the receiver the encrypted data message using the secret key so as to regenerate the data message at the receiver;
wherein the secure key exchange occurs between a sender and a plurality of receivers, and further wherein, prior to the decrypting at the sender, the sender verifies that each receiver of the plurality of receivers has transmitted a receiver- and sender-encrypted secret key, and further comprising decrypting, at the sender, the sender-encrypted portion of each of the receiver- and sender-encrypted secret keys transmitted from each receiver of the plurality of receivers. - View Dependent Claims (35, 36)
-
-
37. A secure transmission module for securely transmitting a data message to at least one receiver, the module comprising:
-
a lock-key pair generator for generating a plurality of lock-key pairs, using one or more algorithms and a plurality of random values as variables for the one or more algorithms;
a first encryption module configured to encrypt a data message using one or more locks of the plurality of lock-key pairs;
wherein the data message includes a secret key;
a commutative decryption module configured to decrypt encryption applied by the encryption module to the data message, using one or more keys of the plurality of lock-key pairs, after the data message has been additionally encrypted at least once more at the at least one receiver;
a second encryption module configured to encrypt session messages with the secret key; and
a communication module for transmitting encrypted data messages, encrypted session messages and commutatively-decrypted data messages to the at least one receiver, and for receiving additionally-encrypted data messages from the at least one receiver. - View Dependent Claims (38, 39)
-
-
40. A secure receiver module for securely receiving a data message from a sender, the module comprising:
-
a lock-key pair generator for generating a plurality of lock-key pairs, using one or more algorithms and a plurality of random values as variables for the one or more algorithms;
a double-encryption module configured to encrypt an already-encrypted data message using one or more locks of the plurality of lock-key pairs;
a first decryption module configured to recover the data message by decrypting encryption applied by the double-encryption module to a data message, utilizing one or more keys of the plurality of lock-key pairs, to generate the data message from the sender, the decryption occurring after the already-encrypted portion of the data message has been commutatively decrypted at the sender;
a second decryption module for decrypting session messages encrypted with a secret key, wherein the secret key is included in the recovered data message; and
a communication module for receiving messages, including already-encrypted data messages, commutatively-decrypted data messages and session messages from the sender, and for transmitting double-encrypted data messages to the sender. - View Dependent Claims (41, 42, 43)
-
Specification