Information security via dynamic encryption with hash function
First Claim
Patent Images
1. A method of generating an encryption key, the method comprising the steps of:
- hashing a hash vector based upon an encryption key by scanning indexed bytes of the encryption key and using indices and associated values of indices of the encryption key as indices of two bytes in a hash vector to be swapped; and
regenerating a new encryption key with the encryption key, encrypted data, and the hash vector based upon the encryption key.
4 Assignments
0 Petitions
Accused Products
Abstract
A system and method providing secure information. An encryption key is regenerated by performing byte addition of an encryption key, encrypted data, and a hash vector based upon an encryption key. A hash vector is hashed by scanning indexed bytes of an encryption key and using indices and associated values of indices of an encryption key as indices of two bytes in the hash vector to be swapped. An authentication key is regenerated by performing byte addition of an authentication key, an auxiliary key, and a hash vector based upon an authentication key.
12 Citations
13 Claims
-
1. A method of generating an encryption key, the method comprising the steps of:
-
hashing a hash vector based upon an encryption key by scanning indexed bytes of the encryption key and using indices and associated values of indices of the encryption key as indices of two bytes in a hash vector to be swapped; and regenerating a new encryption key with the encryption key, encrypted data, and the hash vector based upon the encryption key. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A method of generating an encryption key, the method comprising the steps of:
-
generating n encryption keys; encrypting n tracks of data records with n tracks of parallel encryption operation; hashing a hash vector based upon the encryption key by scanning indexed bytes of the encryption key and using indices and associated values of indices of the encryption key as indices of two bytes in a hash vector to be swapped; and regenerating an encryption key with the encryption key, the hash vector based upon the encryption key, and selected encrypted data. - View Dependent Claims (7)
-
-
8. A method of generating an encryption key, the method comprising the steps of:
-
hashing a hash vector based upon an encryption key by scanning indexed bytes of the encryption key and using indices and associated values of indices of the encryption key as indices of two bytes in a hash vector to be swapped; encrypting a data record with the hash vector based upon the encryption key; and regenerating the encryption key with the encryption key and encrypted data. - View Dependent Claims (9, 10, 11, 12)
-
-
13. A system for generating an encryption key, the system comprising:
-
a source node; a destination node; a data stream created at said source node; means for encrypting data of said data stream with a hash vector based upon an encryption key; means for hashing the hash vector based upon the encryption key by scanning indexed bytes of the encryption key and using indices and associated values of indices of the encryption key as indices of two bytes in a hash vector to be swapped; and means for regenerating a new encryption key with the encryption key, encrypted data, and the hash vector based upon the encryption key.
-
Specification