Password self encryption method and system and encryption by keys generated from personal secret information
First Claim
Patent Images
1. A method comprisingconverting a first set of predefined information on a server computer to an integer x using a text to number conversion scheme;
- determining a first public key exponent e which is computed as any function of x that results in an odd integer for e;
selecting two prime numbers p and q, wherein p−
1 and q−
1 are relatively primes to e, and then computing a first key modulus n=p times q and a Euler Totient Function ø
=(p−
1)(q−
1);
computing a first private key exponent d such that ed=kø
+1, wherein k and d are integersstoring the first private key exponent d and the first key modulus n in a database or file on the server computer, so that the first private key exponent d and the first key modulus n are related to a first user identification of a first user and the first set of predefined information; and
permanently deleting x, p, q, e and ø
on the server computer so that there is no record of x, p, q, e and ø
on the server computer.
3 Assignments
0 Petitions
Accused Products
Abstract
A public key cryptographic system and method is provided for a password or any other predefined personal secret information that defeats key factoring and spoofing attacks. The method adopts a new technique of encrypting a password or any predefined secret information by a numeric function of itself, replacing the fixed public key of the conventional RSA encryption. The whole process involving key generation, encryption, decryption and password handling is discussed in detail. Mathematical and cryptanalytical proofs of defeating factoring and spoofing attacks are furnished.
108 Citations
18 Claims
-
1. A method comprising
converting a first set of predefined information on a server computer to an integer x using a text to number conversion scheme; -
determining a first public key exponent e which is computed as any function of x that results in an odd integer for e; selecting two prime numbers p and q, wherein p−
1 and q−
1 are relatively primes to e, and then computing a first key modulus n=p times q and a Euler Totient Function ø
=(p−
1)(q−
1);computing a first private key exponent d such that ed=kø
+1, wherein k and d are integersstoring the first private key exponent d and the first key modulus n in a database or file on the server computer, so that the first private key exponent d and the first key modulus n are related to a first user identification of a first user and the first set of predefined information; and permanently deleting x, p, q, e and ø
on the server computer so that there is no record of x, p, q, e and ø
on the server computer. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18)
-
Specification