Password self encryption method and system and encryption by keys generated from personal secret information
DCFirst Claim
Patent Images
1. A method comprising:
- submitting a user identification for a user from a user computer to a server computer;
receiving a set of information at the user computer from the server computer, in response to the submission of the user identification for the user;
wherein the set of information includes a parameter of a key; and
further comprisingusing the user computer to convert user confidential information to a number x, wherein the number x is dependent on the user confidential information;
using the user computer to compute a number e which is a function of x and which is a function of the user confidential information;
using the user computer to pad the number x to convert x to Xp;
using the user computer to encrypt xp by using the parameter of the key and the number e to form a cipher C, wherein C is a function of the user confidential information; and
submitting the cipher C from the user computer to the server computer.
3 Assignments
Litigations
2 Petitions
Accused Products
Abstract
A public key cryptographic system and method is provided for a password or any other predefined personal secret information that defeats key factoring and spoofing attacks. The method adopts a new technique of encrypting a password or any predefined secret information by a numeric function of itself, replacing the fixed public key of the conventional RSA encryption. The whole process involving key generation, encryption, decryption and password handling is discussed in detail. Mathematical and cryptanalytical proofs of defeating factoring and spoofing attacks are furnished.
120 Citations
19 Claims
-
1. A method comprising:
-
submitting a user identification for a user from a user computer to a server computer; receiving a set of information at the user computer from the server computer, in response to the submission of the user identification for the user; wherein the set of information includes a parameter of a key; and further comprising using the user computer to convert user confidential information to a number x, wherein the number x is dependent on the user confidential information; using the user computer to compute a number e which is a function of x and which is a function of the user confidential information; using the user computer to pad the number x to convert x to Xp;
using the user computer to encrypt xp by using the parameter of the key and the number e to form a cipher C, wherein C is a function of the user confidential information; and submitting the cipher C from the user computer to the server computer. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19)
-
Specification