Method and system for securely exchanging encryption key determination information
First Claim
1. A method for securely exchanging information items used to generate encryption keys among at least two parties using a public/private encryption key system over a communication network, each of said parties retaining an initial private key and transmitting an initial corresponding information item used by each receiving party to determine, and retain, an initial encryption key, said method comprising the steps of:
- configuring at least one processor to perform the functions of;
a. determining a next private key and a next corresponding information item set, wherein said next private key is retained among said retained next private keys and said corresponding information item set includes a public key and a synchronization indicator, said synchronization indicator altering a starting position of an encryption sequence in said public key;
b. encrypting at least one element of said next information item using an encryption key selected from said retained encryption keys;
c. transmitting said encrypted next information item over said network;
d. decrypting a received encrypted information item element using a private key selected from said retained private keys; and
e. determining a next encryption key from said next private key and said received information item, wherein said next encryption key is retained among said retained encryption keys.
3 Assignments
0 Petitions
Accused Products
Abstract
A system and method for securely exchanging plurality of information items used to generate a plurality of encryption keys used in a public key-and-private key system. In accordance with the principles of the invention, elements of exchanged information items, such as public key and synchronizing indictors are encrypted before the exchange. The information item element is encrypted using an encryption key determined from information items that were previously exchanged. The encryption of information items used to determine subsequent encryption keys provides additional security to the encryption key used in the transmission of informational data as the encrypted elements of the information item must be decrypted before the data message encryption key can be decrypted. The process of exchanging encrypted information items can be repeated until an agreed upon number of encrypting keys is determined.
-
Citations
22 Claims
-
1. A method for securely exchanging information items used to generate encryption keys among at least two parties using a public/private encryption key system over a communication network, each of said parties retaining an initial private key and transmitting an initial corresponding information item used by each receiving party to determine, and retain, an initial encryption key, said method comprising the steps of:
-
configuring at least one processor to perform the functions of; a. determining a next private key and a next corresponding information item set, wherein said next private key is retained among said retained next private keys and said corresponding information item set includes a public key and a synchronization indicator, said synchronization indicator altering a starting position of an encryption sequence in said public key; b. encrypting at least one element of said next information item using an encryption key selected from said retained encryption keys; c. transmitting said encrypted next information item over said network; d. decrypting a received encrypted information item element using a private key selected from said retained private keys; and e. determining a next encryption key from said next private key and said received information item, wherein said next encryption key is retained among said retained encryption keys. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A system for securely exchanging information items used to generate encryption keys among at least two parties using a public/private encryption key system over a communication network, each of said parties retaining an initial private key in a memory and transmitting an initial corresponding information item used by each receiving party to determine and retain in said memory, an initial encryption key, said system comprising:
-
a receiving device operative to receive a plurality of information items over said network; a processor in communication with said memory operative to; determine at least one next private key and at least one next corresponding information item set, wherein said at least one next private key is retained in said memory and said corresponding information item set includes a public key and a synchronization indicator, said synchronization indicator altering a starting position of an encryption sequence in said public key; encrypt at least one element of each of said at least one next information item using an encryption key selected from encryption keys retained in said memory; decrypt each of at least one received information item element using a private key selected from said private keys retained in said memory; and determine at least one next encryption key from corresponding said at least one next private key and said at least one received information item, wherein said at least one next encryption key is retained in said memory; and a transmitting device operative to transmit each of said at least one information items. - View Dependent Claims (10, 11, 12, 13, 14, 15)
-
-
16. A device for securely exchanging information items used to generate encryption keys among at least two parties using a public/private encryption key system over a communication network, each of said parties retaining an initial private key in a memory and transmitting an initial corresponding information items used by each receiving party to determine, and retain in said memory, an initial encryption key, said device in communication with a receiving device and a transmitting device, comprising;
-
a key generator to generate a next private key and a next information item wherein said next private key is stored in said memory in communication with said key generator and said next information item includes a public key and a synchronization indicator, said synchronization indicator altering a starting position of an encryption sequence in said public key; an encryption device operative to encrypt at least one element of said next information item using an encryption key selected from encryption keys retained in said memory and communicate said next information item to said transmitting device; a decrypting device to operative to receive information item from said receiving device and decrypt said received information item element using a private key selected from said private keys retained in said memory; and an encryption key generator to determine a next encryption key from corresponding said next private key and said received information item, wherein next encryption key is retained in said memory. - View Dependent Claims (17, 18, 19, 20, 21, 22)
-
Specification