Method and system for mixed symmetric and asymmetric encryption of .ZIP files
First Claim
Patent Images
1. A method of placing data in a .Zip file format data container, said method including:
- receiving a data file;
generating a first symmetric key based on a user input;
generating random data;
generating a second symmetric key based at least in part on said random data;
encrypting said data file to form an encrypted data file, wherein said encrypting includes symmetrically encrypting said data file using said second symmetric key;
symmetrically encrypting said random data using said first symmetric key to generate symmetrically encrypted key data;
asymmetrically encrypting said first symmetric key using an asymmetric key to form asymmetrically encrypted key data;
placing first data representing said symmetrically encrypted key data in a data container; and
placing second data representing said asymmetrically encrypted key data in said data container, wherein said second data is distinct from said first data, wherein said data container is constructed in accordance with a .Zip file format,wherein all of the steps above are performed on a computing device.
6 Assignments
0 Petitions
Accused Products
Abstract
The present invention provides a method of integrating existing strong encryption methods into the processing of a .ZIP file to provide a highly secure data container which provides flexibility in the use of symmetric and asymmetric encryption technology. The present invention adapts the well established .ZIP file format to support higher levels of security and multiple methods of data encryption and key management, thereby producing a highly secure and flexible digital container for electronically storing and transferring confidential data.
-
Citations
40 Claims
-
1. A method of placing data in a .Zip file format data container, said method including:
-
receiving a data file; generating a first symmetric key based on a user input; generating random data; generating a second symmetric key based at least in part on said random data; encrypting said data file to form an encrypted data file, wherein said encrypting includes symmetrically encrypting said data file using said second symmetric key; symmetrically encrypting said random data using said first symmetric key to generate symmetrically encrypted key data; asymmetrically encrypting said first symmetric key using an asymmetric key to form asymmetrically encrypted key data; placing first data representing said symmetrically encrypted key data in a data container; and placing second data representing said asymmetrically encrypted key data in said data container, wherein said second data is distinct from said first data, wherein said data container is constructed in accordance with a .Zip file format, wherein all of the steps above are performed on a computing device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A .Zip file format data container recorded on a non-transitory computer readable medium, said data container including:
-
an encrypted data file recorded on a computer readable medium; first data representing symmetrically encrypted key data recorded on said computer readable medium; and second data representing asymmetrically encrypted key data recorded on said computer readable medium, wherein said second data is distinct from said first data; wherein a first symmetric key is based on a user input; wherein said symmetrically encrypted key data is-generated by symmetrically encrypting said random data using said first symmetric key, wherein a second symmetric key is generated based at least in part on said random data; wherein said encrypted data file has been symmetrically encrypted using said second symmetric key, wherein asymmetrically encrypted key data is generated by asymmetrically encrypting said first symmetric key using an asymmetric key, wherein said data container is constructed in accordance with a .Zip file format. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19, 20)
-
-
21. A method of placing data in a data container, said method including:
-
receiving a data file; generating a first symmetric key based on a user input; generating random data; generating a second symmetric key based at least in part on said random data; encrypting said data file to form an encrypted data file, wherein said encrypting includes symmetrically encrypting said data file using said second symmetric key; symmetrically encrypting said random data using said symmetric key to generate symmetrically encrypted key data; asymmetrically encrypting said first symmetric key using an asymmetric key to form asymmetrically encrypted key data; placing first data representing said symmetrically encrypted key data in a data container; and placing second data representing said asymmetrically encrypted key data in said data container, wherein said second data is distinct from said first data, wherein said data container is designed for containing compressed files, wherein all of the steps above are performed on a computing device. - View Dependent Claims (22, 23, 24, 25, 26, 27, 28, 29, 30)
-
-
31. A data container recorded on a non-transitory computer readable medium, said data container including:
-
an encrypted data file recorded on a computer readable medium; first data representing symmetrically encrypted key data recorded on said computer readable medium; and second data representing asymmetrically encrypted key data recorded on said computer readable medium, wherein said second data is distinct from said first data; wherein a first symmetric key is based on a user input; wherein said symmetrically encrypted key data is generated by symmetrically encrypting said random data using said first symmetric key, wherein a second symmetric key is generated based at least in part on said random data; wherein said encrypted data file has been symmetrically encrypted using said second symmetric key, wherein said asymmetrically encrypted key data is generated by asymmetrically encrypting said first symmetric key using an asymmetric key, wherein said data container is designed for containing compressed files. - View Dependent Claims (32, 33, 34, 35, 36, 37, 38, 39, 40)
-
Specification