Resilient cryptographic scheme
First Claim
1. A method of enabling a symmetric key to be derived, the method comprising:
- a processor obtaining a plurality of key parts, wherein the plurality of key parts when combined equal the symmetric key;
the processor encrypting a first of the key parts using a first cryptographic algorithm to generate a first encrypted value;
the processor encrypting one or more remaining key parts of the plurality of key parts using respective cryptographic algorithms to generate one or more additional encrypted values, wherein each key part encrypted is encrypted using a different cryptographic algorithm; and
the processor providing the first encrypted value and the one or more additional encrypted values to an other entity to enable the other entity to derive the symmetric key.
2 Assignments
0 Petitions
Accused Products
Abstract
A system and method are provided for enabling a symmetric key to be derived, the method comprising: obtaining a plurality of key parts, wherein the plurality of key parts when combined equal the symmetric key; encrypting a first of the key parts using a first cryptographic algorithm to generate a first encrypted value; encrypting one or more remaining key parts of the plurality of key parts using respective cryptographic algorithms to generate one or more additional encrypted values, wherein each key part encrypted is encrypted using a different cryptographic algorithm; and providing the first encrypted value and the one or more additional encrypted values to an other entity to enable the other entity to derive the symmetric key.
-
Citations
24 Claims
-
1. A method of enabling a symmetric key to be derived, the method comprising:
-
a processor obtaining a plurality of key parts, wherein the plurality of key parts when combined equal the symmetric key; the processor encrypting a first of the key parts using a first cryptographic algorithm to generate a first encrypted value; the processor encrypting one or more remaining key parts of the plurality of key parts using respective cryptographic algorithms to generate one or more additional encrypted values, wherein each key part encrypted is encrypted using a different cryptographic algorithm; and the processor providing the first encrypted value and the one or more additional encrypted values to an other entity to enable the other entity to derive the symmetric key. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A non-transitory computer readable medium comprising computer executable instructions that when executed by a computing device, operate the computing device to:
-
obtain a plurality of key parts, wherein the plurality of key parts when combined equal a symmetric key; encrypt a first of the key parts using a first cryptographic algorithm to generate a first encrypted value; encrypt one or more remaining key parts of the plurality of key parts using respective cryptographic algorithms to generate one or more additional encrypted values, wherein each key part encrypted is encrypted using a different cryptographic algorithm; and provide the first encrypted value and the one or more additional encrypted values to another entity to enable the other entity to derive the symmetric key.
-
-
8. A cryptographic unit comprising:
a processor operable to; obtain a plurality of key parts, wherein the plurality of key parts when combined equal a symmetric key; encrypt a first of the key parts using a first cryptographic algorithm to generate a first encrypted value; encrypt one or more remaining key parts of the plurality of key parts using respective cryptographic algorithms to generate one or more additional encrypted values, wherein each key part encrypted is encrypted using a different cryptographic algorithm; and provide the first encrypted value and the one or more additional encrypted values to another entity to enable the other entity to derive the symmetric key. - View Dependent Claims (9, 10, 11, 12, 13)
-
14. A method of deriving a symmetric key, the method comprising:
-
a processor obtaining a first encrypted value and one or more additional encrypted values; the processor decrypting the first encrypted value and the one or more additional encrypted values to obtain a plurality of key parts, wherein each key part decrypted is decrypted from a respective encrypted value using a different cryptographic algorithm; and the processor combining the plurality of key parts in deriving the symmetric key. - View Dependent Claims (15, 16, 17, 18)
-
-
19. A non-transitory computer readable medium comprising computer executable instructions that when executed by a computing device, operate the computing device to:
-
obtain a first encrypted value and one or more additional encrypted values; decrypt the first encrypted value and the one or more additional encrypted values to obtain a plurality of key parts, wherein each key part decrypted is decrypted from a respective encrypted value using a different cryptographic algorithm; and combine the plurality of key parts in deriving the symmetric key.
-
-
20. A cryptographic unit comprising:
a processor operable to; obtain a first encrypted value and one or more additional encrypted values; decrypt the first encrypted value and the one or more additional encrypted values to obtain a plurality of key parts, wherein each key part decrypted is decrypted from a respective encrypted value using a different cryptographic algorithm; and combine the plurality of key parts in deriving the symmetric key. - View Dependent Claims (21, 22, 23, 24)
Specification