Encryption method and apparatus using composition of ciphers
First Claim
Patent Images
1. A method of distributing a message from a message originating computing device through at least two separate intermediary computing devices to a message receiving computing device, the computing devices coupled in a sequence, the method comprising:
- at each particular intermediary computing device in the sequence of computing devices;
receiving the message ciphered with a previous substitution cipher applied to the message on a previous computing device in the sequence of computing devices, the received message comprising a plurality of units, each unit including at least two bits of information;
re-ciphering the received message with a composition cipher that comprises a composition of an inverse of the previous substitution cipher and a substitution cipher, associated with the particular intermediary computing device, that replaces each of a plurality of the units of the received message with a ciphered unit according to a predetermined system that maps different possible values for message units to different cipher values for the message units, wherein the composition cipher is part of a sequence of composition ciphers that are each for use on a different intermediary computing device, and wherein the composition ciphers conceal their constituent substitution ciphers and the inverse ciphers; and
transmitting the re-ciphered message to a next computing device in the sequence of computing devices over a data connection.
1 Assignment
0 Petitions
Accused Products
Abstract
A method and associated apparatus for use in a data distribution process to allow an untrusted intermediary to re-encrypt data for transmission from an originator to a message receiver without revealing the data (message) or the cipher to the intermediary. This method uses a composition of two ciphers for re-encrypting the message at the intermediary, without revealing the plain text message or either cipher to the intermediary.
17 Citations
17 Claims
-
1. A method of distributing a message from a message originating computing device through at least two separate intermediary computing devices to a message receiving computing device, the computing devices coupled in a sequence, the method comprising:
at each particular intermediary computing device in the sequence of computing devices; receiving the message ciphered with a previous substitution cipher applied to the message on a previous computing device in the sequence of computing devices, the received message comprising a plurality of units, each unit including at least two bits of information; re-ciphering the received message with a composition cipher that comprises a composition of an inverse of the previous substitution cipher and a substitution cipher, associated with the particular intermediary computing device, that replaces each of a plurality of the units of the received message with a ciphered unit according to a predetermined system that maps different possible values for message units to different cipher values for the message units, wherein the composition cipher is part of a sequence of composition ciphers that are each for use on a different intermediary computing device, and wherein the composition ciphers conceal their constituent substitution ciphers and the inverse ciphers; and transmitting the re-ciphered message to a next computing device in the sequence of computing devices over a data connection. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
10. A system for securely transmitting a message through a sequence of computing devices, the system comprising:
-
a message originating computing device to (i) generate a message comprising a plurality of units, each unit including at least two bits of information, (ii) generate a sequence of substitution ciphers that each correspond to a different intermediary computing device, (iii) distribute each substitution cipher to its corresponding intermediary computing device, (iv) cipher the message with a first substitution cipher, and (v) transmit the ciphered message to a first intermediary computing device; a plurality of intermediary computing devices coupled in a sequence, each particular intermediary computing device to (i) receive the message ciphered with a previous substitution cipher from the sequence of substitution ciphers, the previous substitution cipher applied to the message by a previous computing device in the sequence of computing devices, (ii) re-cipher the received message with a particular composition cipher that comprises an inverse of the previous substitution cipher applied to the message and a different substitution cipher that replaces each of a plurality of the units of the received message with a ciphered unit according to a predetermined system that maps different possible values for message units to different cipher values for the message units, the particular composition cipher stored on the particular intermediary computing device, and (iii) transmit the re-ciphered message to a next computing device in the sequence of computing devices; and a message receiving computing device to (i) receive the ciphered message from a last intermediary computing device and (ii) decipher the message a final substitution cipher in the sequence of substitution ciphers. - View Dependent Claims (11)
-
-
12. A non-transitory machine readable medium storing a program for distributing a message from a message originating computing device through a particular user controlled intermediary computing device to at least two separate recipient devices the program for execution by at least one processing unit on the user controlled intermediary computing device, the program comprising sets of instructions for:
-
receiving a message ciphered with a previous substitution cipher applied to the message by the message originating computing device, the received message comprising a plurality of units, each unit including at least two bits of information; re-ciphering the received message with a composition cipher that comprises a composition of an inverse of the previous cipher and a substitution cipher, associated with the particular user controlled intermediary computing device, that replaces each of a plurality of the units of the received message with a ciphered unit according to a predetermined system that maps different possible values for message units to different cipher values for the message units, wherein the composition cipher is part of a sequence of composition ciphers that are each for use on the message originating computing device, the particular user controlled intermediary computing device, and the recipient devices; and transmitting the re-ciphered message to the recipient devices, wherein the intermediary computing device and the recipient devices are part of a group of devices that the user controls. - View Dependent Claims (13, 14, 15, 16, 17)
-
Specification