Resilent cryptographic scheme
First Claim
1. A method of protecting information to be communicated in a data communication system, the method comprising:
- obtaining a message;
applying a first signature algorithm to the message to generate a first set of processed information, the first set of processed information including a first signature; and
applying a second signature algorithm to the first set of processed information to generate a further set of processed information, the further set of processed information including a second signature.
2 Assignments
0 Petitions
Accused Products
Abstract
A system and method are provided for enabling a symmetric key to be derived, the method comprising: obtaining a plurality of key parts, wherein the plurality of key parts when combined equal the symmetric key; encrypting a first of the key parts using a first cryptographic algorithm to generate a first encrypted value; encrypting one or more remaining key parts of the plurality of key parts using respective cryptographic algorithms to generate one or more additional encrypted values, wherein each key part encrypted is encrypted using a different cryptographic algorithm; and providing the first encrypted value and the one or more additional encrypted values to an other entity to enable the other entity to derive the symmetric key.
30 Citations
18 Claims
-
1. A method of protecting information to be communicated in a data communication system, the method comprising:
-
obtaining a message; applying a first signature algorithm to the message to generate a first set of processed information, the first set of processed information including a first signature; and applying a second signature algorithm to the first set of processed information to generate a further set of processed information, the further set of processed information including a second signature. - View Dependent Claims (2, 3, 4)
-
-
5. A cryptographic unit for protecting information to be communicated in a data communication system, the cryptographic unit comprising a processor configured to:
-
obtain a message; apply a first signature algorithm to the message to generate a first set of processed information, the first set of processed information including a first signature; and apply a second signature algorithm to the first set of processed information to generate a further set of processed information, the further set of processed information including a second signature. - View Dependent Claims (6, 7, 8)
-
-
9. A non-transitory computer-readable medium comprising computer executable instructions for protecting information to be communicated in a data communication system, the computer executable instructions comprising instructions for:
-
obtaining a message; applying a first signature algorithm to the message to generate a first set of processed information, the first set of processed information including a first signature; and applying a second signature algorithm to the first set of processed information to generate a further set of processed information, the further set of processed information including a second signature.
-
-
10. A method of verifying a data communication, the method comprising:
-
receiving a first signature, the first signature having been generated by applying a first signature algorithm to a first set of processed information to generate a further set of processed information corresponding to the first signature, the first set of processed information having been generated by applying a second signature algorithm to a message; recovering the first set of processed information from the first signature; and recovering the message from the first set of processed information. - View Dependent Claims (11, 12, 13)
-
-
14. A cryptographic unit for verifying a data communication, the cryptographic unit comprising a processor operable to:
-
receive a first signature, the first signature having been generated by applying a first signature algorithm to a first set of processed information to generate a further set of processed information corresponding to the first signature, the first set of processed information having been generated by applying a second signature algorithm to a message; recover the first set of processed information from the first signature; and recover the message from the first set of processed information. - View Dependent Claims (15, 16, 17)
-
-
18. A non-transitory computer readable medium comprising computer executable instructions for verifying a data communication, the computer executable instructions comprising instructions for:
-
receiving a first signature, the first signature having been generated by applying a first signature algorithm to a first set of processed information to generate a further set of processed information corresponding to the first signature, the first set of processed information having been generated by applying a second signature algorithm to a message; recovering the first set of processed information from the first signature; and recovering the message from the first set of processed information.
-
Specification