Method and system for securing communication
First Claim
1. A method for securing communication among a plurality of members, comprising:
- obtaining, by a first member of a group, a first secret;
generating, by an n-bit generator executing on the first member, a first message digest using the first secret;
extracting, by the first member, a first encryption solution and a second encryption solution, at least in part, from the first message digest, wherein the first encryption solution comprises a first encryption key and first algorithm selector bits, and wherein the second encryption solution comprises a second encryption key and second algorithm selector bits;
selecting, by the first member and from a plurality of encryption algorithms, a first encryption algorithm corresponding to the first algorithm selector bits;
encrypting, by the first member, a first communication using the first encryption key and the first encryption algorithm to obtain a first encrypted communication;
sending, by the first member to a second member of the group, the first encrypted communication;
receiving, by the first member from the second member, a second encrypted communication;
selecting, by the first member and from the plurality of encryption algorithms, a second encryption algorithm corresponding to the second algorithm selector bits;
decrypting, by the first member, the second encrypted communication using the second encryption solution to obtain a second communication;
generating, by the n-bit generator, a second message digest using the first secret, a second secret, and a first change value;
extracting, by the first member, a third encryption solution and a fourth encryption solution, at least in part, from the second message digest;
encrypting, by the first member, a third communication using the third encryption solution to obtain a third encrypted communication;
sending, by the first member to the second member, the third encrypted communication;
receiving, by the first member from the second member, a fourth encrypted communication; and
decrypting, by the first member, the fourth encrypted communication using the fourth encryption solution to obtain a fourth communication.
2 Assignments
0 Petitions
Accused Products
Abstract
A method for securing communication among members of a group. The method includes a first member obtaining a first secret. An n-bit generator executing on the first member generates a first message digest using the first secret. The first member extracts a first encryption solution and a second encryption solution, at least in part, from the first message digest, encrypts a first communication using the first encryption solution to obtain a first encrypted communication, and sends, to a second member of the group, the first encrypted communication. The first member further receives, from the second member, a second encrypted communication, and decrypts the second encrypted communication using the second encryption solution to obtain a second communication.
-
Citations
21 Claims
-
1. A method for securing communication among a plurality of members, comprising:
-
obtaining, by a first member of a group, a first secret; generating, by an n-bit generator executing on the first member, a first message digest using the first secret; extracting, by the first member, a first encryption solution and a second encryption solution, at least in part, from the first message digest, wherein the first encryption solution comprises a first encryption key and first algorithm selector bits, and wherein the second encryption solution comprises a second encryption key and second algorithm selector bits; selecting, by the first member and from a plurality of encryption algorithms, a first encryption algorithm corresponding to the first algorithm selector bits; encrypting, by the first member, a first communication using the first encryption key and the first encryption algorithm to obtain a first encrypted communication; sending, by the first member to a second member of the group, the first encrypted communication; receiving, by the first member from the second member, a second encrypted communication; selecting, by the first member and from the plurality of encryption algorithms, a second encryption algorithm corresponding to the second algorithm selector bits; decrypting, by the first member, the second encrypted communication using the second encryption solution to obtain a second communication; generating, by the n-bit generator, a second message digest using the first secret, a second secret, and a first change value; extracting, by the first member, a third encryption solution and a fourth encryption solution, at least in part, from the second message digest; encrypting, by the first member, a third communication using the third encryption solution to obtain a third encrypted communication; sending, by the first member to the second member, the third encrypted communication; receiving, by the first member from the second member, a fourth encrypted communication; and decrypting, by the first member, the fourth encrypted communication using the fourth encryption solution to obtain a fourth communication. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A computing device for securing communication among a plurality of members comprising:
-
a processor; a memory; and software instructions stored in memory for causing the computing device to; obtain, by a first member of a group, a first secret, wherein the first member is the computing device; generate, by an n-bit generator executing on the first member, a first message digest using the first secret; extract a first encryption solution and a second encryption solution, at least in part, from the first message digest, wherein the first encryption solution comprises a first encryption key and first algorithm selector bits, and wherein the second encryption solution comprises a second encryption key and second algorithm selector bits; select, by the first member and from a plurality of encryption algorithms, a first encryption algorithm corresponding to the first algorithm selector bits; encrypt a first communication using the first encryption key and the first encryption algorithm to obtain a first encrypted communication; send, to a second member of the group, the first encrypted communication; receive, from the second member, a second encrypted communication; select, by the first member and from the plurality of encryption algorithms, a second encryption algorithm corresponding to the second algorithm selector bits; decrypt the second encrypted communication using the second encryption solution to obtain a second communication; generate, by the n-bit generator, a second message digest using the first secret, a second secret, and a first change value; extract a third encryption solution and a fourth encryption solution, at least in part, from the second message digest; encrypt a third communication using the third encryption solution to obtain a third encrypted communication; send, to the second member, the third encrypted communication; receive, from the second member, a fourth encrypted communication; and decrypt the fourth encrypted communication using the fourth encryption solution to obtain a fourth communication. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A non-transitory computer readable medium comprising computer readable program code embodied therein for causing a computer system to perform a method for securing communication among a plurality of members, the method comprising:
-
obtaining, by a first member of a group, a first secret; generating, by an n-bit generator executing on the first member, a first message digest using the first secret; extracting, by the first member, a first encryption solution and a second encryption solution, at least in part, from the first message digest, wherein the first encryption solution comprises a first encryption key and first algorithm selector bits, and wherein the second encryption solution comprises a second encryption key and second algorithm selector bits; selecting, by the first member and from a plurality of encryption algorithms, a first encryption algorithm corresponding to the first algorithm selector bits; encrypting, by the first member, a first communication using the first encryption key and the first encryption algorithm to obtain a first encrypted communication; sending, by the first member to a second member of the group, the first encrypted communication; receiving, by the first member from the second member, a second encrypted communication; selecting, by the first member and from the plurality of encryption algorithms, a second encryption algorithm corresponding to the second algorithm selector bits; decrypting, by the first member, the second encrypted communication using the second encryption solution to obtain a second communication; generating, by the n-bit generator, a second message digest using the first secret, a second secret, and a first change value; extracting, by the first member, a third encryption solution and a fourth encryption solution, at least in part, from the second message digest; encrypting, by the first member, a third communication using the third encryption solution to obtain a third encrypted communication; sending, by the first member to the second member, the third encrypted communication; receiving, by the first member from the second member, a fourth encrypted communication; and decrypting, by the first member, the fourth encrypted communication using the fourth encryption solution to obtain a fourth communication. - View Dependent Claims (16, 17, 18, 19, 20, 21)
-
Specification