×

Method and system for securing communication

  • US 8,782,408 B2
  • Filed: 03/25/2010
  • Issued: 07/15/2014
  • Est. Priority Date: 03/25/2009
  • Status: Active Grant
First Claim
Patent Images

1. A method for securing communication among a plurality of members, comprising:

  • obtaining, by a first member of a group, a first secret;

    generating, by an n-bit generator executing on the first member, a first message digest using the first secret;

    extracting, by the first member, a first encryption solution and a second encryption solution, at least in part, from the first message digest, wherein the first encryption solution comprises a first encryption key and first algorithm selector bits, and wherein the second encryption solution comprises a second encryption key and second algorithm selector bits;

    selecting, by the first member and from a plurality of encryption algorithms, a first encryption algorithm corresponding to the first algorithm selector bits;

    encrypting, by the first member, a first communication using the first encryption key and the first encryption algorithm to obtain a first encrypted communication;

    sending, by the first member to a second member of the group, the first encrypted communication;

    receiving, by the first member from the second member, a second encrypted communication;

    selecting, by the first member and from the plurality of encryption algorithms, a second encryption algorithm corresponding to the second algorithm selector bits;

    decrypting, by the first member, the second encrypted communication using the second encryption solution to obtain a second communication;

    generating, by the n-bit generator, a second message digest using the first secret, a second secret, and a first change value;

    extracting, by the first member, a third encryption solution and a fourth encryption solution, at least in part, from the second message digest;

    encrypting, by the first member, a third communication using the third encryption solution to obtain a third encrypted communication;

    sending, by the first member to the second member, the third encrypted communication;

    receiving, by the first member from the second member, a fourth encrypted communication; and

    decrypting, by the first member, the fourth encrypted communication using the fourth encryption solution to obtain a fourth communication.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×