Encryption algorithm with randomized buffer
First Claim
Patent Images
1. A method, comprising:
- obtaining, by a device, a first item of plaintext, a second item of plaintext, and an encryption key,the second item of plaintext being identical to the first item of plaintext;
appending, by the device, first randomized data to an end of the first item of plaintext and second randomized data to an end of the second item of plaintext;
encrypting, by the device, the first item of plaintext, including the appended first randomized data, using an encryption algorithm and the encryption key to produce first ciphertext,the encrypting the first item of plaintext including iteratively encrypting a plurality of data segments of the first item of plaintext,an iteration of encrypting a data segment of the plurality of data segments including;
determining a first value based on the encryption key and the data segment of the first item of plaintext, determining whether the first value comprises more than a threshold quantity of bits,reducing the first value to comprise the threshold quantity of bits when the first value comprises more than the threshold quantity of bits to form a second value,adding a predetermined value, to the first value, to obtain a third value when the first value does not comprise more than the threshold quantity of bits,determining whether the third value comprises more than the threshold quantity of bits, andreducing the third value to comprise the threshold quantity of bits to obtain a fourth value when the third value comprises more than the threshold quantity of bits,the first ciphertext including a cypher value for the data segment, the cypher value comprising;
the second value when the first value comprises more than the threshold quantity of bits,
the third value when the third value does not comprise more than the threshold quantity of bits, or
the fourth value when the third value comprises more than the threshold quantity of bits; and
encrypting, by the device, the second item of plaintext, including the appended second randomized data, using the encryption algorithm and the encryption key to produce second ciphertext,the second ciphertext being different than the first ciphertext.
3 Assignments
0 Petitions
Accused Products
Abstract
A system obtains a key and first and second plaintext, where the first plaintext is identical to the second plaintext. The system uses the key to encrypt the first plaintext to a first ciphertext and the second plaintext to a second ciphertext using a same encryption algorithm, where the first ciphertext is different than the second ciphertext.
17 Citations
19 Claims
-
1. A method, comprising:
-
obtaining, by a device, a first item of plaintext, a second item of plaintext, and an encryption key, the second item of plaintext being identical to the first item of plaintext; appending, by the device, first randomized data to an end of the first item of plaintext and second randomized data to an end of the second item of plaintext; encrypting, by the device, the first item of plaintext, including the appended first randomized data, using an encryption algorithm and the encryption key to produce first ciphertext, the encrypting the first item of plaintext including iteratively encrypting a plurality of data segments of the first item of plaintext, an iteration of encrypting a data segment of the plurality of data segments including;
determining a first value based on the encryption key and the data segment of the first item of plaintext, determining whether the first value comprises more than a threshold quantity of bits,reducing the first value to comprise the threshold quantity of bits when the first value comprises more than the threshold quantity of bits to form a second value, adding a predetermined value, to the first value, to obtain a third value when the first value does not comprise more than the threshold quantity of bits, determining whether the third value comprises more than the threshold quantity of bits, and reducing the third value to comprise the threshold quantity of bits to obtain a fourth value when the third value comprises more than the threshold quantity of bits, the first ciphertext including a cypher value for the data segment, the cypher value comprising;
the second value when the first value comprises more than the threshold quantity of bits,
the third value when the third value does not comprise more than the threshold quantity of bits, or
the fourth value when the third value comprises more than the threshold quantity of bits; andencrypting, by the device, the second item of plaintext, including the appended second randomized data, using the encryption algorithm and the encryption key to produce second ciphertext, the second ciphertext being different than the first ciphertext. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A system, comprising:
a first data buffer, at least partially implemented in hardware, to store first plaintext and second plaintext, the first plaintext being identical to the second plaintext; and
an encryption module, at least partially implemented in hardware, to;append first randomized data to an end of the first item of plaintext and second randomized data to an end of the second item of plaintext; encrypt the first plaintext, including the appended first randomized data, using a particular encryption algorithm and a key to produce a first ciphertext, the encrypting the first plaintext including iteratively encrypting a plurality of data segments of the first plaintext, the encryption module, for an iteration of encrypting a data segment of the plurality of data segments, being to; determine a first value based on the key and the data segment of the plurality of data segments of the first plaintext, determine whether the first value comprises more than a threshold number of bits, reduce the first value to comprise the threshold number of bits when the first value comprises more than the threshold number of bits to form a second value, add a predetermined value, to the first value, to obtain a third value when the first value does not comprise more than the threshold number of bits, determine whether the third value comprises more than the threshold number of bits, and reduce the third value to comprise the threshold number of bits to obtain a fourth value, when the third value comprises more than the threshold number of bits, and
the first ciphertext including a cypher value for the data segment, the cypher value comprising;
the second value when the first value comprises more than the threshold number of bits,
the third value when the third value does not comprise more than the threshold number of bits, or
the fourth value when the third value comprises more than the threshold number of bits, andencrypt the second plaintext, including the appended second randomized data, using the particular algorithm and the key to produce a second ciphertext, the first ciphertext being different than the second ciphertext. - View Dependent Claims (10, 11, 12, 13, 14, 15)
-
16. A method, comprising:
-
obtaining, by a device, plaintext and an encryption key; appending, by the device, randomized data to the plaintext; encrypting, by the device and based on the encryption key, the plaintext, including the randomized data, to produce ciphertext, the encrypting the plain text including iteratively encrypting a plurality of data segments of the plaintext, an iteration of encrypting a data segment of the plurality of data segments including; determining a first value based on the encryption key and the data segment of the plaintext, determining whether the first value comprises more than a threshold quantity of bits, reducing the first value to comprise the threshold quantity of bits when the first value comprises more than the threshold quantity of bits to form a second value, adding a predetermined value, to the first value, to obtain a third value when the first value does not comprise more than the threshold quantity of bits, determining whether the third value comprises more than the threshold quantity of bits, and reducing the third value to comprise the threshold quantity of bits to obtain a fourth value when the third value comprises more than the threshold quantity of bits, the ciphertext including a cypher value for the data segment, the cypher value comprising;
the second value when the first value comprises more than the threshold quantity of bits,
the third value when the third value does not comprise more than the threshold quantity of bits, or
the fourth value when the third value comprises more than the threshold quantity of bits. - View Dependent Claims (17, 18, 19)
-
Specification