Method for strongly encrypting .ZIP files
First Claim
Patent Images
1. A method of placing data in a .ZIP file format data container on a computer, said method including:
- receiving a data file at an application on a computer, wherein said data file has been retrieved from an electronic computer data storage by said application;
compressing said data file to form a compressed data file using said application before encrypting said data file;
encrypting said compressed data file to form an encrypted data file, wherein said encrypting uses symmetric encryption using a symmetric key having a symmetric key bit length selected by a user, wherein said symmetric key bit length is one of a plurality of available symmetric key bit lengths that are selectable by said user using said application;
placing said encrypted data file in a data container using said application on said computer,wherein said data container is constructed in accordance with the .ZIP file format,wherein said data container includes an electronic indication that said encrypted data file is encrypted,wherein said data container includes a second electronic indication that said encrypted data file was encrypted with an encryption method using said symmetric key bit length selected by said user,wherein said data container includes an electronic extra field, wherein said extra field includes an electronic indication of the symmetric key bit length of the symmetric key selected by said user that was employed in encrypting said encrypted data file;
storing said data container constructed in accordance with the .ZIP file format; and
setting a flag in a decryption header of the encrypted file in the data container indicating that both a password and recipient list are required to decrypt the file and that a random number used to generate the symmetric key is encrypted twice by two separate keys.
2 Assignments
0 Petitions
Accused Products
Abstract
The present invention provides a method of integrating existing strong encryption methods into the processing of a .ZIP file to provide a highly secure data container which provides flexibility in the use of symmetric and asymmetric encryption technology. The present invention adapts the well established .ZIP file format to support higher levels of security and multiple methods of data encryption and key management, thereby producing a highly secure and flexible digital container for electronically storing and transferring confidential data.
284 Citations
18 Claims
-
1. A method of placing data in a .ZIP file format data container on a computer, said method including:
-
receiving a data file at an application on a computer, wherein said data file has been retrieved from an electronic computer data storage by said application; compressing said data file to form a compressed data file using said application before encrypting said data file; encrypting said compressed data file to form an encrypted data file, wherein said encrypting uses symmetric encryption using a symmetric key having a symmetric key bit length selected by a user, wherein said symmetric key bit length is one of a plurality of available symmetric key bit lengths that are selectable by said user using said application; placing said encrypted data file in a data container using said application on said computer, wherein said data container is constructed in accordance with the .ZIP file format, wherein said data container includes an electronic indication that said encrypted data file is encrypted, wherein said data container includes a second electronic indication that said encrypted data file was encrypted with an encryption method using said symmetric key bit length selected by said user, wherein said data container includes an electronic extra field, wherein said extra field includes an electronic indication of the symmetric key bit length of the symmetric key selected by said user that was employed in encrypting said encrypted data file; storing said data container constructed in accordance with the .ZIP file format; and setting a flag in a decryption header of the encrypted file in the data container indicating that both a password and recipient list are required to decrypt the file and that a random number used to generate the symmetric key is encrypted twice by two separate keys. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 17)
-
-
9. A system for placing data in a .ZIP file format data container on a computer, said system including:
-
an electronic computer data storage; a processor executing computer instructions implementing an application, said application configured to; receive a data file, wherein said data file has been retrieved from said electronic computer data storage by said application; compress said data file to form a compressed data file before encrypting said data file; encrypt said compressed data file to form an encrypted data file, wherein said encrypting uses symmetric encryption using a symmetric key having a symmetric key bit length selected by a user, wherein said symmetric key bit length is one of a plurality of available symmetric key bit lengths that are selectable by said user using said application; place said encrypted data file in a data container, wherein said data container is constructed in accordance with the .ZIP file format, wherein said data container includes an electronic indication that said encrypted data file is encrypted, wherein said data container includes a second electronic indication that said encrypted data file was encrypted with an encryption method using said symmetric key bit length selected by said user, wherein said data container includes an electronic extra field, wherein said extra field includes an electronic indication of the symmetric key bit length of the symmetric key selected by said user that was employed in encrypting said encrypted data file; store said data container constructed in accordance with the .ZIP file format in said electronic computer data storage; and set a flag in a decryption header of the encrypted file in the data container indicating that both a password and recipient list are required to decrypt the file and that a random number used to generate the symmetric key is encrypted twice by two separate keys. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16, 18)
-
Specification