Public key encryption algorithms for hard lock file encryption
First Claim
Patent Images
1. A method, comprising:
- receiving an encrypted message, a private key, and an ephemeral public key of an entity;
dividing the encrypted message into a plurality of portions, wherein the plurality of portions include a first portion and a second portion;
generating, by a hardware processor, a shared secret based on the private key and the ephemeral public key;
in response to generating the shared secret, discarding the private key and the ephemeral public key;
generating, by the hardware processor, a first decryption key based on the shared secret;
decrypting, by the hardware processor, the first portion using the first decryption key;
generating, by the hardware processor, a second decryption key based on the first decryption key;
decrypting, by the hardware processor, the second portion using the second decryption key; and
outputting at least one of a decrypted first portion or a decrypted second portion.
8 Assignments
0 Petitions
Accused Products
Abstract
In some aspects, an encryption method comprises encrypting a first portion of a message using a first secret key. The first secret key is generated based on the public key of an entity. A one-way function is used to generate a second secret key from the first secret key, and the first secret key is subsequently discarded. A second portion of the message is encrypted using the second secret key. The encrypted first portion of the message and the encrypted second portion of the message are provided to the entity.
-
Citations
18 Claims
-
1. A method, comprising:
-
receiving an encrypted message, a private key, and an ephemeral public key of an entity; dividing the encrypted message into a plurality of portions, wherein the plurality of portions include a first portion and a second portion; generating, by a hardware processor, a shared secret based on the private key and the ephemeral public key; in response to generating the shared secret, discarding the private key and the ephemeral public key; generating, by the hardware processor, a first decryption key based on the shared secret; decrypting, by the hardware processor, the first portion using the first decryption key; generating, by the hardware processor, a second decryption key based on the first decryption key; decrypting, by the hardware processor, the second portion using the second decryption key; and outputting at least one of a decrypted first portion or a decrypted second portion. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A device, comprising:
-
a memory; and at least one hardware processor communicatively coupled with the memory and configured to; receive an encrypted message, a private key, and an ephemeral public key of an entity; divide the encrypted message into a plurality of portions, wherein the plurality of portions include a first portion and a second portion; generate a shared secret based on the private key and the ephemeral public key; in response to generating the shared secret, discard the private key and the ephemeral public key; generate a first decryption key based on the shared secret; decrypt the first portion using the first decryption key; generate a second decryption key based on the first decryption key; decrypt the second portion using the second decryption key; and output at least one of a decrypted first portion or a decrypted second portion. - View Dependent Claims (8, 9, 10, 11, 12)
-
-
13. A non-transitory computer-readable medium containing instructions which, when executed, cause a computing device to perform operations comprising:
-
receiving an encrypted message, a private key, and an ephemeral public key of an entity; dividing the encrypted message into a plurality of portions, wherein the plurality of portions include a first portion and a second portion; generating a shared secret based on the private key and the ephemeral public key; in response to generating the shared secret, discarding the private key and the ephemeral public key; generating a first decryption key based on the shared secret; decrypting the first portion using the first decryption key; generating a second decryption key based on the first decryption key; decrypting the second portion using the second decryption key; and outputting at least one of a decrypted first portion or a decrypted second portion. - View Dependent Claims (14, 15, 16, 17, 18)
-
Specification