Resilient cryptographic scheme
First Claim
1. A method for communicating information, in a data communication system, between at least a first correspondent and a second correspondent interconnected through a data communication channel therebetween, said method comprising the steps of:
- a) selecting a plurality of cryptographic algorithms known to said first correspondent and second correspondent;
b) said first correspondent applying each of said selected cryptographic algorithms to the same information in a common message in a predetermined manner for producing for that algorithm a corresponding set of processed information;
c) said first correspondent transmitting said sets of processed information to said second correspondent; and
d) said second correspondent applying complementary operations of each of said selected cryptographic algorithms in accordance with said predetermined manner to respective ones of said sets of processed information for deriving, from each of said sets of processed information, information related to said common message.
2 Assignments
0 Petitions
Accused Products
Abstract
A method for communicating information between at least a pair of correspondents, the method comprising the steps of each of the correspondents selecting a plurality of cryptographic algorithms known to each of the correspondents. One of the correspondents applies the algorithms in a predetermined manner to a message for producing a set of processed information. The set of processed information is transmitted to the other correspondent. The other correspondent applies complimentary operations of the cryptographic schemes in accordance with the predetermined manner for deriving information related to the message from the processed information.
-
Citations
19 Claims
-
1. A method for communicating information, in a data communication system, between at least a first correspondent and a second correspondent interconnected through a data communication channel therebetween, said method comprising the steps of:
-
a) selecting a plurality of cryptographic algorithms known to said first correspondent and second correspondent; b) said first correspondent applying each of said selected cryptographic algorithms to the same information in a common message in a predetermined manner for producing for that algorithm a corresponding set of processed information; c) said first correspondent transmitting said sets of processed information to said second correspondent; and d) said second correspondent applying complementary operations of each of said selected cryptographic algorithms in accordance with said predetermined manner to respective ones of said sets of processed information for deriving, from each of said sets of processed information, information related to said common message. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A method of preparing information to be communicated between a first correspondent and a second correspondent over a data communication channel, said method comprising the steps of:
-
a) selecting a plurality of cryptographic algorithms known to said first correspondent and second correspondent; b) said first correspondent applying each of said selected cryptographic algorithms to the same information in a common message in a predetermined manner to produce, for that algorithm, a corresponding set of processed information; and c) said first correspondent transmitting said sets of processed information to said second correspondent. - View Dependent Claims (10)
-
-
11. A method of verifying the authenticity of a plurality of sets of processed information sent by a first correspondent over a data communication channel to a second correspondent, each set of processed information having been obtained by applying respective one of a plurality of cryptographic algorithms in a predetermined manner to the same information in a common message, said method comprising the steps of:
-
receiving said plurality of sets of processed information; and for each set of processed information of said plurality of sets of processed information, applying complementary operations of a respective one of said plurality of cryptographic algorithms to that set of processed information in accordance with said predetermined manner to verify the authenticity of that set of processed information. - View Dependent Claims (12)
-
-
13. A data communication system comprising:
-
a first cryptographic unit; a second cryptographic unit; and a data communication channel therebetween, wherein; each of said cryptographic units stores a common plurality of cryptographic algorithms; said first cryptographic unit is configured for; selecting two or more of said plurality of cryptographic algorithms, applying each of said selected algorithms to the same information in a common message in a predetermined manner for producing for that algorithm a corresponding set of processed information; and transmitting said of processed information to said second cryptographic unit; and said second cryptographic unit is configured for applying complementary operations of each of said selected cryptographic algorithms in accordance with said predetermined manner to respective ones of said sets of processed information for deriving, from each of said sets of processed information, information related to said common message. - View Dependent Claims (14, 15)
-
-
16. A cryptographic unit for preparing information to be communicated between a first correspondent and a second correspondent over a data communication channel, said cryptographic unit being configured for:
-
selecting plurality of cryptographic algorithms known to said first correspondent and said second correspondent; applying each of said selected cryptographic algorithms to the same information in a common message in a predetermined manner for producing for that algorithm a corresponding set of processed information; and transmitting said sets of processed information to said second correspondent. - View Dependent Claims (17)
-
-
18. A cryptographic unit for verifying the authenticity of a plurality of sets of processed information sent by a first correspondent over a data communication channel, each set of processed information having been obtained by applying a respective one of a plurality of cryptographic algorithms in a predetermined manner to the same information in a common message, said cryptographic unit being configured for:
-
receiving said plurality of sets of processed information; and for each set of processed information of said plurality of sets of processed information, applying complementary operations of a respective one of said plurality of cryptographic algorithms to that set of processed information in accordance with said predetermined manner to verify the authenticity of that set of processed information. - View Dependent Claims (19)
-
Specification