Method for encryption key generation
First Claim
1. A method for generating an encryption key for use with a host device having a host identification stored therein, the method comprising:
- retrieving the host identification from the host device;
generating at least one content variable;
combining the host identification and the at least one content variable to produce two or more combinations, wherein the method used to combine the host identification and the at least one content variable repeatedly produces the same two or more combinations; and
coalescing the two or more combinations to produce the encryption key, wherein the method of coalescing the two or more combinations repeatedly produces the same encryption key.
1 Assignment
0 Petitions
Accused Products
Abstract
A method for generating an encryption key wherein combinations of a host identification and a content identification are concatenated to produce the encryption key. The content identification is unique to each block of plaintext to be transmitted over an unsecured interface to a storage device. The content identification is appended to the resulting ciphertext for transmission to the storage device. The ciphertext is retrieved by the host device wherein the host identification and appended content identification are used to recreate the encryption key and thus decrypt the ciphertext. Also using a time variable to generate the encryption key provides a method for limiting the duration during which the ciphertext can be decrypted.
91 Citations
8 Claims
-
1. A method for generating an encryption key for use with a host device having a host identification stored therein, the method comprising:
-
retrieving the host identification from the host device;
generating at least one content variable;
combining the host identification and the at least one content variable to produce two or more combinations, wherein the method used to combine the host identification and the at least one content variable repeatedly produces the same two or more combinations; and
coalescing the two or more combinations to produce the encryption key, wherein the method of coalescing the two or more combinations repeatedly produces the same encryption key. - View Dependent Claims (2, 3)
-
-
4. A method for generating an encryption key to encrypt a block of plaintext for use with a host device having a secure clock and a host identification assigned thereto and saved therein, the method comprising:
-
retrieving the host identification from the host device;
generating a content identification, wherein the content identification corresponds to the block of plaintext;
obtaining a time variable from the secure clock within the host device;
combining the host identification, the content identification and the time variable to produce at least six combinations thereof; and
coalescing the at least six combinations to generate the encryption key, wherein the method of coalescing the at least six combinations repeatedly produces the same encryption key.
-
-
5. A method for encrypting a block of plaintext for transmission over an unsecured interface to a storage device, for use with a host device having a host identification assigned thereto and stored therein, the method comprising:
-
retrieving the host identification from the host device;
generating at least one content variable;
combining the host identification and the at least one content variable to produce two or more combinations, wherein the method used to combine the host identification and the at least one content variable repeatedly produces the same two or more combinations;
coalescing the two or more combinations to produce a first encryption key, wherein the method of coalescing the two or more combinations repeatedly produces the same first encryption key;
encrypting the block of plaintext using the first encryption key to produce a block of ciphertext;
appending the at least one content variable to the block of ciphertext;
transmitting the block of ciphertext and the appended at least one content variable over the unsecured interface to the storage device; and
storing the block of ciphertext and the appended one or more content variables within the storage device. - View Dependent Claims (6, 7, 8)
-
Specification