Abstract:
A computer-implemented method is provided that includes propagating a first identifier and a first key to one or more cipher engines on a computing system, the one or more cipher engines configured to perform at least one of decryption and encryption based on a first cryptographic scheme from a plurality of cryptographic schemes identified by the first identifier, and the first key; on expiration of the first identifier and the first key, propagating a second identifier and a second key to the one or more cipher engines on the computing system and instructions for configuring the one or more cipher engines to change the first cryptographic scheme to a second cryptographic scheme based on the second identifier and the second key; and setting a time window beyond the expiration for acceptance of messages encrypted in the first cryptographic scheme and messages encrypted in the second cryptographic scheme.
Abstract:
Systems and methods for multi-function and multi-purpose cryptography are described, including obtaining a message to be encrypted by a cipher engine configured to perform encryption using a plurality of predetermined tags with an encryption function; determining a tag of the plurality of predetermined tags based on the message; encrypting, by the cipher engine, the message using the tag to produce a ciphertext; and sending the ciphertext.
Abstract:
Systems and methods for multi-function and multi-purpose cryptography are described, including obtaining, by a cipher engine executing on a computing system, a message and an identifier of a server, the message is to be encrypted by the cipher engine, which is configured to perform at least one of decryption and encryption using a plurality of cryptographic schemes associated with a plurality of servers; determining a cryptographic scheme of the plurality of cryptographic schemes based on the identifier of the server, the cryptographic scheme is associated with the server and defines an encryption scheme; encrypting, by the cipher engine, the message using the encryption scheme to produce a ciphertext; and sending the ciphertext to the server.
Abstract:
Homomorphic cryptography on numerical values in digital computing is described, including converting a numerical value encoded in a bit string of a first size to another bit string of a second size, which is different from the first size; encrypting the numerical value in the another bit string to produce a ciphertext; and storing the ciphertext.