End-to-end encryption based on a simple shared secret

    公开(公告)号:US12113906B1

    公开(公告)日:2024-10-08

    申请号:US17993931

    申请日:2022-11-24

    申请人: Boris Reitman

    发明人: Boris Reitman

    摘要: This invention enables asynchronous encrypted communication under a protection of a simple password which must be communicated out-of-band. The password is easily communicable in-person, by telephone or by a text message. The invention assumes that one of the parties has an online device, such as a smartphone. After the encrypted session has been established, it can be used for a variety of cryptographic applications, such as encrypting or decrypting messages, sharing of cryptographic keys, and verifying data. The invention also has the secondary benefit of authenticating both parties to each other.

    End-to-end encryption based on a simple shared secret

    公开(公告)号:US11870908B1

    公开(公告)日:2024-01-09

    申请号:US18130440

    申请日:2023-04-04

    申请人: Boris Reitman

    发明人: Boris Reitman

    摘要: This invention enables asynchronous encrypted communication under a protection of a simple password which must be communicated out-of-band. The password is easily communicable in-person, by telephone or by a text message. The invention assumes that one of the parties has an online device, such as a smartphone. After the encrypted session has been established, it can be used for a variety of cryptographic applications, such as encrypting or decrypting messages, sharing of cryptographic keys, and verifying data. The invention also has the secondary benefit of authenticating both parties to each other.

    End-to-end encryption based on a simple shared secret

    公开(公告)号:US11658823B1

    公开(公告)日:2023-05-23

    申请号:US17083314

    申请日:2020-10-29

    申请人: Boris Reitman

    发明人: Boris Reitman

    摘要: This invention enables asynchronous encrypted communication under a protection of a simple password which must be communicated out-of-band. The password is easily communicable in-person, by telephone or by a text message. The invention assumes that one of the parties has an online device, such as a smartphone. After the encrypted session has been established, it can be used for a variety of cryptographic applications, such as encrypting or decrypting messages, sharing of cryptographic keys, and verifying data. The invention also has the secondary benefit of authenticating both parties to each other.