摘要:
A method of sending a secure encrypted communication between a first source computer and a second destination computer involves providing the source and destination computers each with an identical copy of a unique pre-distributed symmetric key and a first valid offset. The destination computer sends the source computer a random, previously unused token of variable length from the pre-distributed key beginning at the destination computer's last valid offset. The source computer generates the corresponding token from its last valid offset for the corresponding key in respect of the destination computer. If the source authenticates the destination computer, the source and destination computers update their offsets independently and a communication is sent encrypted by the pre-distributed key.
摘要:
In symmetric methods of encryption the key should be as long as the plaintext message. Such a key is difficult to generate if the plaintext data to be encrypted is enormous. The present invention provides a method of creating a random key of variable length which may be extremely long. It is generated by consecutively applying sub-keys having shorter non-repeating random lengths.
摘要:
A method of using a single, one-time pre-distributed and pre-authenticated symmetric Whitenoise key structure or other exponential key or deterministic random number generator to establish secure key-based communications between a first source computer and a second destination computer (endpoint, sensor or smart component) to provide continuous, dynamic, one-time-pad authentication throughout a session (not just at sign-in or login). By polling ahead in an exponential key stream with specific indexes, pointers or dynamic offsets the method creates an infinite number of identifiable one-time-pad tokens that have never been created or used before and deterministic, random key streams of functionally limitless length that will easily outlive the life of the person or device deploying it. The source and destination computers each with an identical copy of a unique pre-distributed symmetric stream cipher key and a first valid offset. The offset is a pointer or index into the unique key stream to an unused and never created portion of key stream for dynamic-one-time-pad authentication or to a specific static portion of key stream as a constant identifier like the portion of the key stream to encrypt or decrypt a specific file or the secure session. The distributed key structure is a unique, deterministic random number generator that creates exponentially long, deterministic, random key streams that can have an unlimited number of offsets into the same key stream to provide any key-based network security control. The provision of this key is a one-time, non-pki key distribution generally using Identity Proofing 3 or 4 levels for pre-provisioning and pre-authentication purposes. There is never key (complete key or key structure) distribution again. The destination computer sends the source computer a random, previously unused token of variable length from the pre-distributed key beginning at the destination computer's last valid current offset. The source computer generates the corresponding token from the last valid offset for the corresponding key in respect of the destination computer. It compares the tokens bit by bit and if they are identical the source computer authenticates the destination computer. After each authentication call that is successful, the source and destination computers update there current dynamic offsets independently without any key or offset transfer by the length of the token plus 1 or some arithmetic function that moves the offset forward to an unused portion of the key stream. Communications can be sent encrypted using the same distributed key and using a similar technique to the primary authentication function.
摘要:
A method for the routing of a packet of data in a digital transmission network where each packet is formed by a header, enabling this packet to be identified and guided, and a part containing information elements to be conveyed. This method consists, at each node of the network, of a first step for extracting, from the header, the address of a word of a memory containing the information elements needed to identify the header and to guide the data elements conveyed by the packet coming into the node and a second step for creating, according to the header of the incoming packet and the information elements contained in the word of the memory, a new address designating a memory zone containing at least one new header and the information on the outgoing direction of the packet or packets coming out of the node. The method can be applied to digital transmission networks where it is necessary to identify and route packets of data.
摘要:
A distributed key encryption system and method is provided in which a key storage server provides a session key to the source and destination computers by encrypting the session key with unique distributed private keys that are associated with the respective source and destination computers by unique private key identifiers The destination computer then decrypts the encrypted session key using it's distributed private key and then decrypts the communication using the decrypted session key.
摘要:
A distributed key encryption system and method is provided in which a key storage server provides a session key to the source and destination computers by encrypting the session key with unique distributed private keys that are associated with the respective source and destination computers by unique private key identifiers The destination computer then decrypts the encrypted session key using it's distributed private key and then decrypts the communication using the decrypted session key.