CA2056886A1 - Method for secure communication - Google Patents
Method for secure communicationInfo
- Publication number
- CA2056886A1 CA2056886A1 CA2056886A CA2056886A CA2056886A1 CA 2056886 A1 CA2056886 A1 CA 2056886A1 CA 2056886 A CA2056886 A CA 2056886A CA 2056886 A CA2056886 A CA 2056886A CA 2056886 A1 CA2056886 A1 CA 2056886A1
- Authority
- CA
- Canada
- Prior art keywords
- encrypted
- message
- key
- numbers
- party
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0618—Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
- H04L9/0625—Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation with splitting of the data block into left and right halves, e.g. Feistel based algorithms, DES, FEAL, IDEA or KASUMI
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/088—Usage controlling of secret information, e.g. techniques for restricting cryptographic keys to pre-authorized uses, different access levels, validity of crypto-period, different key- or password length, or different strong and weak cryptographic algorithms
Abstract
A method for the secure communication of messages. A
first party is provided with a set of numbers that have the property that when encrypted using an RSA encryption key the resulting set of encrypted numbers is of an order substantially smaller than that of the original set. If the encryption key and the original set of numbers are of the order of 200 decimal digits then the resulting set of encrypted numbers may be of the order of 15-30 decimal digits.
To communicate a message the first party selects a number from the original set and applies a hashing function to the selected number to obtain a 64 binary bit DES key. The selected number is then encrypted with the RSA key and a message is encrypted with the DES key obtained. The encrypted message and the encrypted selected number are combined and the combined message is sent to a second party who has the corresponding RSA decryption key and knows the hashing function. The second party then decrypts the number, applies the hashing function to obtain the DES key and decrypts the message. Thus the parties may communicate with substantially the security of RSA while significantly reducing the minimum message length which may be securely encrypted.
first party is provided with a set of numbers that have the property that when encrypted using an RSA encryption key the resulting set of encrypted numbers is of an order substantially smaller than that of the original set. If the encryption key and the original set of numbers are of the order of 200 decimal digits then the resulting set of encrypted numbers may be of the order of 15-30 decimal digits.
To communicate a message the first party selects a number from the original set and applies a hashing function to the selected number to obtain a 64 binary bit DES key. The selected number is then encrypted with the RSA key and a message is encrypted with the DES key obtained. The encrypted message and the encrypted selected number are combined and the combined message is sent to a second party who has the corresponding RSA decryption key and knows the hashing function. The second party then decrypts the number, applies the hashing function to obtain the DES key and decrypts the message. Thus the parties may communicate with substantially the security of RSA while significantly reducing the minimum message length which may be securely encrypted.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US07/628,247 US5073935A (en) | 1990-12-17 | 1990-12-17 | Method for secure communication |
US628,247 | 1990-12-17 |
Publications (2)
Publication Number | Publication Date |
---|---|
CA2056886A1 true CA2056886A1 (en) | 1992-06-18 |
CA2056886C CA2056886C (en) | 1996-06-04 |
Family
ID=24518100
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CA002056886A Expired - Fee Related CA2056886C (en) | 1990-12-17 | 1991-12-04 | Method for secure communication |
Country Status (2)
Country | Link |
---|---|
US (1) | US5073935A (en) |
CA (1) | CA2056886C (en) |
Families Citing this family (43)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5142577A (en) * | 1990-12-17 | 1992-08-25 | Jose Pastor | Method and apparatus for authenticating messages |
US5199070A (en) * | 1990-12-18 | 1993-03-30 | Matsushita Electric Industrial Co., Ltd. | Method for generating a public key |
US5297206A (en) * | 1992-03-19 | 1994-03-22 | Orton Glenn A | Cryptographic method for communication and electronic signatures |
US5517614A (en) * | 1992-05-29 | 1996-05-14 | Kabushiki Kaisha Toshiba | Data compression/encryption processing apparatus |
US5237611A (en) * | 1992-07-23 | 1993-08-17 | Crest Industries, Inc. | Encryption/decryption apparatus with non-accessible table of keys |
US5222136A (en) * | 1992-07-23 | 1993-06-22 | Crest Industries, Inc. | Encrypted communication system |
US5301247A (en) * | 1992-07-23 | 1994-04-05 | Crest Industries, Inc. | Method for ensuring secure communications |
DE69433257T2 (en) * | 1993-07-20 | 2009-09-10 | Canon K.K. | Method and communication system using an encryption device |
IL110891A (en) * | 1993-09-14 | 1999-03-12 | Spyrus | System and method for data access control |
US5448641A (en) * | 1993-10-08 | 1995-09-05 | Pitney Bowes Inc. | Postal rating system with verifiable integrity |
US5343527A (en) * | 1993-10-27 | 1994-08-30 | International Business Machines Corporation | Hybrid encryption method and system for protecting reusable software components |
US5455862A (en) * | 1993-12-02 | 1995-10-03 | Crest Industries, Inc. | Apparatus and method for encrypting communications without exchanging an encryption key |
US5539826A (en) * | 1993-12-29 | 1996-07-23 | International Business Machines Corporation | Method for message authentication from non-malleable crypto systems |
US6079327A (en) * | 1994-06-20 | 2000-06-27 | Pitney Bowes Inc. | Dual color non-impact printing for postage meters |
US5586036A (en) * | 1994-07-05 | 1996-12-17 | Pitney Bowes Inc. | Postage payment system with security for sensitive mailer data and enhanced carrier data functionality |
US5838792A (en) * | 1994-07-18 | 1998-11-17 | Bell Atlantic Network Services, Inc. | Computer system for centralized session key distribution, privacy enhanced messaging and information distribution using a split private key public cryptosystem |
CA2158290A1 (en) * | 1994-09-29 | 1996-03-30 | Leon A. Pintsov | Postage evidencing system with secure summary reports |
US5696823A (en) * | 1995-03-31 | 1997-12-09 | Lucent Technologies Inc. | High-bandwidth encryption system with low-bandwidth cryptographic modules |
US6937729B2 (en) * | 1995-04-03 | 2005-08-30 | Scientific-Atlanta, Inc. | Representing entitlements to service in a conditional access system |
US20040136532A1 (en) * | 1995-04-03 | 2004-07-15 | Pinder Howard G. | Partial dual-encrypted stream utilizing program map tables |
US6252964B1 (en) * | 1995-04-03 | 2001-06-26 | Scientific-Atlanta, Inc. | Authorization of services in a conditional access system |
US8548166B2 (en) | 1995-04-03 | 2013-10-01 | Anthony J. Wasilewski | Method for partially encrypting program data |
US7224798B2 (en) | 1995-04-03 | 2007-05-29 | Scientific-Atlanta, Inc. | Methods and apparatus for providing a partial dual-encrypted stream in a conditional access overlay system |
US6246767B1 (en) * | 1995-04-03 | 2001-06-12 | Scientific-Atlanta, Inc. | Source authentication of download information in a conditional access system |
US5812669A (en) * | 1995-07-19 | 1998-09-22 | Jenkins; Lew | Method and system for providing secure EDI over an open network |
MX9800726A (en) * | 1995-07-27 | 1998-04-30 | Nextlevel Systems Inc | Cryptographic system with concealed work factor. |
FR2742285B1 (en) * | 1995-12-11 | 1998-01-16 | France Telecom | METHOD OF PERFORMING AN ELECTRONIC TRANSACTION |
US5932119A (en) * | 1996-01-05 | 1999-08-03 | Lazare Kaplan International, Inc. | Laser marking system |
JPH1020778A (en) * | 1996-07-08 | 1998-01-23 | Harumi Takeda | Encoding device, decoding device and ic card |
US5850444A (en) * | 1996-09-09 | 1998-12-15 | Telefonaktienbolaget L/M Ericsson (Publ) | Method and apparatus for encrypting radio traffic in a telecommunications network |
EP0849713A1 (en) * | 1996-12-17 | 1998-06-24 | TELEFONAKTIEBOLAGET L M ERICSSON (publ) | A method and a system for the encryption of codes |
JP3988172B2 (en) * | 1997-04-23 | 2007-10-10 | ソニー株式会社 | Information processing apparatus and method, and recording medium |
US7515712B2 (en) | 1997-08-01 | 2009-04-07 | Cisco Technology, Inc. | Mechanism and apparatus for encapsulation of entitlement authorization in conditional access system |
US7581110B1 (en) * | 1999-08-25 | 2009-08-25 | Nokia Corporation | Key distribution for encrypted broadcast data using minimal system bandwidth |
US6983365B1 (en) * | 2000-05-05 | 2006-01-03 | Microsoft Corporation | Encryption systems and methods for identifying and coalescing identical objects encrypted with different keys |
US7152047B1 (en) | 2000-05-24 | 2006-12-19 | Esecure.Biz, Inc. | System and method for production and authentication of original documents |
US7089420B1 (en) | 2000-05-24 | 2006-08-08 | Tracer Detection Technology Corp. | Authentication method and system |
US7162035B1 (en) | 2000-05-24 | 2007-01-09 | Tracer Detection Technology Corp. | Authentication method and system |
CA2329590C (en) | 2000-12-27 | 2012-06-26 | Certicom Corp. | Method of public key generation |
US8171567B1 (en) | 2002-09-04 | 2012-05-01 | Tracer Detection Technology Corp. | Authentication method and system |
US8396216B2 (en) * | 2003-11-21 | 2013-03-12 | Howard G. Pinder | Partial dual-encryption using program map tables |
KR20060134992A (en) * | 2004-03-31 | 2006-12-28 | 마츠시타 덴끼 산교 가부시키가이샤 | Computer system, computer program, and addition method |
US7995196B1 (en) | 2008-04-23 | 2011-08-09 | Tracer Detection Technology Corp. | Authentication method and system |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4386416A (en) * | 1980-06-02 | 1983-05-31 | Mostek Corporation | Data compression, encryption, and in-line transmission system |
-
1990
- 1990-12-17 US US07/628,247 patent/US5073935A/en not_active Expired - Lifetime
-
1991
- 1991-12-04 CA CA002056886A patent/CA2056886C/en not_active Expired - Fee Related
Also Published As
Publication number | Publication date |
---|---|
US5073935A (en) | 1991-12-17 |
CA2056886C (en) | 1996-06-04 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CA2056886A1 (en) | Method for secure communication | |
EP0792042A3 (en) | Method of effecting communications using common cryptokey | |
EP0343805A3 (en) | Reproduction of secure keys by using distributed key generation data | |
CA2213096A1 (en) | Key management system for mixed-trust environments | |
US7254232B2 (en) | Method and system for selecting encryption keys from a plurality of encryption keys | |
CA2224661A1 (en) | Use of an encryption server for encrypting messages | |
CA2197915A1 (en) | Cryptographic key recovery system | |
WO1998049856A3 (en) | Method for user identity protection | |
JPH08234658A (en) | Method for generation of encoding key | |
RU98101243A (en) | USE ENCRYPTION SERVER TO ENCRYPT MESSAGES | |
CA2235359A1 (en) | Implicit certificate scheme with ca chaining | |
CA2150683A1 (en) | A Cryptographic Method | |
US20030217263A1 (en) | System and method for secure real-time digital transmission | |
JP2001251287A (en) | Confidential transmitting method using hardware protection inside secret key and variable pass code | |
WO2001084766A3 (en) | System and method for encryption using transparent keys | |
CA2215050A1 (en) | Key escrow method with warrant bounds | |
WO2001037478A3 (en) | Encryption key management system using multiple smart cards | |
GB2261348A (en) | Encryption system for digital cellular communications | |
AU2084201A (en) | One's complement cryptographic combiner | |
JP2002539489A (en) | Voice and data encryption method using encryption key split combiner | |
KR20000072516A (en) | end-to-end data encryption/decryption method and device for mobile data communication | |
CA2344689A1 (en) | A secure data transfer system | |
WO1998027517A1 (en) | A method and a system for the encryption of codes | |
JPH06244832A (en) | Secret information communication method and secret information communication device | |
JPS6346028A (en) | Cryptographic key distribution system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
EEER | Examination request | ||
MKLA | Lapsed |