US20230254122A1 - Secret material exchange and authentication cryptography operations - Google Patents
Secret material exchange and authentication cryptography operations Download PDFInfo
- Publication number
- US20230254122A1 US20230254122A1 US18/136,187 US202318136187A US2023254122A1 US 20230254122 A1 US20230254122 A1 US 20230254122A1 US 202318136187 A US202318136187 A US 202318136187A US 2023254122 A1 US2023254122 A1 US 2023254122A1
- Authority
- US
- United States
- Prior art keywords
- computing device
- cryptography
- encrypted
- applying
- result
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 239000000463 material Substances 0.000 title description 3
- 230000006870 function Effects 0.000 claims abstract description 101
- 238000000034 method Methods 0.000 claims description 101
- 230000015654 memory Effects 0.000 claims description 12
- 238000009826 distribution Methods 0.000 claims description 5
- 230000008569 process Effects 0.000 description 66
- 239000011159 matrix material Substances 0.000 description 28
- 238000004422 calculation algorithm Methods 0.000 description 11
- 239000013598 vector Substances 0.000 description 10
- 238000004364 calculation method Methods 0.000 description 7
- 238000012545 processing Methods 0.000 description 7
- 238000012546 transfer Methods 0.000 description 7
- 230000000694 effects Effects 0.000 description 6
- 238000013459 approach Methods 0.000 description 5
- 238000005315 distribution function Methods 0.000 description 4
- 238000007620 mathematical function Methods 0.000 description 4
- 238000012795 verification Methods 0.000 description 4
- 238000007726 management method Methods 0.000 description 3
- 230000003287 optical effect Effects 0.000 description 3
- 230000009466 transformation Effects 0.000 description 3
- 238000004458 analytical method Methods 0.000 description 2
- 230000001010 compromised effect Effects 0.000 description 2
- 238000005314 correlation function Methods 0.000 description 2
- 229910052739 hydrogen Inorganic materials 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 239000004065 semiconductor Substances 0.000 description 2
- 238000000844 transformation Methods 0.000 description 2
- PCTMTFRHKVHKIS-BMFZQQSSSA-N (1s,3r,4e,6e,8e,10e,12e,14e,16e,18s,19r,20r,21s,25r,27r,30r,31r,33s,35r,37s,38r)-3-[(2r,3s,4s,5s,6r)-4-amino-3,5-dihydroxy-6-methyloxan-2-yl]oxy-19,25,27,30,31,33,35,37-octahydroxy-18,20,21-trimethyl-23-oxo-22,39-dioxabicyclo[33.3.1]nonatriaconta-4,6,8,10 Chemical compound C1C=C2C[C@@H](OS(O)(=O)=O)CC[C@]2(C)[C@@H]2[C@@H]1[C@@H]1CC[C@H]([C@H](C)CCCC(C)C)[C@@]1(C)CC2.O[C@H]1[C@@H](N)[C@H](O)[C@@H](C)O[C@H]1O[C@H]1/C=C/C=C/C=C/C=C/C=C/C=C/C=C/[C@H](C)[C@@H](O)[C@@H](C)[C@H](C)OC(=O)C[C@H](O)C[C@H](O)CC[C@@H](O)[C@H](O)C[C@H](O)C[C@](O)(C[C@H](O)[C@H]2C(O)=O)O[C@H]2C1 PCTMTFRHKVHKIS-BMFZQQSSSA-N 0.000 description 1
- 238000004891 communication Methods 0.000 description 1
- 238000004590 computer program Methods 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 238000011156 evaluation Methods 0.000 description 1
- 238000005259 measurement Methods 0.000 description 1
- 239000010979 ruby Substances 0.000 description 1
- 238000012216 screening Methods 0.000 description 1
- 238000013024 troubleshooting Methods 0.000 description 1
- 238000009827 uniform distribution Methods 0.000 description 1
- 230000000007 visual effect Effects 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0838—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/085—Secret sharing or secret splitting, e.g. threshold schemes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0869—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/14—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
- H04L9/3093—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving Lattices or polynomial equations, e.g. NTRU scheme
Definitions
- Cryptography is related to the study of protocols, techniques, and approaches that prevent third parties from accessing, reading, and/or interpreting secret data.
- Cryptography can be applied to various processes in information security, such as data integrity and encryption, confidentiality, authentication, verification, and non-repudiation.
- cryptography has several applications in various fields, including data encryption and privacy, computer network communications and transaction processing, and computing system security and integrity.
- Modern cryptography often relies upon computational hardness in mathematical theory. In other words, it might be theoretically possible to break certain cryptographic systems, but the time required to do so makes such cryptographic-defeating processes intractable. Typically, computationally-secure cryptography processes are preferable to those which are easier to defeat. At the same time, however, computationally-secure cryptography processes might be more computationally-intensive to implement and, thus, more time consuming and costly. In that context, although some cryptographic processes, such as a one time pad, cannot be broken or defeated even with unlimited computing power, those schemes are more difficult to implement than a good, theoretically-breakable but computationally secure approach. As such, modern computing devices may exchange secret data using cryptographic processes having security problems (e.g., the processes are susceptible to brute force attack). At the same time, those cryptographic processes may be resource intensive (e.g., the processes are computationally-intensive to implement).
- FIG. 1 illustrates a process of secret text transfer using asymmetric keys.
- FIG. 2 illustrates a representative process of secret key transfer using cryptography processes according to various embodiments described herein.
- FIG. 3 A illustrates an example distribution function of variables resulting from the white noise associative cryptography key operations according to various embodiments described herein.
- FIG. 3 B illustrates example probability distribution functions of variables resulting from the white noise associative cryptography key operations according to various embodiments described herein.
- FIG. 4 illustrates example user interfaces of a program to perform cryptography key operations according to various embodiments described herein.
- FIG. 5 illustrates a more particular example of a secret key transfer process according to the concepts described herein.
- FIG. 6 illustrates an example of a secret key transfer process using authentication according to the concepts described herein.
- cryptography is related to the study of protocols, techniques, and approaches that prevent third parties from accessing, reading, and/or interpreting secret data.
- RSA Rivest-Shamir-Adleman
- ECC elliptic curve cryptography
- Those cryptosystems are based on complexity and can, theoretically, be decrypted.
- the cryptographic processes described herein is more immune to cryptanalysis and permits the sharing of secret data, such as symmetric keys and other secret data, over public networks.
- the cryptographic system can also be used for authentication. No known methods of traditional or quantum computing can be used to circumvent the cryptographic approaches described herein.
- the cryptographic system described herein was developed to achieve a number of goals including (1) securely exchanging cryptographic keys over public networks, (2) information ciphering, authentication, and (4) encryption for public networks that is secure against standard and quantum computing.
- white noise can be defined as (or can include) a sequence of independent random variables (e.g., discrete numbers) with a uniform probability distribution.
- Polynomial white noise can be defined as (or can include) a sequence of polynomial function values composed by independent random variables (e.g., discrete numbers) with a uniform probability distribution.
- No known algorithm can decrypt the operations described herein due, at least in part, to the use of white noise randomization.
- the unknown independent variables appear to third parties as random white noise and, thus, there is no correlation between those variables and any information being transferred.
- the key exchange method or process described herein can be shown as an exchange of matrices with a corresponding number of different unknown independent variables and visible values.
- the number of unknown independent variables always exceeds the number of visible independent values in any combination of subsets of matrices.
- the number of unknown variables exceeds the number of publically visible polynomial functions.
- no inverse polynomial functions can be determined without information about the secret key—even if the plain text of the secret key is known by a third party.
- FIG. 1 illustrates a process of secret text transfer using asymmetric keys.
- Alice wishes to communicate secret text to Bob over a public network, such as the Internet
- Eve is the eavesdropper.
- the secret text which can be a symmetric key or any other secret information
- Alice and Bob use asymmetric cryptography.
- Asymmetric cryptography relies upon a key pair including a public key that can be disseminated to third parties (e.g., Alice) and a private key which is kept private (e.g., by Bob).
- any person can encrypt a message using the public key, and that encrypted message can only be decrypted using the private key.
- the strength of asymmetric cryptography relies on the degree of difficulty (e.g., computational impracticality) for a private key to be determined from its associated public key.
- Asymmetric cryptography also depends on keeping the private key private.
- Alice obtains a copy of a public key from Bob (or any other source).
- Alice encrypts the secret text using the public key to produce the encrypted secret text and communicates it to Bob over the public network.
- Bob then decrypts the encrypted secret text using the private key to obtain the secret key.
- Eve can only see the encrypted secret text. Even if Eve obtains a copy of the encrypted secret text and the public key used to create it, Eve cannot obtain the secret text from the encrypted secret text using the public key. Instead, only the private key, which is securely held and protected by Bob, can be used to decrypt the encrypted secret text to obtain the secret text from Alice.
- asymmetric cryptography there are drawbacks and limitations to using asymmetric cryptography. For example, it is algorithmically possible to estimate (or determine) the private key in a key pair from the publicly available public key. Additionally, asymmetric key pairs are relatively difficult and time consuming to create, typically depending upon the identification of large prime numbers. Further, asymmetric cryptography can be vulnerable in that it may produce the same predictable encrypted output when the same secret text is encrypted.
- a first cryptographic function is applied to secret data.
- the first cryptographic function operates as a type of cryptographic key and encrypts or ciphers the secret data to produce a first encrypted result.
- the first encrypted result can be securely transmitted by a first device to a second device.
- the second device applies a second cryptographic function to the first encrypted result.
- the second cryptographic function operates as a cryptographic key and further (or doubly) encrypts or ciphers the first encrypted result to produce a second (or doubly) encrypted result.
- the secret data has been encrypted by two different cryptographic functions, each of them being sufficient to secure the secret data.
- the two different cryptographic functions can then be inversed or removed, in any order, to reveal the secret data.
- FIG. 2 illustrates a representative process 20 of secret key transfer using cryptography processes according to various embodiments described herein.
- the process described below can be performed by any suitable computing device(s) including a processor and memory, without limitation.
- Alice wants to securely pass the secret key Xto Bob over a public network. To do so, Alice should first encrypt the secret key X before sending it to Bob.
- the cryptographic function F A can be embodied as any suitable mathematical function having an inverse which cannot be determined without knowledge of a certain set of parameters of the mathematical function.
- the function F A can be embodied as a polynomial function or multivariate polynomial function defined in part by one or more variables, combinations of variables, combinations of variables at various powers, and coefficients.
- Alice also holds a first inverse cryptographic function F ⁇ 1 A.
- the process 20 includes Alice generating, with a first computing device, a first random lock X A .
- the first random lock X A can be embodied as an array or vector of random scalar integers, for example, or another suitable organized structure of random numbers.
- the first random lock X A can operate as a type of initialization vector upon which the cryptographic function F A is applied in combination with the secret key X.
- the first random lock X A helps to randomize the application of the cryptographic function F A creating, in effect, a new random cryptographic function F A for each different random lock X A .
- the first random lock X 4 helps to achieve semantic security, so that repeated usage of the cryptographic function F A with the same operand does not produce the same ciphered result and does not allow an attacker to infer any information.
- the process 20 includes Alice applying, with the first computing device, the first cryptographic function F A to a combination of the secret key X and the first random lock X A to produce a first encrypted result R 1 .
- Alice's secret key X which can include letters, numbers, American Standard Code for Information Interchange (ASCII) characters, etc.
- ASCII American Standard Code for Information Interchange
- the cryptographic function F A can be embodied as any suitable mathematical function, such as a polynomial or multivariate polynomial function.
- the cryptographic function F A can be embodied as a polynomial function F(CX k ) of kth order written as:
- C i . . . k are coefficients of the polynomial function F(CX k ), and X i . . . k are combinations of the operand X, which can include a combination of a random lock and secret data.
- Alice's secret key X which may include letters, numbers, American Standard Code for Information Interchange (ASCII) characters, etc.
- ASCII American Standard Code for Information Interchange
- FIG. 3 A a distribution function of the variables in the results R 1 , R 2 , and R 3 is shown in FIG. 3 A
- probability distribution functions of the variables in the results R 1 , R 2 , and R 3 is shown in FIG. 3 B .
- the structure of the polynomial function F(CX k ) and the coefficients can be known to others (although they generally are not) from the formalization of the algorithm. However, even if the structure of the polynomial function F and values of the coefficients C, k are known to a third party, the third party still cannot decrypt the transferred information.
- the process 20 includes Alice transmitting, with the first computing device, the first encrypted result R 1 to Bob's second computing device.
- the process 20 includes Bob generating, with the second computing device, a second random lock X B .
- the second random lock X B can be embodied as an array or vector of random scalar integers, for example, or another suitable organized structure of random numbers.
- the second random lock X S can also operate as a type of initialization vector for the cryptographic function F B .
- the second random lock X B helps to randomize the application of Bob's cryptographic function F B creating, in effect, a new random cryptographic function F B for each different random lock XB .
- the second random lock X B helps to achieve semantic security, so that repeated usage of the cryptographic function F B with the same operand does not produce the same ciphered result and does not allow an attacker to infer any information.
- the process includes Bob applying, with the second computing device, Bob's cryptographic function F B to a combination of the first encrypted result R 1 and the second random lock X B to produce a second encrypted result R 2 .
- the first encrypted result R 1 e.g., F A (X,X A )
- the cryptographic function F B can be embodied as any suitable mathematical function, such as a polynomial or multivariate polynomial function.
- the cryptographic function F B can be embodied as a polynomial function F(CX k ) of kth order according to that shown above in Equation (1).
- Alice's secret key X has been encrypted or ciphered by two different cryptographic functions F A and F B , each of them being sufficient to secure the secret key X from others.
- the two different cryptographic functions can then be inversed or removed, in any order, to reveal the secret key X.
- decrypt the secret key X from the second encrypted result R 2 i.e., to undo the effects of the cryptographic functions F A and Fa
- the order in which the second encrypted result R 2 is applied to the inverse cryptographic functions F ⁇ 1 A and F ⁇ 1 B . does not impact the results of the decryption of secret key X from the second encrypted result R 2 .
- any number of cryptographic functions to F 1 . . . F N can be applied to encrypt secret data in any order to produce an encrypted result R N , and that encrypted result R N can be decrypted in any order using the inverse cryptographic functions F ⁇ 1 1 . . . F ⁇ 1 N .
- the process 20 includes Bob transmitting, with the second computing device, the second encrypted result R 2 to the first computing device.
- the process 20 includes Alice applying, with the first computing device, the first inverse cryptographic function F ⁇ 1 A to the second encrypted result R 2 to produce the result R 3 .
- the first inverse cryptographic function F ⁇ 1 A unlocks or removes the effect of both the first random lock X A and the first cryptographic function F A .
- the result R 3 is what remains of the second encrypted result R 2 after the effect of the first random lock X A and the first cryptographic function F A are undone or unlocked (e.g., F B (X,X B )).
- the result R 3 is still encrypted, but only by Bob's second random lock X B and the second cryptographic function F B , and the result R 3 can be securely transmitted over the public network.
- the process 20 includes Alice transmitting, with the first computing device, the result R 3 to the second computing device.
- the process 20 includes Bob applying, with the second computing device, the second inverse cryptographic function F ⁇ 1 B to the result R 3 to arrive at the secret key X.
- the secret key X has been securely communicated from Alice to Bob.
- key pairs are not used in the process 20 .
- the method is cryptanalysis resistant. To obtain the only solution x 1 , .
- the third party e.g., outsider Eve
- plain text (as a letter or ASCII code of 256 numbers) is represented in ciphered text by three corresponding random numbers r 1 , r 2 and r 3 which are calculated by a random generator.
- Table 2 shows an example of how the plain text “This is a plain text” appears in ciphered numbers.
- Ciphered text text r 1 r 2 r 3 T 0.001251 0.563585 0.003585 h 0.193304 0.808741 0.158307 i 0.585009 0.479873 0.28051 s 0.350291 0.895962 0.313555 0.82284 0.746605 0.614412 i 0.174108 0.858943 0.151801 s 0.710501 0.513535 0.363394 0.303995 0.014985 0.006167 a 0.091403 0.364452 0.035009 0.147313 0.165899 0.02575 p 0.988525 0.445692 0.438709 1 0.119083 0.004669 0.001204 i a 0.00891 1 0.37788 0.005292 i 0.531663 0.571184 0.303183 n 0.601764 0.607166 0.363988 0.166234 0.663045 0.113037 t 0.450789 0.352123 0.159469 e 0.057039 0.
- Uniform distribution is called “white noise” due to its informative features.
- the correlation function between any two variables x and y is estimated as follows:
- corr ⁇ ( x , y ) ⁇ ( x - x _ ) ⁇ ( y - y _ ) ⁇ ( x - x _ ) 2 ⁇ ⁇ ( y - ⁇ y _ ) 2 . ( 2 )
- the correlation is negligibly small, which means that ciphered information is encapsulated into white noise and is not analyzable by a third party. There are no known algorithms to decrypt the ciphered information without the encryption key.
- a computer program was developed to implement the method described herein. As shown in FIG. 4 , Alice securely sends her secret text “Hello bob” to Bob using the three pass transaction. In FIG. 4 , random values appear to a third party during the three pass transaction (specially shown in the blue box).
- the processes described herein can be used to achieve unbreakable (or nearly unbreakable) encryption over wireless, wired, and public networks, and against quantum computing attacks. It requires relatively little processing power for encrypting and decrypting and, thus, can be used for rapid verification and transactions. A practically limitless number of new keys can be generated on the fly. Thus, the keys can be changed on every transaction. Encryption and decryption can also occur on individual devices due to the high speed of encryption and low processing requirements. Further, there is no single point of compromise because every individual party has their own key. If a key is compromised, it is the one compromised and can be renewed or replaced.
- FIG. 5 illustrates a more particular example of a secret key transfer process 30 according to the concepts described herein. While an example using square matrices of a certain size is provided below, the concepts described herein can be extended to use with square matrices of any size. Further, although the example below is presented in certain cases as steps between “Alice” and “Bob,” the process is conducted by computing systems or devices.
- K as a sequence of m bytes, each including one of the ASCII codes from 0 to 255, as follows:
- K ⁇ k 1 ,k 2 , . . . ,k m ⁇ ,0 ⁇ k i ⁇ 255.
- a sequence of real numbers X can then be defined as a transformation of the key numbers (i.e., k 1 , k 2 , k m ), which are integers, into real ones, as follows:
- the last matrix is not fully filled in. In this case, the rest of the matrix members can be generated and added as any random numbers without influencing the algorithm.
- the matrix X decomposes into two singular matrices Z 1 and Z 2
- X Z 1 ⁇ Z 2
- Z 1 ⁇ " ⁇ [LeftBracketingBar]”
- Z 2 ⁇ " ⁇ [LeftBracketingBar]”
- Z 4 Z 5 Z 6 Z 3 ⁇ Z 5 Z 6 ⁇ " ⁇ [RightBracketingBar]"
- the inverse of matrix X, or X ⁇ 1 does not exist (see properties of singular matrices and matrix determinants in APPENDIX).
- the matrix X represents a portion of the secret key K, ⁇ k 1 , k 2 , k 3 ⁇ .
- the process further includes generating a uniformly distributed random matrices Y 1 , Y 2 and inverse matrices Y 1 ⁇ 1 , Y 2 ⁇ 1 , as follows:
- Y 1 ⁇ " ⁇ [LeftBracketingBar]” y 1 y 2 y 3 y 4 ⁇ " ⁇ [RightBracketingBar]”
- Y 1 - 1 ⁇ " ⁇ [LeftBracketingBar]” y 4 - y 2 - y 3 y 1 ⁇ " ⁇ [RightBracketingBar]” y 1 ⁇ y 4 - y 2 ⁇ y 3 , y i ⁇ R , y 1 ⁇ y 4 ⁇ y 2 ⁇ y 3
- Y 2 ⁇ " ⁇ [LeftBracketingBar]” y 5 y 6 y 7 y 8 ⁇ " ⁇ [RightBracketingBar]”
- Y 2 - 1 ⁇ " ⁇ [LeftBracketingBar]” y 8 - y 6 - y 7 y 5 ⁇ " ⁇ [RightBracketingBar]” y 5 ⁇ y 8 - y 6 ⁇
- the process also includes generating uniformly distributed random centrosymmetric A 1 , A 2 , B 1 , B 2 , and inverse A 1 ⁇ 1 , A 2 ⁇ 1 , B 1 ⁇ 1 , B 2 ⁇ 1 matrices as follows:
- a 1 ⁇ " ⁇ [LeftBracketingBar]” a 1 a 2 a 2 a 1 ⁇ " ⁇ [RightBracketingBar]”
- a 2 ⁇ " ⁇ [LeftBracketingBar]” a 3 a 4 a 4 a 3 ⁇ " ⁇ [RightBracketingBar]”
- a 1 - 1 ⁇ " ⁇ [LeftBracketingBar]” a 1 - a 2 - a 2 a 1 ⁇ " ⁇ [RightBracketingBar]” a 1 2 - a 2 2
- the process includes Alice generating and sending matrices M 1 and M 2 to Bob, as follows:
- M 1 ⁇ " ⁇ [LeftBracketingBar]” m 1 ( 1 ) m 2 ( 1 ) m 3 ( 1 ) m 4 ( 1 ) ⁇ " ⁇ [RightBracketingBar]”
- M 2 ⁇ " ⁇ [LeftBracketingBar]” m 1 ( 2 ) m 2 ( 2 ) m 3 ( 2 ) m 4 ( 2 ) ⁇ " ⁇ [RightBracketingBar]”
- M 3 ⁇ " ⁇ [LeftBracketingBar]” m 1 ( 3 ) m 2 ( 3 ) m 3 ( 3 ) m 4 ( 3 ) ⁇ " ⁇ [RightBracketingBar]”
- M 4 ⁇ " ⁇ [LeftBracketingBar]” m 1 ( 4 ) m 2 ( 4 ) m 3 ( 4 ) ⁇ " ⁇ [RightBracketingBar]”
- M 4 ⁇ " ⁇ [LeftBracketingBar]” m 1 ( 4 ) m
- Alice sends to Bob fourteen publicly visible values (m 1 (1) , m 2 (1) , m 3 (1) , m 4 (1) , m 1 (2) , m 2 (2) , m 3 (2) , m 1 (3) , m 2 (3) , m 3 (3) , m 4 (3) , m 1 (4) , m 2 (4) , m 3 (4) ) of matrices M 1 , M 2 , M 3 and M 4 that are calculated from twenty-two independent unknown (for the third party) variables (a 1 , a 2 , a 3 , a 4 , b 1 , b 2 , b 3 , b 4 , y 1 , y 2 , y 3 , y 4 , y 5 , y 6 , y 7 , y 8 , z 1 , z 2 , z 3 , z 4 , z 5 , z 6 ) known by Alice only, as follows
- m 1 ( 1 ) a 1 ⁇ y 1 + a 2 ⁇ y 2
- m 2 ( 1 ) a 2 ⁇ y 1 + a 1 ⁇ y 2
- m 3 ( 1 ) a 1 ⁇ y 3 + a 2 ⁇ y 4
- m 4 ( 1 ) a 2 ⁇ y 3 + a 1 ⁇ y 4
- m 1 ( 2 ) b 1 ( x 1 ⁇ y 4 - x 3 ⁇ y 2 ) + b 2 ( x 3 ⁇ y 1 - x 1 ⁇ y 3 ) y 1 ⁇ y 4 - y 2 ⁇ y 3
- m 2 ( 2 ) b 1 ( x 2 ⁇ y 4 - y 2 ⁇ x 2 ⁇ / x 1 ) + b 2 ( y 1 ⁇ x 2 ⁇ x 3 / x 1 ) + b 2 ( y 1 ⁇
- the process includes Bob receiving the M 1 and M 2 matrices from Alice.
- the process includes generating uniformly distributed random centrosymmetric matrices C 1 , C 2 and inverse C 1 ⁇ 1 , C 2 ⁇ 1 matrices, as follows:
- C 1 ⁇ " ⁇ [LeftBracketingBar]” c 1 c 2 c 2 c 1 ⁇ " ⁇ [RightBracketingBar]”
- C 2 ⁇ " ⁇ [LeftBracketingBar]” c 3 c 4 c 4 c 3 ⁇ " ⁇ [RightBracketingBar]”
- C 1 - 1 ⁇ " ⁇ [LeftBracketingBar]” c 1 - c 2 - c 2 c 1 ⁇ " ⁇ [RightBracketingBar]” c 1 2 - c 2 2 , c i ⁇ R , c 1 2 ⁇ c 2 2
- C 2 - 1 ⁇ " ⁇ [LeftBracketingBar]” c 3 - c 4 - c 4 c 3 ⁇ " ⁇ [RightBracketingBar]” c 3 2 - c 4 2 , c i ⁇ R , c 3 2 ⁇ c 4 2 .
- the process at step 306 also includes generating uniformly distributed random matrices D and H, as follows:
- D ⁇ " ⁇ [LeftBracketingBar]” d 1 d 2 d 3 d 4 ⁇ " ⁇ [RightBracketingBar]”
- H ⁇ " ⁇ [LeftBracketingBar]” h 1 h 2 h 3 h 4 ⁇ " ⁇ [RightBracketingBar]” , d i , h i ⁇ R , d 1 ⁇ d 4 ⁇ d 2 ⁇ d 3 , h 1 ⁇ h 4 ⁇ h 2 ⁇ h 3 .
- the process at step 306 also includes generating corresponding inverse matrices D ⁇ 1 and H ⁇ 1 , as follows:
- D - 1 ⁇ " ⁇ [LeftBracketingBar]” d 1 d 2 d 3 d 4 ⁇ " ⁇ [RightBracketingBar]” d 1 ⁇ d 4 - d 2 ⁇ d 3
- H - 1 ⁇ " ⁇ [LeftBracketingBar]” h 1 h 2 h 3 h 4 ⁇ " ⁇ [RightBracketingBar]” h 1 ⁇ h 4 - h 2 ⁇ h 3 .
- the process at step 306 also includes generating the matrices M 5 , M 6 , M 7 and M 8 , as follows:
- M 5 ⁇ " ⁇ [LeftBracketingBar]” m 1 ( 5 ) m 2 ( 5 ) m 3 ( 5 ) m 4 ( 5 ) ⁇ " ⁇ [RightBracketingBar]”
- M 6 ⁇ " ⁇ [LeftBracketingBar]” m 1 ( 6 ) m 2 ( 6 ) m 3 ( 6 ) m 4 ( 6 ) ⁇ " ⁇ [RightBracketingBar]”
- M 7 ⁇ " ⁇ [LeftBracketingBar]” m 1 ( 7 ) m 2 ( 7 ) m 3 ( 7 ) m 4 ( 7 ) ⁇ " ⁇ [RightBracketingBar]”
- M 8 ⁇ " ⁇ [LeftBracketingBar]” m 1 ( 8 ) m 2 ( 8 ) m 3 ( 8 ) m 4 ( 8 ) ⁇ " ⁇ [RightBracketingBar]”
- M 8 ⁇ " ⁇ [LeftBracketingBar]” m
- the process includes Bob sending to Alice fourteen publicly visible values (m 1 (5) , m 2 (5) , m 3 (5) , m 4 (5) , m 1 (6) , m 2 (6) , m 3 (6) , m 1 (7) , m 2 (7) , m 3 (7) , m 4 (7) , m 1 (8) , m 2 (8) , m 3 (8) ) of matrices M 3 and M 4 that are calculated from sixteen independent unknown (for the third party) variables (c 1 , c 2 , c 3 , c 4 , d 1 , d 2 , d 3 , d 4 , e 1 , e 2 , e 3 , e 4 , h 1 , h 2 , h 3 , h 4 ) which are known by Bob only, as follows:
- m 1 ( 6 ) ( c 1 ⁇ m 1 ( 2 ) + c 2 ⁇ m 3 ( 2 ) ) ⁇ e 1 + ( c 1 ⁇ m 2 ( 2 ) + c 2 ⁇ m 4 ( 2 ) ) ⁇ e 3
- m 2 ( 6 ) ( c 1 ⁇ m 1 ( 2 ) + c 2 ⁇ m 3 ( 2 ) ) ⁇ e 2 + ( c 3 ⁇ m 2 ( 2 ) + c 2 ⁇ m 4 ( 2 ) ) ⁇ e 4
- m 3 ( 6 ) ( c 2 ⁇ m 1 ( 2 ) + c 1 ⁇ m 3 ( 2 ) ) ⁇ e 1 + ( c 2 ⁇ m 2 ( 2 ) + c 1 ⁇ m 4 ( 2 ) ) ⁇ e 3
- the process includes Alice receiving from Bob the matrices M 5 , M 6 , M 7 and M 8 as follows:
- M 8 CBY ⁇ 1 XH.
- centrosymmetric matrices satisfy the following conditions:
- the process includes multiplying the matrices M 5 , M 6 , M 7 and M 8 with the known inverse matrices A 1 ⁇ 1 , A 2 ⁇ 1 , B 1 ⁇ 1 and B 2 ⁇ 1 , respectively, as follows:
- the process includes multiplying the results of those together to arrive at the matrix M 5 , as follows:
- the process includes Alice sending the following three publicly visible values to Bob (m 1 (9) , m 2 (9) , m 3 (9) ), as follows:
- m 1 (9) ( d 1 x 1 +d 2 x 3 ) h 1 +( d 1 x 2 +d 2 x 4 ) h 3 ,
- m 2 (9) ( d 1 x 1 +d 2 x 3 ) h 2 +( d 1 x 2 +d 2 x 4 ) h 4 ,
- m 3 (9) ( d 3 x 1 +d 4 x 3 ) h 1 +( d 3 x 2 +d 4 x 4 ) h 3 , and
- m 4 (9) m 3 (9) m 2 (9) /m 1 (9) .
- Bob receives the matrix M9 from Alice, as follows:
- the process includes Bob restoring the key X from Alice by using inverse matrices D ⁇ 1 and H ⁇ 1 , which are known to Bob, and the matrix M 5 , as follows:
- the entire scheme of the key exchange process can be performed using an exchange of matrices with a corresponding number of different unknown independent variables (underlined in Table 6) and visible (by the third party) values (bolded in Table 6).
- This scheme demonstrates that the number of unknown independent variables always exceeds the number of visible independent values in any combination of subsets of matrices.
- M 8 C 2 B 2 Y 2 ⁇ 1 Z 2 H .
- FIG. 6 illustrates an example secret material or key exchanging process using authentication according to the concepts described herein.
- the process 40 includes Alice generating uniformly distributed random matrices Y 1 , Y 2 and inverse matrices Y 1 ⁇ 1 , Y 2 ⁇ 1 , as follows:
- Y 1 ⁇ " ⁇ [LeftBracketingBar]” y 1 y 2 y 3 y 4 ⁇ " ⁇ [RightBracketingBar]”
- Y 1 - 1 ⁇ " ⁇ [LeftBracketingBar]” y 4 - y 2 - y 3 y 1 ⁇ " ⁇ [RightBracketingBar]” y 1 ⁇ y 4 - y 2 ⁇ y 3 , y i ⁇ R , y 1 ⁇ y 4 ⁇ y 2 ⁇ y 3
- Y 2 ⁇ " ⁇ [LeftBracketingBar]” y 5 y 6 y 7 y 8 ⁇ " ⁇ [RightBracketingBar]”
- Y 2 - 1 ⁇ " ⁇ [LeftBracketingBar]” y 5 - y 6 - y 7 y 8 ⁇ " ⁇ [RightBracketingBar]”
- Y 2 - 1 ⁇ " ⁇ [LeftBracketing
- Alice also generates uniformly distributed random centrosymmetric matrices A and B, as follows:
- a 1 ⁇ " ⁇ [LeftBracketingBar]” a 1 a 2 a 2 a 1 ⁇ " ⁇ [RightBracketingBar]”
- a 2 ⁇ " ⁇ [LeftBracketingBar]” a 3 a 4 a 4 a 3 ⁇ " ⁇ [RightBracketingBar]”
- a 1 - 1 ⁇ " ⁇ [LeftBracketingBar]” a 1 - a 2 - a 2 a 1 ⁇ " ⁇ [RightBracketingBar]” a 1 2 - a 2 2
- the process includes Alice sending to Bob results as matrices M 1 and M 2 , as follows:
- M 1 ⁇ " ⁇ [LeftBracketingBar]” m 1 ( 1 ) m 2 ( 1 ) m 3 ( 1 ) m 4 ( 1 ) ⁇ " ⁇ [RightBracketingBar]”
- M 2 ⁇ " ⁇ [LeftBracketingBar]” m 1 ( 2 ) m 2 ( 2 ) m 3 ( 2 ) m 4 ( 2 ) ⁇ " ⁇ [RightBracketingBar]”
- M 3 ⁇ " ⁇ [LeftBracketingBar]” m 1 ( 3 ) m 2 ( 3 ) m 3 ( 3 ) m 4 ( 3 ) ⁇ " ⁇ [RightBracketingBar]”
- M 4 ⁇ " ⁇ [LeftBracketingBar]” m 1 ( 4 ) m 2 ( 4 ) m 3 ( 4 ) ⁇ " ⁇ [RightBracketingBar]”
- M 4 ⁇ " ⁇ [LeftBracketingBar]” m 1 ( 4 ) m
- Bob receives M 1 and M 2 from Alice.
- Bob generates uniformly distributed random centrosymmetric matrices C 1 , C 2 and inverse C 1 ⁇ 1 , C 2 ⁇ 1 matrices, as follows:
- C 1 ⁇ " ⁇ [LeftBracketingBar]” c 1 c 2 c 2 c 1 ⁇ " ⁇ [RightBracketingBar]”
- C 2 ⁇ " ⁇ [LeftBracketingBar]” c 3 c 4 c 4 c 3 ⁇ " ⁇ [RightBracketingBar]”
- C 1 - 1 ⁇ " ⁇ [LeftBracketingBar]” c 1 - c 2 - c 2 c 1 ⁇ " ⁇ [RightBracketingBar]” c 1 2 - c 2 2 , c i ⁇ R , c 1 2 ⁇ c 2 2
- C 2 - 1 ⁇ " ⁇ [LeftBracketingBar]” c 3 - c 4 - c 4 c 3 ⁇ " ⁇ [RightBracketingBar]” c 3 2 - c 2 2 , c i ⁇ R , c 3 2 ⁇ c 4 2 .
- D ⁇ " ⁇ [LeftBracketingBar]” d 1 d 2 d 3 d 4 ⁇ " ⁇ [RightBracketingBar]”
- H ⁇ " ⁇ [LeftBracketingBar]” h 1 h 2 h 3 h 4 ⁇ " ⁇ [RightBracketingBar]” , d i , h i ⁇ R , d 1 ⁇ d 4 ⁇ d 2 ⁇ d 3 , h 1 ⁇ h 4 ⁇ h 2 ⁇ h 3 ,
- D - 1 ⁇ " ⁇ [LeftBracketingBar]” d 1 d 2 d 3 d 4 ⁇ " ⁇ [RightBracketingBar]” d 1 ⁇ d 4 - d 2 ⁇ d 3
- H - 1 ⁇ " ⁇ [LeftBracketingBar]” h 1 h 2 h 3 h 4 ⁇ " ⁇ [RightBracketingBar]” h 1 ⁇ h 4 - h 2 ⁇ h 3 .
- Bob also obtains the matrices M 5 , M 6 , M 7 and M 8 , defined as follows:
- M 5 ⁇ " ⁇ [LeftBracketingBar]” m 1 ( 5 ) m 2 ( 5 ) m 3 ( 5 ) m 4 ( 5 ) ⁇ " ⁇ [RightBracketingBar]”
- M 6 ⁇ " ⁇ [LeftBracketingBar]” m 1 ( 6 ) m 2 ( 6 ) m 3 ( 6 ) m 4 ( 6 ) ⁇ " ⁇ [RightBracketingBar]”
- M 7 ⁇ " ⁇ [LeftBracketingBar]” m 1 ( 7 ) m 2 ( 7 ) m 3 ( 7 ) m 4 ( 7 ) ⁇ " ⁇ [RightBracketingBar]”
- M 8 ⁇ " ⁇ [LeftBracketingBar]” m 1 ( 8 ) m 2 ( 8 ) m 3 ( 8 ) m 4 ( 8 ) ⁇ " ⁇ [RightBracketingBar]”
- M 8 ⁇ " ⁇ [LeftBracketingBar]” m
- the process includes Alice generating a uniformly distributed random matrix G, as follows:
- G ⁇ " ⁇ [LeftBracketingBar]” g 1 g 2 g 3 g 4 ⁇ " ⁇ [RightBracketingBar]” , g i ⁇ R .
- the process also includes Alice multiplying both the matrices M 5 , M 6 , M 7 and M 8 with the inverse matrices which are known to her, A 1 ⁇ 1 , A 2 ⁇ 1 , B 1 ⁇ 1 and B 2 ⁇ 1 , respectively, as follows:
- the process includes Alice sending three publicly visible values to Bob, including (m 1 (9) , m 2 (9) , m 3 (9) ).
- Alice also sends four publicly visible values to Ed (m 1 (6) ,m 2 (6) ,m 3 (6) ,m 4 (6) ) of the matrix M 10 , defined as:
- M 10 ⁇ " ⁇ [LeftBracketingBar]” m 1 ( 10 ) m 2 ( 10 ) m 3 ( 10 ) m 4 ( 10 ) ⁇ " ⁇ [RightBracketingBar]” ,
- Ed receives the matrix M6 from Alice.
- Ed sends to Bob the matrix M 11 using the inverse matrix (N A ) ⁇ 1 and the matrix N B as follows:
- the process includes Bob receiving the matrix M 11 from Ed and obtaining the matrix G using the inverse matrix (N B ) ⁇ 1 , as follows:
- Bob also receives the matrix M 9 from Alice at step 410 .
- inverse matrices G ⁇ 1 , D ⁇ 1 , and H ⁇ 1 which are known to Bob, he can restore the key X from the received matrix M 5 as follows:
- the embodiments described herein can be implemented by either a method or process or as a system or device.
- the method can be performed using any suitable computing device, and the system can be embodied as any suitable computing device.
- the computing device can include at least one processing system, for example, having one or more processors and memories electrically and communicatively coupled together using a local interface.
- the local interface can be embodied as a data bus with an accompanying address/control bus or other addressing, control, and/or command lines.
- the memory can store data and software or executable code components executable by the processor.
- the memory can store executable-code components associated with cryptographic operations for execution by the processor.
- the software or executable-code components can be developed using or embodied in various programming languages, such as, for example, C, C++, C#, Objective C, JAVA®, JAVASCRIPT®, Perl, PHP, VISUAL BASIC®, PYTHON®, RUBY, FLASH®, or other programming languages.
- executable or “for execution” refer to software forms that can ultimately be run or executed by a processor, whether in source, object, machine, or other form.
- executable programs include, for example, a compiled program that can be translated into a machine code format and loaded into a random access portion of memory and executed by a processor, source code that can be expressed in an object code format and loaded into a random access portion of the memory and executed by the processor, or source code that can be interpreted by another executable program to generate instructions in a random access portion of the memory and executed by the processor, etc.
- An executable program can be stored in any portion or component of the memory including, for example, a random access memory (RAM), read-only memory (ROM), magnetic or other hard disk drive, solid-state, semiconductor, or similar drive, universal serial bus (USB) flash drive, memory card, optical disc (e.g., compact disc (CD)) or digital versatile disc (DVD)), floppy disk, magnetic tape, or other memory component.
- RAM random access memory
- ROM read-only memory
- magnetic or other hard disk drive solid-state, semiconductor, or similar drive
- USB universal serial bus
- memory card e.g., compact disc (CD)) or digital versatile disc (DVD)
- CD compact disc
- DVD digital versatile disc
- FIGS. 2 and 5 illustrate a certain order, it is understood that the order can differ from that which is depicted. For example, an order of execution of two or more blocks can be scrambled relative to the order shown. Also, two or more blocks shown in succession can be executed concurrently or with partial concurrence. Further, in some embodiments, one or more of the blocks can be skipped or omitted. In addition, any number of counters, state variables, warning semaphores, or messages might be added to the logical flow described herein, for purposes of enhanced utility, accounting, performance measurement, or providing troubleshooting aids, etc. It is understood that all such variations are within the scope of the present disclosure.
- any algorithm, method, process, or logic described herein that are embodied, at least in part, by software or executable-code components can be embodied or stored in any tangible or non-transitory computer-readable medium or device for execution by an instruction execution system such as a general purpose processor.
- the logic can be embodied as, for example, software or executable-code components that can be fetched from the computer-readable medium and executed by the instruction execution system.
- the instruction execution system can be directed by execution of the instructions to perform certain processes such as those illustrated in FIG. 2 .
- a “computer-readable medium” can be any tangible medium that can contain, store, or maintain any logic, application, software, or executable-code component described herein for use by or in connection with an instruction execution system.
- the computer-readable medium can include any physical media such as, for example, magnetic, optical, or semiconductor media. More specific examples of suitable computer-readable media include, but are not limited to, magnetic tapes, magnetic floppy diskettes, magnetic hard drives, memory cards, solid-state drives, USB flash drives, or optical discs. Also, the computer-readable medium can include a RAM including, for example, an SRAM, DRAM, or MRAM. In addition, the computer-readable medium can include a ROM, a PROM, an EPROM, an EEPROM, or other similar memory device.
- Disjunctive language such as the phrase “at least one of X, Y, or Z,” unless specifically stated otherwise, is to be understood with the context as used in general to present that an item, term, etc., can be either X, Y, or Z, or any combination thereof (e.g., X, Y, and/or Z). Thus, such disjunctive language is not generally intended to, and should not, imply that certain embodiments require at least one of X, at least one of Y, or at least one of Z to be each present.
Landscapes
- Engineering & Computer Science (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Computer Security & Cryptography (AREA)
- Pure & Applied Mathematics (AREA)
- Mathematical Physics (AREA)
- Physics & Mathematics (AREA)
- Mathematical Optimization (AREA)
- Computing Systems (AREA)
- Theoretical Computer Science (AREA)
- Mathematical Analysis (AREA)
- General Physics & Mathematics (AREA)
- Algebra (AREA)
- Storage Device Security (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
Abstract
Description
- This application claims priority to PCT Application No. PCT/US2019/041871, filed on Jul. 15, 2019, and titled “SECRET MATERIAL EXCHANGE AND AUTHENTICATION CRYPTOGRAPHY OPERATIONS,” which is hereby incorporated by reference in its entirety for all purposes.
- Cryptography is related to the study of protocols, techniques, and approaches that prevent third parties from accessing, reading, and/or interpreting secret data. Cryptography can be applied to various processes in information security, such as data integrity and encryption, confidentiality, authentication, verification, and non-repudiation. Thus, cryptography has several applications in various fields, including data encryption and privacy, computer network communications and transaction processing, and computing system security and integrity.
- Modern cryptography often relies upon computational hardness in mathematical theory. In other words, it might be theoretically possible to break certain cryptographic systems, but the time required to do so makes such cryptographic-defeating processes intractable. Typically, computationally-secure cryptography processes are preferable to those which are easier to defeat. At the same time, however, computationally-secure cryptography processes might be more computationally-intensive to implement and, thus, more time consuming and costly. In that context, although some cryptographic processes, such as a one time pad, cannot be broken or defeated even with unlimited computing power, those schemes are more difficult to implement than a good, theoretically-breakable but computationally secure approach. As such, modern computing devices may exchange secret data using cryptographic processes having security problems (e.g., the processes are susceptible to brute force attack). At the same time, those cryptographic processes may be resource intensive (e.g., the processes are computationally-intensive to implement).
- Many aspects of the present disclosure can be better understood with reference to the following drawings. The components in the drawings are not necessarily to scale, with emphasis instead being placed upon clearly illustrating the principles of the disclosure. Moreover, in the drawings, like reference numerals designate corresponding parts throughout the several views.
-
FIG. 1 illustrates a process of secret text transfer using asymmetric keys. -
FIG. 2 illustrates a representative process of secret key transfer using cryptography processes according to various embodiments described herein. -
FIG. 3A illustrates an example distribution function of variables resulting from the white noise associative cryptography key operations according to various embodiments described herein. -
FIG. 3B illustrates example probability distribution functions of variables resulting from the white noise associative cryptography key operations according to various embodiments described herein. -
FIG. 4 illustrates example user interfaces of a program to perform cryptography key operations according to various embodiments described herein. -
FIG. 5 illustrates a more particular example of a secret key transfer process according to the concepts described herein. -
FIG. 6 illustrates an example of a secret key transfer process using authentication according to the concepts described herein. - As noted above, cryptography is related to the study of protocols, techniques, and approaches that prevent third parties from accessing, reading, and/or interpreting secret data. In the context of cryptography, the Rivest-Shamir-Adleman (RSA) cryptosystem, elliptic curve cryptography (ECC) cryptosystem, and other asymmetrical (and symmetrical) methods of secure key exchange have security problems. Those cryptosystems are based on complexity and can, theoretically, be decrypted.
- In contrast to the RSA, ECC, and other cryptosystems, the cryptographic processes described herein is more immune to cryptanalysis and permits the sharing of secret data, such as symmetric keys and other secret data, over public networks. The cryptographic system can also be used for authentication. No known methods of traditional or quantum computing can be used to circumvent the cryptographic approaches described herein. The cryptographic system described herein was developed to achieve a number of goals including (1) securely exchanging cryptographic keys over public networks, (2) information ciphering, authentication, and (4) encryption for public networks that is secure against standard and quantum computing.
- In the context described herein, white noise can be defined as (or can include) a sequence of independent random variables (e.g., discrete numbers) with a uniform probability distribution. Polynomial white noise can be defined as (or can include) a sequence of polynomial function values composed by independent random variables (e.g., discrete numbers) with a uniform probability distribution.
- No known algorithm can decrypt the operations described herein due, at least in part, to the use of white noise randomization. The unknown independent variables appear to third parties as random white noise and, thus, there is no correlation between those variables and any information being transferred. As one example, the key exchange method or process described herein can be shown as an exchange of matrices with a corresponding number of different unknown independent variables and visible values. The number of unknown independent variables always exceeds the number of visible independent values in any combination of subsets of matrices. Further, the number of unknown variables exceeds the number of publically visible polynomial functions. Additionally, no inverse polynomial functions can be determined without information about the secret key—even if the plain text of the secret key is known by a third party.
- Turning to the drawings,
FIG. 1 illustrates a process of secret text transfer using asymmetric keys. In the example shown inFIG. 1 , Alice wishes to communicate secret text to Bob over a public network, such as the Internet, and Eve is the eavesdropper. To communicate the secret text, which can be a symmetric key or any other secret information, Alice and Bob use asymmetric cryptography. Asymmetric cryptography relies upon a key pair including a public key that can be disseminated to third parties (e.g., Alice) and a private key which is kept private (e.g., by Bob). In an asymmetric cryptography system, any person can encrypt a message using the public key, and that encrypted message can only be decrypted using the private key. The strength of asymmetric cryptography relies on the degree of difficulty (e.g., computational impracticality) for a private key to be determined from its associated public key. Asymmetric cryptography also depends on keeping the private key private. - Referring back to
FIG. 1 , Alice obtains a copy of a public key from Bob (or any other source). Alice encrypts the secret text using the public key to produce the encrypted secret text and communicates it to Bob over the public network. Bob then decrypts the encrypted secret text using the private key to obtain the secret key. Over the public network, Eve can only see the encrypted secret text. Even if Eve obtains a copy of the encrypted secret text and the public key used to create it, Eve cannot obtain the secret text from the encrypted secret text using the public key. Instead, only the private key, which is securely held and protected by Bob, can be used to decrypt the encrypted secret text to obtain the secret text from Alice. - There are drawbacks and limitations to using asymmetric cryptography. For example, it is algorithmically possible to estimate (or determine) the private key in a key pair from the publicly available public key. Additionally, asymmetric key pairs are relatively difficult and time consuming to create, typically depending upon the identification of large prime numbers. Further, asymmetric cryptography can be vulnerable in that it may produce the same predictable encrypted output when the same secret text is encrypted.
- To be distinguished from other cryptographic systems, various cryptography processes or operations are described herein. In one embodiment, a first cryptographic function is applied to secret data. The first cryptographic function operates as a type of cryptographic key and encrypts or ciphers the secret data to produce a first encrypted result. The first encrypted result can be securely transmitted by a first device to a second device. The second device then applies a second cryptographic function to the first encrypted result. Similar to the first cryptographic function, the second cryptographic function operates as a cryptographic key and further (or doubly) encrypts or ciphers the first encrypted result to produce a second (or doubly) encrypted result. At this point, the secret data has been encrypted by two different cryptographic functions, each of them being sufficient to secure the secret data. The two different cryptographic functions can then be inversed or removed, in any order, to reveal the secret data.
- Turning to the embodiments,
FIG. 2 illustrates arepresentative process 20 of secret key transfer using cryptography processes according to various embodiments described herein. The process described below can be performed by any suitable computing device(s) including a processor and memory, without limitation. In the example shown inFIG. 2 , Alice wants to securely pass the secret key Xto Bob over a public network. To do so, Alice should first encrypt the secret key X before sending it to Bob. - To encrypt the secret key X, Alice holds a first cryptographic function FA. In various embodiments, the cryptographic function FA can be embodied as any suitable mathematical function having an inverse which cannot be determined without knowledge of a certain set of parameters of the mathematical function. In one embodiment, the function FA can be embodied as a polynomial function or multivariate polynomial function defined in part by one or more variables, combinations of variables, combinations of variables at various powers, and coefficients. To undo or unlock (e.g., decrypt) the effect of the cryptographic function FA, Alice also holds a first inverse cryptographic function F−1A.
- To start, at
step 202, theprocess 20 includes Alice generating, with a first computing device, a first random lock XA. The first random lock XA can be embodied as an array or vector of random scalar integers, for example, or another suitable organized structure of random numbers. In theprocess 20, the first random lock XA can operate as a type of initialization vector upon which the cryptographic function FA is applied in combination with the secret key X. For example, the first random lock XA helps to randomize the application of the cryptographic function FA creating, in effect, a new random cryptographic function FA for each different random lock XA. In that context, the first random lock X4 helps to achieve semantic security, so that repeated usage of the cryptographic function FA with the same operand does not produce the same ciphered result and does not allow an attacker to infer any information. - At
step 204, theprocess 20 includes Alice applying, with the first computing device, the first cryptographic function FA to a combination of the secret key X and the first random lock XA to produce a first encrypted result R1. Here, Alice's secret key X, which can include letters, numbers, American Standard Code for Information Interchange (ASCII) characters, etc., is ciphered with random numbers (i.e., the first random lock XA) using the cryptographic operation or function FA. The cryptographic function FA can be embodied as any suitable mathematical function, such as a polynomial or multivariate polynomial function. For example, the cryptographic function FA can be embodied as a polynomial function F(CXk) of kth order written as: -
- where Ci . . . k are coefficients of the polynomial function F(CXk), and Xi . . . k are combinations of the operand X, which can include a combination of a random lock and secret data.
- Thus, at
step 204, Alice's secret key X, which may include letters, numbers, American Standard Code for Information Interchange (ASCII) characters, etc., are ciphered with random numbers based on the first random lock XA and the first cryptographic function FA. As an example, a distribution function of the variables in the results R1, R2, and R3 is shown inFIG. 3A , and probability distribution functions of the variables in the results R1, R2, and R3 is shown inFIG. 3B . - The structure of the polynomial function F(CXk) and the coefficients can be known to others (although they generally are not) from the formalization of the algorithm. However, even if the structure of the polynomial function F and values of the coefficients C, k are known to a third party, the third party still cannot decrypt the transferred information.
- At
step 206, theprocess 20 includes Alice transmitting, with the first computing device, the first encrypted result R1 to Bob's second computing device. Atstep 208, theprocess 20 includes Bob generating, with the second computing device, a second random lock XB. Similar to the first random lock XA, the second random lock XB can be embodied as an array or vector of random scalar integers, for example, or another suitable organized structure of random numbers. In theprocess 20, the second random lock XS can also operate as a type of initialization vector for the cryptographic function FB. For example, the second random lock XB helps to randomize the application of Bob's cryptographic function FB creating, in effect, a new random cryptographic function FB for each different random lock XB. In that context, the second random lock XB helps to achieve semantic security, so that repeated usage of the cryptographic function FB with the same operand does not produce the same ciphered result and does not allow an attacker to infer any information. - At
step 210, the process includes Bob applying, with the second computing device, Bob's cryptographic function FB to a combination of the first encrypted result R1 and the second random lock XB to produce a second encrypted result R2. Here, the first encrypted result R1 (e.g., FA(X,XA)) is (doubly) ciphered with random numbers (i.e., the second random lock XB) using the cryptographic operation or function FB. The cryptographic function FB can be embodied as any suitable mathematical function, such as a polynomial or multivariate polynomial function. For example, the cryptographic function FB can be embodied as a polynomial function F(CXk) of kth order according to that shown above in Equation (1). - At this point, Alice's secret key X has been encrypted or ciphered by two different cryptographic functions FA and FB, each of them being sufficient to secure the secret key X from others. The two different cryptographic functions can then be inversed or removed, in any order, to reveal the secret key X. In other words, to decrypt the secret key X from the second encrypted result R2 (i.e., to undo the effects of the cryptographic functions FA and Fa) it is possible to either apply the inverse F−1 A function to FA or the inverse F−1 B function to FB first. Thus, according to one aspect of associative cryptography key operations described herein, the order in which the second encrypted result R2 is applied to the inverse cryptographic functions F−1 A and F−1 B. does not impact the results of the decryption of secret key X from the second encrypted result R2. Further, any number of cryptographic functions to F1 . . . FN can be applied to encrypt secret data in any order to produce an encrypted result RN, and that encrypted result RN can be decrypted in any order using the inverse cryptographic functions F−1 1 . . . F−1 N.
- At
step 212, theprocess 20 includes Bob transmitting, with the second computing device, the second encrypted result R2 to the first computing device. Atstep 214, theprocess 20 includes Alice applying, with the first computing device, the first inverse cryptographic function F−1 A to the second encrypted result R2 to produce the result R3. The first inverse cryptographic function F−1 A unlocks or removes the effect of both the first random lock XA and the first cryptographic function FA. Thus, the result R3 is what remains of the second encrypted result R2 after the effect of the first random lock XA and the first cryptographic function FA are undone or unlocked (e.g., FB(X,XB)). Thus the result R3 is still encrypted, but only by Bob's second random lock XB and the second cryptographic function FB, and the result R3 can be securely transmitted over the public network. - At
step 216, theprocess 20 includes Alice transmitting, with the first computing device, the result R3 to the second computing device. Finally, atstep 218, theprocess 20 includes Bob applying, with the second computing device, the second inverse cryptographic function F−1 B to the result R3 to arrive at the secret key X. - At the end of the
process 20, the secret key X has been securely communicated from Alice to Bob. In contrast to the asymmetric key process described above with reference toFIG. 1 , key pairs are not used in theprocess 20. - The general idea embodied in the
process 20 is based on certain features of the publically unknown vectors X and the publically available (potentially visible) vectors R. Particularly, the number of variables “n” of the vectors X {x1, . . . , xn} is always more than the number of variables “m” of the vectors R={r1, . . . , rm}, i.e., n>m. Thus, there are no known algorithms which give a definite decryption solution of the secret key X, based only on visible values of the vectors R in the public networks. From this point of view, the method is cryptanalysis resistant. To obtain the only solution x1, . . . , xn from the values r1, . . . , rm of the polynomial functions FA and FB, the third party (e.g., outsider Eve) should have additional information about the structure of the random vectors XA and XB, which are available for Alice and Bob only. For instance, from x1+x2+x3=r1, it is not possible for a third party to arrive at a single solution for x1 with only the value of the variable r1 being publically visible, because the additional information about the values of the variables x2+x3 are not known. - A comparison of the features of asymmetrical methods and the method described herein is give in Table 1 below.
-
TABLE 1 Public-Private Key PWN Three Features Asymmetrical (RSA, ECC) Pass Method Numbers Prime Numbers Any Random Numbers Time to Develop Relatively More Costly Negligible New Key Processing Time Relatively More Costly Negligible Inverse Function From Relatively Complex Inverse Function Public Key Does Not Exist Third Party Defeat Possible Never Public Network Output Constant, predictable Random, For Constant Input unpredictable - An example of the use of the method described herein is provided below. Using the method, plain text (as a letter or ASCII code of 256 numbers) is represented in ciphered text by three corresponding random numbers r1, r2 and r3 which are calculated by a random generator. Table 2 shows an example of how the plain text “This is a plain text” appears in ciphered numbers.
-
TABLE 2 Plain text Ciphered text text r1 r2 r3 T 0.001251 0.563585 0.003585 h 0.193304 0.808741 0.158307 i 0.585009 0.479873 0.28051 s 0.350291 0.895962 0.313555 0.82284 0.746605 0.614412 i 0.174108 0.858943 0.151801 s 0.710501 0.513535 0.363394 0.303995 0.014985 0.006167 a 0.091403 0.364452 0.035009 0.147313 0.165899 0.02575 p 0.988525 0.445692 0.438709 1 0.119083 0.004669 0.001204 i a 0.00891 1 0.37788 0.005292 i 0.531663 0.571184 0.303183 n 0.601764 0.607166 0.363988 0.166234 0.663045 0.113037 t 0.450789 0.352123 0.159469 e 0.057039 0.607685 0.037377 x 0.783319 0.802606 0.623152 t 0.519883 0.30195 0.157851 - Uniform distribution is called “white noise” due to its informative features. For the letter ‘A’ (ASCII code 65), as one example, the random numbers may appear over the public net as r1=0.001251, r2=0.563585, r3=0.560746 or r1=0.585009, r2=0.479873, r3=0.105796 and every time the random variables r1, r2, r3 will be unpredictable. The correlation function between any two variables x and y is estimated as follows:
-
- The results of correlation function evaluation for pairs (r1, r2), (r2, r3) and (r1, r3) are given in Table 3 below.
-
TABLE 3 corr (r1, r2) corr (r2, r3) corr (r1, r3) −0.013927 −0.002873 −0.010771 - The correlation is negligibly small, which means that ciphered information is encapsulated into white noise and is not analyzable by a third party. There are no known algorithms to decrypt the ciphered information without the encryption key.
- In the approaches described herein, there are neither restrictions nor requirements on the encryption key number and length. All keys are equal in terms of crypt analysis resistance. Additionally, there are no correlations between the plain text and the ciphered random numbers (r1, r2, r3), as the combinations of them are unpredictable. There are no known algorithms which can decrypt ciphered random numbers (r1, r2, r3) into plain text without the key. There are no known algorithms which can recalculate the encryption key using visible ciphered random numbers (r1, r2, r3) and visible plain text. There is no need for rotation of encryption keys if a physical, completely unpredictable random number generator is used. The series repetition period of real random numbers (r1, r2, r3) is infinite.
- Computational time needed to encrypt and decrypt data by the method described herein is significantly smaller than commonly used algorithms. Since the method uses polynomial functions, the transaction of numbers (or ASCII) should be controlled by calculation procedures. The analysis of 25,600,000 transactions demonstrates that the final error of the secret key value estimate does not exceed 0.001%. This means that, for example, the transaction of the letter ‘A,’ which is represented by the integer number 65 (ASCII), after all transformations from client to server could be calculated to be a number about 64.9999 (and depends in part on the random generator variables during the transaction).
- A comparison of the features of a standard symmetrical method and the method described herein are given in Table 4 below.
-
TABLE 4 WNT One Pass Transaction Symmetrical (in combination with Three Features FIPS Pub 197 Pass Transaction) Encryption Key Rotation Must Have Not Needed Processing time Costly Negligible Security resistance and Strong relation No Relation key length Hack Costly Never (Potentially Impossible) Public net output for Constant, Random, Unpredictable constant input (without Predictable key rotation) - A computer program was developed to implement the method described herein. As shown in
FIG. 4 , Alice securely sends her secret text “Hello bob” to Bob using the three pass transaction. InFIG. 4 , random values appear to a third party during the three pass transaction (specially shown in the blue box). - Among other benefits, the processes described herein can be used to achieve unbreakable (or nearly unbreakable) encryption over wireless, wired, and public networks, and against quantum computing attacks. It requires relatively little processing power for encrypting and decrypting and, thus, can be used for rapid verification and transactions. A practically limitless number of new keys can be generated on the fly. Thus, the keys can be changed on every transaction. Encryption and decryption can also occur on individual devices due to the high speed of encryption and low processing requirements. Further, there is no single point of compromise because every individual party has their own key. If a key is compromised, it is the one compromised and can be renewed or replaced.
- An outline of various problems encountered and solutions that can be provided by the cryptographic systems described herein are given in Table 5 below.
-
TABLE 5 Problem Solution Establishing a secure and reliable Digital ID system in the cloud for ID for all transactions processing Ids ID system only used for registration and verification Information unhackable Having a secure payment system Payment system using ID that eliminates fraud Email, internet banking, wireless transaction Cryptocurrency that is secure Absolutely secure, stable, and and stable based on verifiable IDs Fast enough and secure trading Rapid trading and verification system for cryptocurrencies Trading exchanges connected to Exchange Mobile Payments Integrity over wireless signals and public net Transactions cannot be defrauded via screening or copying Key Management System Cloud key management service ID system to outsource all key management responsibilities People forget passwords and Pass eliminates the use of passwords are a weak point in passwords using ID center security -
FIG. 5 illustrates a more particular example of a secretkey transfer process 30 according to the concepts described herein. While an example using square matrices of a certain size is provided below, the concepts described herein can be extended to use with square matrices of any size. Further, although the example below is presented in certain cases as steps between “Alice” and “Bob,” the process is conducted by computing systems or devices. - At the outset, consider the key to be exchanged, K, as a sequence of m bytes, each including one of the ASCII codes from 0 to 255, as follows:
-
K={k 1 ,k 2 , . . . ,k m},0≤k i≤255. - For example, the key string “ABCD” can be presented as ASCII codes K={65, 66, 67, 68}. A sequence of real numbers X can then be defined as a transformation of the key numbers (i.e., k1, k2, km), which are integers, into real ones, as follows:
-
X=Φ(K),Φ:N m →R m and -
X={x 1 ,x 2 , . . . ,x m },x i ∈R. - The sequence of real numbers is put into set of second order square matrices, as follows:
-
- If the number of real key numbers is not multiple of four, the last matrix is not fully filled in. In this case, the rest of the matrix members can be generated and added as any random numbers without influencing the algorithm.
- Now, assume that Alice wants to pass the secret key K to Bob. For simplicity, however, consider one square matrix X, as follows:
-
- The matrix X decomposes into two singular matrices Z1 and Z2
-
- At
step 302, the process includes forming the matrix X as a singular matrix using a number of the real key numbers of the secret key K based on the following relationship x4=x2x3/x1. In that case, the inverse of matrix X, or X−1, does not exist (see properties of singular matrices and matrix determinants in APPENDIX). In that case, the matrix X represents a portion of the secret key K, {k1, k2, k3}. - As part of a first pass transaction, at
step 302, the process further includes generating a uniformly distributed random matrices Y1, Y2 and inverse matrices Y1 −1, Y2 −1, as follows: -
- At
step 302, the process also includes generating uniformly distributed random centrosymmetric A1, A2, B1, B2, and inverse A1 −1, A2 −1, B1 −1, B2 −1 matrices as follows: -
- Centrosymmetric square matrices A and B are always of the form AB=BA.
- At
step 304, the process includes Alice generating and sending matrices M1 and M2 to Bob, as follows: -
- which are generated according to the following calculations:
-
M 1 =Y 1 A 1, (3) -
M 2 =B 1 Y 1 −1 Z 1, (4) -
M 3 =Y 2 A 2, and (5) -
M 4 =B 2 Y 2 −1 Z 2, (6) - Thus, at
step 304, Alice sends to Bob fourteen publicly visible values (m1 (1), m2 (1), m3 (1), m4 (1), m1 (2), m2 (2), m3 (2), m1 (3), m2 (3), m3 (3), m4 (3), m1 (4), m2 (4), m3 (4)) of matrices M1, M2, M3 and M4 that are calculated from twenty-two independent unknown (for the third party) variables (a1, a2, a3, a4, b1, b2, b3, b4, y1, y2, y3, y4, y5, y6, y7, y8, z1, z2, z3, z4, z5, z6) known by Alice only, as follows: -
- The variable m4 (2) and m4 (4) of the singular matrices M2 and M2 are used as m4 (2)=m2 (2)m3 (2)/m1 (2) and m4 (2)=m2 (2)m3 (2)/m1 (2).
- As a second pass transaction, at
step 306, the process includes Bob receiving the M1 and M2 matrices from Alice. Atstep 306, the process includes generating uniformly distributed random centrosymmetric matrices C1, C2 and inverse C1 −1, C2 −1 matrices, as follows: -
- The process at
step 306 also includes generating uniformly distributed random matrices D and H, as follows: -
- The process at
step 306 also includes generating corresponding inverse matrices D−1 and H−1, as follows: -
- The process at
step 306 also includes generating the matrices M5, M6, M7 and M8, as follows: -
- as a result of the following calculations:
-
M 5 =DM 1 C 1 −1 =D 1 Y 1 A 1 C 1 −1, (7) -
M 6 =C 1 M 2 E=C 1 B 1 Y 1 −1 Z 1 E, (8) -
M 7 =E −1 M 3 C 2 −1 =E −1 YA 2 C 2 −1, and (9) -
M 8 =C 2 M 4 H=C 2 B 2 Y 2 −1 Z 2 H, (10) - At
step 308, the process includes Bob sending to Alice fourteen publicly visible values (m1 (5), m2 (5), m3 (5), m4 (5), m1 (6), m2 (6), m3 (6), m1 (7), m2 (7), m3 (7), m4 (7), m1 (8), m2 (8), m3 (8)) of matrices M3 and M4 that are calculated from sixteen independent unknown (for the third party) variables (c1, c2, c3, c4, d1, d2, d3, d4, e1, e2, e3, e4, h1, h2, h3, h4) which are known by Bob only, as follows: -
- and
- As a third pass transaction, at
step 310, the process includes Alice receiving from Bob the matrices M5, M6, M7 and M8 as follows: -
M 5 =DY 1 A 1 C 1 −1, -
M 6 =C 1 B 1 Y 1 −1 Z 1 E, -
M 7 =E −1 Y 2 A 2 C 2 −1, and -
M 8 =CBY −1 XH. - Note that centrosymmetric matrices satisfy the following conditions:
-
AC −1 =C −1 A and -
CB=BC, - meaning that the matrices M5, M6, M7, and M8 can be transformed into:
-
M 5 =DY 1 A 1 C 1 −1 =DY 1 C 1 −1 A 1, -
M 6 =C 1 B 1 Y 1 −1 Z 1 E=B 1 C 1 Y 1 −1 Z 1 E, -
M 7 =E −1 Y 2 A 2 C 2 −1 =E −1 Y 2 C 2 −1 A 2, and -
M 8 =C 2 B 2 Y 2 −1 Z 2 H=B 2 C 2 Y 2 −1 Z 2 H. - Thus, at
step 312, the process includes multiplying the matrices M5, M6, M7 and M8 with the known inverse matrices A1 −1, A2 −1, B1 −1 and B2 −1, respectively, as follows: -
M 5 A 1 −1 =DY 1 C 1 −1 A 1 A 1 −1 =DY 1 C 1 −1, -
B 1 −1 M 6 =B 1 −1 B 1 C 1 Y 1 −1 Z 1 E=C 1 Y 1 −1 Z 1 E, -
M 7 A 2 −1 =E −1 Y 2 C 2 −1 A 2 A 2 −1 =E −1 Y 2 C 2 −1, and -
B 2 −1 M 8 =B 2 −1 B 2 C 2 Y 2 −1 Z 2 H=C 2 Y 2 −1 Z 2 H. - Further, at
step 314, the process includes multiplying the results of those together to arrive at the matrix M5, as follows: -
- At
step 316, the process includes Alice sending the following three publicly visible values to Bob (m1 (9), m2 (9), m3 (9)), as follows: -
m 1 (9)=(d 1 x 1 +d 2 x 3)h 1+(d 1 x 2 +d 2 x 4)h 3, -
m 2 (9)=(d 1 x 1 +d 2 x 3)h 2+(d 1 x 2 +d 2 x 4)h 4, -
m 3 (9)=(d 3 x 1 +d 4 x 3)h 1+(d 3 x 2 +d 4 x 4)h 3, and -
m 4 (9) =m 3 (9) m 2 (9) /m 1 (9). - Thus, as part of the final key restoration at
step 316, Bob receives the matrix M9 from Alice, as follows: -
M 9 =DXH. - At
step 318, the process includes Bob restoring the key X from Alice by using inverse matrices D−1 and H−1, which are known to Bob, and the matrix M5, as follows: -
D −1 M 9 H −1 =D −1 DXHH −1 =X. - As shown in Table 6 below, the entire scheme of the key exchange process can be performed using an exchange of matrices with a corresponding number of different unknown independent variables (underlined in Table 6) and visible (by the third party) values (bolded in Table 6). This scheme demonstrates that the number of unknown independent variables always exceeds the number of visible independent values in any combination of subsets of matrices.
- This means that the system of nonlinear equations is an indeterminate system. There are no algorithms for the third party to obtain unknown independent variables including the secret key X using the visible independent values.
-
TABLE 6 Independent Variables Variables Values 1 Alice Y1A1 A1[2], Y1[4] 22 M1[4] 4 14 B1Y1 −1Z1 B1[2], Z1[3] M2[4] 3 Y2A2 A2[2], Y2[4] M3[4] 4 B2Y2 −1Z2 B2[2], Z2[3] M4[4] 3 2 Bob DY1A1C1 −1 D [4], C1[2] 16 M5[4] 4 14 C1B1Y1 −1 Z1E E [4] M6[4] 3 B−1Y2A2C2 −1 M7[4] 4 C2B2Y2 −1 Z2H C2[2], H [4] M8[4] 3 3 Alice DXH M9[3] 3 3 Total 38 31 - The direct restoration of the matrix X (using formula transformations of Eqs. 3-11 is also impossible. Note that the matrix X is singular. It leads to several features, which are used to perform the key exchange algorithm resistant against the third party decryption (see APPENDIX):
- The matrices M2, M4, M6, M8, and M9
-
M 2 =B 1 Y 1 −1 Z 1, -
M 4 =B 2 Y 2 −1 Z 2, -
M 6 =C 1 B 1 Y 1 −1 Z 1 E, -
M 8 =C 2 B 2 Y 2 −1 Z 2 H, and -
M 9 =DZ 1 Z 2 H - are also singular (due to the matrices Z1 and Z2 being singular).
- Thus, the equation M5L1M6M7L2M8=M9 (from the Eqs. 7-10) can not be resolved in regards to centrosymmetric matrices L1=A1 −1B1 −1 and L2=A2 −1B2 −1 by the third party as far as the matrix M9 is singular so, the direct calculation X=M1L1M2M3L2M4 is not possible.
- The concepts described herein can be used for other cryptographic operations, such as key exchanging using authentication.
FIG. 6 illustrates an example secret material or key exchanging process using authentication according to the concepts described herein. - As shown in
FIG. 6 , Alice wants to pass the secret key K to Bob. They use Ed as an independent party for authentication. In the transaction, the square singular matrix -
- is used to represent the key K={k1, k2, k3}, where x4=x2x3/x1.
- It is assumed that Alice and Bob both have passed the authentication procedure and both have got corresponding session numbers N1 A, N2 A and N1 B, N2 B from Ed according to the concepts described above.
- Alice and Bob form centrosymmetric matrices NA and NB correspondently, as follows:
-
- As part of a first pass transaction, at
step 402, theprocess 40 includes Alice generating uniformly distributed random matrices Y1, Y2 and inverse matrices Y1 −1, Y2 −1, as follows: -
- Alice also generates uniformly distributed random centrosymmetric matrices A and B, as follows:
-
- Note that any centrosymmetric square matrices A and B always have the following feature: AB=BA. At
step 404, the process includes Alice sending to Bob results as matrices M1 and M2, as follows: -
- of the following calculations:
-
M 1 =Y 1 A 1, (1B) -
M 2 =B 1 Y 1 −1 Z 1, (2B) -
M 3 =Y 2 A 2, and (3B) -
M 4 =B 2 Y 2 −1 Z 2. (4B) - As part of a second pass transaction, at
step 406, Bob receives M1 and M2 from Alice. Bob generates uniformly distributed random centrosymmetric matrices C1, C2 and inverse C1 −1, C2 −1 matrices, as follows: -
- and uniformly distributed random matrices D and H, as follows:
-
- and correspondent inverse matrices D−1 and H−1, as follows:
-
- At
step 406, Bob also obtains the matrices M5, M6, M7 and M8, defined as follows: -
- as a result of the following calculations:
-
M 5 =DM 1 C 1 −1 =D 1 Y 1 A 1 C 1 −1, (5B) -
M 6 =C 1 M 2 E=C 1 B 1 Y 1 −1 Z 1 E, (6B) -
M 7 =E −1 M 3 C 2 −1 =E −1 YA 2 C 2 −1, and (7B) -
M 8 =C 2 M 4 H=C 2 B 2 Y 2 −1 Z 2 H, (8B) - As part of a third pass transaction, at
step 408, the process includes Alice generating a uniformly distributed random matrix G, as follows: -
- Alice receives from Bob the matrices M5, M6, M7 and M8, as follows:
-
M 5 =DY 1 A 1 C 1 −1 =DY 1 C 1 −1 A 1, -
M 6 =C 1 B 1 Y 1 −1 Z 1 E=B 1 C 1 Y 1 −1 Z 1 E, -
M 7 =E −1 Y 2 A 2 C 2 −1 =E −1 Y 2 C 2 −1 A 2, and -
M 8 =C 2 B 2 Y 2 −1 Z 2 H=B 2 C 2 Y 2 −1 Z 2 H. - At
step 408, the process also includes Alice multiplying both the matrices M5, M6, M7 and M8 with the inverse matrices which are known to her, A1 −1, A2 −1, B1 −1 and B2 −1, respectively, as follows: -
- At
step 410, the process includes Alice sending three publicly visible values to Bob, including (m1 (9), m2 (9), m3 (9)). The matrix M9 is singular and m4 (9)=m3 (9)m2 (9)/m1 (9). Atstep 412, Alice also sends four publicly visible values to Ed (m1 (6),m2 (6),m3 (6),m4 (6)) of the matrix M10, defined as: -
- as a result of the following calculations:
-
M 10 −N A G. (9B) - For authentication, Ed receives the matrix M6 from Alice. At
step 414, Ed sends to Bob the matrix M11 using the inverse matrix (NA)−1 and the matrix NB as follows: -
M 11 =N B(N A)−1 N A G=N B G, -
M 11 =N B G. (10B). - As part of the final key restoration, at
step 416, the process includes Bob receiving the matrix M11 from Ed and obtaining the matrix G using the inverse matrix (NB)−1, as follows: -
G=(N B)−1 M 11=(N B)−1 N B G. - Bob also receives the matrix M9 from Alice at
step 410. Using inverse matrices G−1, D−1, and H−1, which are known to Bob, he can restore the key X from the received matrix M5 as follows: -
D −1 G −1 M 9 H −1 =D −1 G −1 GDXH H −1 =X. - The embodiments described herein can be implemented by either a method or process or as a system or device. The method can be performed using any suitable computing device, and the system can be embodied as any suitable computing device. The computing device can include at least one processing system, for example, having one or more processors and memories electrically and communicatively coupled together using a local interface. The local interface can be embodied as a data bus with an accompanying address/control bus or other addressing, control, and/or command lines.
- In various embodiments, the memory can store data and software or executable code components executable by the processor. For example, the memory can store executable-code components associated with cryptographic operations for execution by the processor. The software or executable-code components can be developed using or embodied in various programming languages, such as, for example, C, C++, C#, Objective C, JAVA®, JAVASCRIPT®, Perl, PHP, VISUAL BASIC®, PYTHON®, RUBY, FLASH®, or other programming languages.
- The embodiments can rely, in part, on executable instructions or instructions for execution by the computing device. The terms “executable” or “for execution” refer to software forms that can ultimately be run or executed by a processor, whether in source, object, machine, or other form. Examples of executable programs include, for example, a compiled program that can be translated into a machine code format and loaded into a random access portion of memory and executed by a processor, source code that can be expressed in an object code format and loaded into a random access portion of the memory and executed by the processor, or source code that can be interpreted by another executable program to generate instructions in a random access portion of the memory and executed by the processor, etc.
- An executable program can be stored in any portion or component of the memory including, for example, a random access memory (RAM), read-only memory (ROM), magnetic or other hard disk drive, solid-state, semiconductor, or similar drive, universal serial bus (USB) flash drive, memory card, optical disc (e.g., compact disc (CD)) or digital versatile disc (DVD)), floppy disk, magnetic tape, or other memory component.
- Although the process diagram shown in
FIGS. 2 and 5 illustrate a certain order, it is understood that the order can differ from that which is depicted. For example, an order of execution of two or more blocks can be scrambled relative to the order shown. Also, two or more blocks shown in succession can be executed concurrently or with partial concurrence. Further, in some embodiments, one or more of the blocks can be skipped or omitted. In addition, any number of counters, state variables, warning semaphores, or messages might be added to the logical flow described herein, for purposes of enhanced utility, accounting, performance measurement, or providing troubleshooting aids, etc. It is understood that all such variations are within the scope of the present disclosure. - Also, any algorithm, method, process, or logic described herein that are embodied, at least in part, by software or executable-code components, can be embodied or stored in any tangible or non-transitory computer-readable medium or device for execution by an instruction execution system such as a general purpose processor. In this sense, the logic can be embodied as, for example, software or executable-code components that can be fetched from the computer-readable medium and executed by the instruction execution system. Thus, the instruction execution system can be directed by execution of the instructions to perform certain processes such as those illustrated in
FIG. 2 . In the context of the present disclosure, a “computer-readable medium” can be any tangible medium that can contain, store, or maintain any logic, application, software, or executable-code component described herein for use by or in connection with an instruction execution system. - The computer-readable medium can include any physical media such as, for example, magnetic, optical, or semiconductor media. More specific examples of suitable computer-readable media include, but are not limited to, magnetic tapes, magnetic floppy diskettes, magnetic hard drives, memory cards, solid-state drives, USB flash drives, or optical discs. Also, the computer-readable medium can include a RAM including, for example, an SRAM, DRAM, or MRAM. In addition, the computer-readable medium can include a ROM, a PROM, an EPROM, an EEPROM, or other similar memory device.
- Disjunctive language, such as the phrase “at least one of X, Y, or Z,” unless specifically stated otherwise, is to be understood with the context as used in general to present that an item, term, etc., can be either X, Y, or Z, or any combination thereof (e.g., X, Y, and/or Z). Thus, such disjunctive language is not generally intended to, and should not, imply that certain embodiments require at least one of X, at least one of Y, or at least one of Z to be each present.
- It should be emphasized that the above-described embodiments of the present disclosure are merely possible examples of implementations set forth for a clear understanding of the principles of the disclosure. Many variations and modifications can be made to the above-described embodiment(s) without departing substantially from the spirit and principles of the disclosure. All such modifications and variations are intended to be included herein within the scope of this disclosure and protected by the following claims.
Claims (23)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US18/136,187 US20230254122A1 (en) | 2018-07-16 | 2023-04-18 | Secret material exchange and authentication cryptography operations |
Applications Claiming Priority (5)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US201862698644P | 2018-07-16 | 2018-07-16 | |
WOPCT/US2019/041871 | 2019-07-15 | ||
PCT/US2019/041871 WO2020018454A1 (en) | 2018-07-16 | 2019-07-15 | Cryptography operations for secure post-quantum communications |
US202017040949A | 2020-09-23 | 2020-09-23 | |
US18/136,187 US20230254122A1 (en) | 2018-07-16 | 2023-04-18 | Secret material exchange and authentication cryptography operations |
Related Parent Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US17/040,949 Division US11637694B2 (en) | 2018-07-16 | 2019-07-15 | Secret material exchange and authentication cryptography operations |
PCT/US2019/041871 Division WO2020018454A1 (en) | 2018-07-16 | 2019-07-15 | Cryptography operations for secure post-quantum communications |
Publications (1)
Publication Number | Publication Date |
---|---|
US20230254122A1 true US20230254122A1 (en) | 2023-08-10 |
Family
ID=67480417
Family Applications (4)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US17/040,949 Active 2039-08-25 US11637694B2 (en) | 2018-07-16 | 2019-07-15 | Secret material exchange and authentication cryptography operations |
US18/136,177 Pending US20230254121A1 (en) | 2018-07-16 | 2023-04-18 | Secret material exchange and authentication cryptography operations |
US18/136,164 Pending US20230254120A1 (en) | 2018-07-16 | 2023-04-18 | Secret material exchange and authentication cryptography operations |
US18/136,187 Pending US20230254122A1 (en) | 2018-07-16 | 2023-04-18 | Secret material exchange and authentication cryptography operations |
Family Applications Before (3)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US17/040,949 Active 2039-08-25 US11637694B2 (en) | 2018-07-16 | 2019-07-15 | Secret material exchange and authentication cryptography operations |
US18/136,177 Pending US20230254121A1 (en) | 2018-07-16 | 2023-04-18 | Secret material exchange and authentication cryptography operations |
US18/136,164 Pending US20230254120A1 (en) | 2018-07-16 | 2023-04-18 | Secret material exchange and authentication cryptography operations |
Country Status (2)
Country | Link |
---|---|
US (4) | US11637694B2 (en) |
WO (1) | WO2020018454A1 (en) |
Cited By (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US11902777B2 (en) | 2019-12-10 | 2024-02-13 | Winkk, Inc. | Method and apparatus for encryption key exchange with enhanced security through opti-encryption channel |
US11928194B2 (en) | 2019-12-10 | 2024-03-12 | Wiinkk, Inc. | Automated transparent login without saved credentials or passwords |
US11928193B2 (en) | 2019-12-10 | 2024-03-12 | Winkk, Inc. | Multi-factor authentication using behavior and machine learning |
US11936787B2 (en) | 2019-12-10 | 2024-03-19 | Winkk, Inc. | User identification proofing using a combination of user responses to system turing tests using biometric methods |
US11934514B2 (en) | 2019-12-10 | 2024-03-19 | Winkk, Inc. | Automated ID proofing using a random multitude of real-time behavioral biometric samplings |
US12058127B2 (en) | 2019-12-10 | 2024-08-06 | Winkk, Inc. | Security platform architecture |
US12067107B2 (en) | 2019-12-10 | 2024-08-20 | Winkk, Inc. | Device handoff identification proofing using behavioral analytics |
US12073378B2 (en) | 2019-12-10 | 2024-08-27 | Winkk, Inc. | Method and apparatus for electronic transactions using personal computing devices and proxy services |
US12095751B2 (en) | 2021-06-04 | 2024-09-17 | Winkk, Inc. | Encryption for one-way data stream |
US12132763B2 (en) | 2019-12-10 | 2024-10-29 | Winkk, Inc. | Bus for aggregated trust framework |
US12143419B2 (en) | 2021-06-04 | 2024-11-12 | Winkk, Inc. | Aggregated trust framework |
Citations (21)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20020114454A1 (en) * | 2000-12-21 | 2002-08-22 | Hamilton Jon W. | Method and system for trusted digital camera |
US20020131592A1 (en) * | 2001-03-16 | 2002-09-19 | Harris Hinnant | Entropy sources for encryption key generation |
US20030021416A1 (en) * | 2001-07-26 | 2003-01-30 | International Business Machines Corporation | Encrypting a messaging session with a symmetric key |
US20030147267A1 (en) * | 2002-02-02 | 2003-08-07 | F-Secure Oyi | Method and apparatus for encrypting data |
US20040223616A1 (en) * | 2003-04-07 | 2004-11-11 | Stmicroelectronics S.R.I. | Encryption process employing chaotic maps and digital signature process |
US20050147240A1 (en) * | 2004-01-05 | 2005-07-07 | Rakesh Agrawal | System and method for order-preserving encryption for numeric data |
US20110167255A1 (en) * | 2008-09-15 | 2011-07-07 | Ben Matzkel | System, apparatus and method for encryption and decryption of data transmitted over a network |
US20110194694A1 (en) * | 2005-01-18 | 2011-08-11 | Certicom Corp. | Accelerated Verification of Digital Signatures and Public Keys |
US20110231673A1 (en) * | 2010-03-18 | 2011-09-22 | Lsi Corporation | Cryptographic processing using a processor |
US20130202104A1 (en) * | 2010-12-01 | 2013-08-08 | King Fahd University Of Petroleum And Minerals | Xz-elliptic curve cryptography system and method |
US20140108803A1 (en) * | 2009-12-11 | 2014-04-17 | Thomas H. Probert | Steganographic messaging system using code invariants |
US20170048062A1 (en) * | 2015-07-09 | 2017-02-16 | Nxp B.V. | Methods for facilitating secure communication |
US20170070340A1 (en) * | 2015-09-03 | 2017-03-09 | Cisco Technology, Inc. | Homomorphically-created symmetric key |
US20170295010A1 (en) * | 2014-10-14 | 2017-10-12 | Sony Corporation | Cipher processing apparatus, cipher processing method, and program |
US20190103957A1 (en) * | 2016-05-23 | 2019-04-04 | Sony Corporation | Encryption device, encryption method, decryption device and decryption method |
US20190149333A1 (en) * | 2017-11-15 | 2019-05-16 | International Business Machines Corporation | Methods and systems for supporting fairness in secure computations |
US10404458B1 (en) * | 2017-11-17 | 2019-09-03 | ISARA Corporation | Multi-round key encapsulation process |
US20190287427A1 (en) * | 2016-07-21 | 2019-09-19 | Koninklijke Philips N.V. | Device and method for performing obfuscated arithmetic |
US20190342092A1 (en) * | 2018-05-07 | 2019-11-07 | Cryptography Research, Inc. | Generating a key at a device based on a memory of the device |
US10958424B1 (en) * | 2017-11-02 | 2021-03-23 | Amazon Technologies, Inc. | Mechanism to allow third party to use a shared secret between two parties without revealing the secret |
US11038694B1 (en) * | 2016-08-24 | 2021-06-15 | Bruce Kleinman | Devices, methods, and systems for cryptographic authentication and provenance of physical assets |
Family Cites Families (120)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5987130A (en) * | 1997-03-31 | 1999-11-16 | Chang; Chung Nan | Simiplified secure swift cryptographic key exchange |
US6065120A (en) | 1997-12-09 | 2000-05-16 | Phone.Com, Inc. | Method and system for self-provisioning a rendezvous to ensure secure access to information in a database from multiple devices |
US7350228B2 (en) | 2001-01-23 | 2008-03-25 | Portauthority Technologies Inc. | Method for securing digital content |
US7181017B1 (en) | 2001-03-23 | 2007-02-20 | David Felsher | System and method for secure three-party communications |
JP3835207B2 (en) | 2001-06-27 | 2006-10-18 | ソニー株式会社 | Try-on image providing system, try-on image providing method, try-on image generating apparatus, and try-on image generating method |
US7844717B2 (en) | 2003-07-18 | 2010-11-30 | Herz Frederick S M | Use of proxy servers and pseudonymous transactions to maintain individual's privacy in the competitive business of maintaining personal history databases |
US7533817B2 (en) | 2004-08-09 | 2009-05-19 | Konica Minolta Systems Laboratory, Inc. | Color barcode producing method and apparatus, color barcode reading method and apparatus and color barcode reproducing method and apparatus |
GB0420409D0 (en) | 2004-09-14 | 2004-10-20 | Waterleaf Ltd | Online commercial transaction system and method of operation thereof |
WO2006089247A2 (en) | 2005-02-16 | 2006-08-24 | Pisafe, Inc. | Method and system for creating and using redundant and high capacity barcodes |
US7992102B1 (en) | 2007-08-03 | 2011-08-02 | Incandescent Inc. | Graphical user interface with circumferentially displayed search results |
JP4350714B2 (en) | 2006-02-27 | 2009-10-21 | 株式会社東芝 | Transmission device, reception device, and transmission method |
FR2899702A1 (en) * | 2006-04-10 | 2007-10-12 | France Telecom | METHOD AND DEVICE FOR GENERATING A PSEUDO-RANDOM SUITE |
US7552467B2 (en) | 2006-04-24 | 2009-06-23 | Jeffrey Dean Lindsay | Security systems for protecting an asset |
US8214635B2 (en) | 2006-11-28 | 2012-07-03 | Cisco Technology, Inc. | Transparent proxy of encrypted sessions |
US7873710B2 (en) | 2007-02-06 | 2011-01-18 | 5O9, Inc. | Contextual data communication platform |
JP4869981B2 (en) | 2007-02-28 | 2012-02-08 | オリンパス株式会社 | IMAGING SYSTEM AND IMAGING DEVICE AUTHENTICATION METHOD |
US8363259B2 (en) | 2008-05-24 | 2013-01-29 | Activiews Ltd. | Method for producing printed patches for optical and high-contrast guidance |
US20090307140A1 (en) | 2008-06-06 | 2009-12-10 | Upendra Mardikar | Mobile device over-the-air (ota) registration and point-of-sale (pos) payment |
USD607009S1 (en) | 2008-06-25 | 2009-12-29 | BeeRaider Limited | Display panel with graphical user interface |
USD614192S1 (en) | 2008-07-22 | 2010-04-20 | Hitachi High-Technologies Corporation | Graphical user interface for a computer display |
KR100952953B1 (en) | 2008-09-10 | 2010-04-15 | 주식회사 에이프로테크놀로지 | Window of infrared light surveillance camera |
KR101604596B1 (en) * | 2008-09-19 | 2016-03-18 | 코닌클리케 필립스 엔.브이. | A method for secure communication in a network, a communication device, a network and a computer program therefor |
KR100910378B1 (en) | 2008-10-06 | 2009-08-04 | 주식회사 오엘콥스 | System and method for issuing electronically accredited certificate using encrypted image |
US8761809B2 (en) | 2009-11-25 | 2014-06-24 | Visa International Services Association | Transaction using a mobile device with an accelerometer |
US8215565B2 (en) | 2010-03-28 | 2012-07-10 | Christopher Brett Howard | Apparatus and method for securement of two-dimensional bar codes with geometric symbology |
US9602277B2 (en) | 2010-06-07 | 2017-03-21 | Protected Mobilty, Llc | User interface systems and methods for secure message oriented communications |
IL207918A0 (en) * | 2010-09-01 | 2011-01-31 | Aviad Kipnis | Attack-resistant multivariate signature scheme |
US8494961B1 (en) | 2010-10-14 | 2013-07-23 | Jpmorgan Chase Bank, N.A. | Image authentication and security system and method |
US10042993B2 (en) | 2010-11-02 | 2018-08-07 | Homayoon Beigi | Access control through multifactor authentication with multimodal biometrics |
US8346217B2 (en) | 2011-02-21 | 2013-01-01 | Knowledge Solutions, LLC | Systems, methods and apparatus for controlling access to mobile devices |
CN204965434U (en) | 2011-02-25 | 2016-01-13 | 威斯科数据安全国际有限公司 | A strong authentication token for generating safe value of developments |
US9027075B2 (en) | 2011-09-29 | 2015-05-05 | Oracle International Corporation | Enforcing security rules at runtime |
US8621209B1 (en) | 2011-10-19 | 2013-12-31 | Amazon Technologies, Inc. | Confidence-based authentication |
US8943320B2 (en) | 2011-10-31 | 2015-01-27 | Novell, Inc. | Techniques for authentication via a mobile device |
CA2859794A1 (en) | 2011-12-22 | 2013-06-27 | Abbvie Inc. | Application security framework |
US9910969B2 (en) | 2012-04-06 | 2018-03-06 | Wayne Odom | System, method, and device for delivering communications and storing and delivering data |
US20140002481A1 (en) * | 2012-06-27 | 2014-01-02 | Sharp Kabushiki Kaisha | Method for converting data, display device, computing device and program incorporating same, and method for optimising coefficients and device and program incorporating same |
US9390245B2 (en) | 2012-08-02 | 2016-07-12 | Microsoft Technology Licensing, Llc | Using the ability to speak as a human interactive proof |
CN104662864B (en) | 2012-08-03 | 2018-03-09 | 威斯科数据安全国际有限公司 | The convenient authentication method of user and device that mobile authentication is applied are used |
USD723050S1 (en) | 2012-08-06 | 2015-02-24 | Samsung Electronics Co., Ltd. | TV receiver displaying GI and GUI |
US8543834B1 (en) | 2012-09-10 | 2013-09-24 | Google Inc. | Voice authentication and command |
US20150278805A1 (en) | 2012-10-01 | 2015-10-01 | Acuity Systems, Inc. | Authentication system |
USD719176S1 (en) | 2012-12-27 | 2014-12-09 | Jason M. Cohen | Display screen or portion thereof with graphical user interface |
USD719177S1 (en) | 2012-12-27 | 2014-12-09 | Jason M. Cohen | Display screen or portion thereof with graphical user interface |
US9219732B2 (en) | 2012-12-28 | 2015-12-22 | Nok Nok Labs, Inc. | System and method for processing random challenges within an authentication framework |
US9706406B1 (en) | 2013-01-22 | 2017-07-11 | Amazon Technologies, Inc. | Security measures for an electronic device |
US20140244514A1 (en) | 2013-02-26 | 2014-08-28 | Digimarc Corporation | Methods and arrangements for smartphone payments and transactions |
WO2014138530A2 (en) | 2013-03-08 | 2014-09-12 | Siemens Healthcare Diagnostics Inc. | Surface markings for an optically guided device |
US9110157B2 (en) | 2013-03-12 | 2015-08-18 | Intel Corporation | Using multiple sources of location-aid data to determine position information |
US9160730B2 (en) | 2013-03-15 | 2015-10-13 | Intel Corporation | Continuous authentication confidence module |
WO2014153420A1 (en) | 2013-03-19 | 2014-09-25 | Acuity Systems, Inc. | Authentication system |
US9319419B2 (en) | 2013-09-26 | 2016-04-19 | Wave Systems Corp. | Device identification scoring |
US9928839B1 (en) | 2013-12-04 | 2018-03-27 | United Services Automobile Association (Usaa) | Systems and methods for authentication using voice biometrics and device verification |
US10032008B2 (en) | 2014-02-23 | 2018-07-24 | Qualcomm Incorporated | Trust broker authentication method for mobile devices |
US20150242605A1 (en) | 2014-02-23 | 2015-08-27 | Qualcomm Incorporated | Continuous authentication with a mobile device |
KR102089513B1 (en) | 2014-03-19 | 2020-03-16 | 한국전자통신연구원 | Software Integrity Checking System Based on Mobile Storage and the Method of |
US10533714B2 (en) | 2014-05-10 | 2020-01-14 | VisionQuest Imaging, Inc. | External lighting cases for mobile digital camera devices |
KR102219476B1 (en) | 2014-05-14 | 2021-02-24 | 삼성전자주식회사 | A method for performing encryption of data and an apparatus therefor |
US9424417B2 (en) | 2014-06-04 | 2016-08-23 | Qualcomm Incorporated | Secure current movement indicator |
USD765669S1 (en) | 2014-06-10 | 2016-09-06 | Microsoft Corporation | Display screen with graphical user interface |
US9210156B1 (en) | 2014-06-16 | 2015-12-08 | Lexisnexis Risk Solutions Inc. | Systems and methods for multi-stage identity authentication |
US9788203B2 (en) | 2014-08-19 | 2017-10-10 | Zighra Inc. | System and method for implicit authentication |
US9684775B2 (en) | 2014-10-15 | 2017-06-20 | Qualcomm Incorporated | Methods and systems for using behavioral analysis towards efficient continuous authentication |
US10491573B2 (en) * | 2014-12-08 | 2019-11-26 | Telefonaktiebolaget Lm Ericsson (Publ) | Message processing for subscriber sessions which stretch over different network domains |
US9578024B2 (en) | 2014-12-18 | 2017-02-21 | Sri International | Continuous authentic of mobile device users |
US20160180078A1 (en) | 2014-12-23 | 2016-06-23 | Jasmeet Chhabra | Technologies for enhanced user authentication using advanced sensor monitoring |
US10292051B2 (en) | 2015-01-13 | 2019-05-14 | Collateral Opportunities, Llc | System and method for preventing unauthorized access to restricted computer systems |
US10979905B2 (en) | 2015-01-13 | 2021-04-13 | Collateral Opportunities, Llc | Using a wireless transmitter and receiver to prevent unauthorized access to restricted computer systems |
US9654978B2 (en) | 2015-02-03 | 2017-05-16 | Qualcomm Incorporated | Asset accessibility with continuous authentication for mobile devices |
US9858408B2 (en) | 2015-02-13 | 2018-01-02 | Yoti Holding Limited | Digital identity system |
US20160239649A1 (en) | 2015-02-13 | 2016-08-18 | Qualcomm Incorporated | Continuous authentication |
JP6363032B2 (en) * | 2015-02-26 | 2018-07-25 | 株式会社日立情報通信エンジニアリング | Key change direction control system and key change direction control method |
US9921976B2 (en) | 2015-03-25 | 2018-03-20 | Vera | Access files |
WO2016178081A1 (en) | 2015-05-01 | 2016-11-10 | Assa Abloy Ab | Method and apparatus for making a decision on a card |
US20160342873A1 (en) | 2015-05-05 | 2016-11-24 | Winkk, Inc. | Palette-based optical recognition code generators and decoders |
US20180114221A1 (en) | 2015-05-25 | 2018-04-26 | Isx Ip Ltd. | Secure payment |
US10091649B2 (en) | 2015-07-12 | 2018-10-02 | Qualcomm Incorporated | Network architecture and security with encrypted client device contexts |
US9946874B2 (en) | 2015-08-06 | 2018-04-17 | International Business Machines Corporation | Authenticating application legitimacy |
EP4354311A3 (en) | 2015-10-17 | 2024-05-22 | Banqu, Inc. | Blockchain-based identity and transaction platform |
US9392460B1 (en) | 2016-01-02 | 2016-07-12 | International Business Machines Corporation | Continuous user authentication tool for mobile device communications |
US10333909B2 (en) * | 2016-02-09 | 2019-06-25 | Conduent Business Services, Llc | Methods and systems for broadcasting targeted advertisements to mobile device |
US10412077B2 (en) | 2016-03-21 | 2019-09-10 | Ca, Inc. | Identity authentication migration between different authentication systems |
US10187394B2 (en) | 2016-03-31 | 2019-01-22 | Microsoft Technology Licensing, Llc | Personalized inferred authentication for virtual assistance |
US10200364B1 (en) | 2016-04-01 | 2019-02-05 | Wells Fargo Bank, N.A. | Enhanced secure authentication |
KR102549272B1 (en) | 2016-05-17 | 2023-06-30 | 한국전자통신연구원 | Method and Apparatus for Authenticated Key Exchange Using Password and Identity-based Signature |
USD813884S1 (en) | 2016-06-01 | 2018-03-27 | Innovation 360 Group AB | Display screen with graphical user interface |
US20170366514A1 (en) * | 2016-06-17 | 2017-12-21 | Lior Malka | Code obfuscation and associated objects |
USD800764S1 (en) | 2016-06-20 | 2017-10-24 | Caterpillar Inc. | Display screen or portion thereof with set of icons |
US10467624B2 (en) | 2016-06-29 | 2019-11-05 | Paypal, Inc. | Mobile devices enabling customer identity validation via central depository |
US10467394B2 (en) | 2016-07-11 | 2019-11-05 | International Business Machines Corporation | Pointing device biometrics for continuous user authentication |
US10769635B2 (en) | 2016-08-05 | 2020-09-08 | Nok Nok Labs, Inc. | Authentication techniques including speech and/or lip movement analysis |
WO2018049234A1 (en) | 2016-09-09 | 2018-03-15 | Trusona, Inc. | Systems and methods for distribution of selected authentication information for a network of devices |
US9961547B1 (en) | 2016-09-30 | 2018-05-01 | EMC IP Holding Company LLC | Continuous seamless mobile device authentication using a separate electronic wearable apparatus |
US11030618B1 (en) | 2016-09-30 | 2021-06-08 | Winkk, Inc. | Authentication and personal data sharing for partner services using out-of-band optical mark recognition |
USD847857S1 (en) | 2016-10-31 | 2019-05-07 | Agile Transformation, Inc. | Display screen or portion thereof with icon |
US20190386814A1 (en) * | 2016-11-07 | 2019-12-19 | Sherjil Ahmed | Systems and Methods for Implementing an Efficient, Scalable Homomorphic Transformation of Encrypted Data with Minimal Data Expansion and Improved Processing Efficiency |
FR3060165B1 (en) * | 2016-12-09 | 2019-05-24 | Commissariat A L'energie Atomique Et Aux Energies Alternatives | SECURE CLASSIFICATION METHOD USING TRANSCHIFFREMENT OPERATION |
BR112019017075A2 (en) | 2017-02-17 | 2020-04-28 | Equifax Inc | digital trust system, computer readable and computerized method |
US10810290B2 (en) | 2017-03-05 | 2020-10-20 | Ronald H Minter | Robust method and an apparatus for authenticating a client in non-face-to-face online interactions based on a combination of live biometrics, biographical data, blockchain transactions and signed digital certificates |
USD925602S1 (en) | 2017-03-31 | 2021-07-20 | Tencent Technology (Shenzhen) Company Limited | Portion of a display having a graphical user interface |
US10482055B2 (en) | 2017-05-10 | 2019-11-19 | Qualcomm Incorporated | Hardware event priority sensitive programmable transmit wait-window for virtual GPIO finite state machine |
JP6925907B2 (en) | 2017-08-09 | 2021-08-25 | オムロンヘルスケア株式会社 | Data transmitters, data receivers, methods and programs |
US10521223B1 (en) | 2017-08-22 | 2019-12-31 | Wells Fargo Bank, N.A. | Systems and methods of a metadata orchestrator augmenting application development |
US10812460B2 (en) | 2018-01-02 | 2020-10-20 | Bank Of America Corporation | Validation system utilizing dynamic authentication |
USD900838S1 (en) | 2018-02-13 | 2020-11-03 | Zap Surgical Systems, Inc. | Display screen or portion thereof with graphical user interface for a radiation treatment |
JP7407423B2 (en) | 2018-03-02 | 2024-01-04 | パナソニックIpマネジメント株式会社 | Device management system and device management method |
US11005839B1 (en) | 2018-03-11 | 2021-05-11 | Acceptto Corporation | System and method to identify abnormalities to continuously measure transaction risk |
WO2019202586A1 (en) * | 2018-04-17 | 2019-10-24 | B. G. Negev Technologies & Applications Ltd., At Ben-Gurion | One-round secure multiparty computation of arithmetic streams and evaluation of functions |
US11017100B2 (en) | 2018-08-03 | 2021-05-25 | Verizon Patent And Licensing Inc. | Identity fraud risk engine platform |
KR102130503B1 (en) | 2018-08-08 | 2020-07-06 | 엘지전자 주식회사 | Mobile terminal |
US10749876B2 (en) | 2018-08-09 | 2020-08-18 | Cyberark Software Ltd. | Adaptive and dynamic access control techniques for securely communicating devices |
CN112840326B (en) | 2018-12-03 | 2024-07-02 | 硕动力公司 | Test engine for automated operation management |
CN109635578B (en) | 2018-12-07 | 2020-11-10 | 上海交通大学 | Safe two-dimensional code communication method based on nonlinear space frequency characteristics |
US11070527B2 (en) | 2018-12-07 | 2021-07-20 | Intel Corporation | Securing platform link with encryption |
USD916890S1 (en) | 2018-12-31 | 2021-04-20 | Andritz Inc. | Display panel portion with a computer icon |
US11457019B2 (en) | 2019-05-08 | 2022-09-27 | International Business Machines Corporation | Access control authentication scheme based on continuous authentication |
USD928803S1 (en) | 2019-06-12 | 2021-08-24 | Perceptive Automata, Inc. | Display panel of a programmed computer system with a graphical user interface |
US11177946B2 (en) | 2019-06-21 | 2021-11-16 | Verizon Patent And Licensing Inc. | Quantum entropy distributed via software defined perimeter connections |
US11121878B2 (en) | 2019-10-11 | 2021-09-14 | Accenture Global Solutions Limited | Authentication using key distribution through segmented quantum computing environments |
US11540119B2 (en) | 2020-02-06 | 2022-12-27 | Wiliot, LTD. | System and method for providing secure and reliable communication over a low-energy wireless communication protocol |
-
2019
- 2019-07-15 WO PCT/US2019/041871 patent/WO2020018454A1/en active Application Filing
- 2019-07-15 US US17/040,949 patent/US11637694B2/en active Active
-
2023
- 2023-04-18 US US18/136,177 patent/US20230254121A1/en active Pending
- 2023-04-18 US US18/136,164 patent/US20230254120A1/en active Pending
- 2023-04-18 US US18/136,187 patent/US20230254122A1/en active Pending
Patent Citations (21)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20020114454A1 (en) * | 2000-12-21 | 2002-08-22 | Hamilton Jon W. | Method and system for trusted digital camera |
US20020131592A1 (en) * | 2001-03-16 | 2002-09-19 | Harris Hinnant | Entropy sources for encryption key generation |
US20030021416A1 (en) * | 2001-07-26 | 2003-01-30 | International Business Machines Corporation | Encrypting a messaging session with a symmetric key |
US20030147267A1 (en) * | 2002-02-02 | 2003-08-07 | F-Secure Oyi | Method and apparatus for encrypting data |
US20040223616A1 (en) * | 2003-04-07 | 2004-11-11 | Stmicroelectronics S.R.I. | Encryption process employing chaotic maps and digital signature process |
US20050147240A1 (en) * | 2004-01-05 | 2005-07-07 | Rakesh Agrawal | System and method for order-preserving encryption for numeric data |
US20110194694A1 (en) * | 2005-01-18 | 2011-08-11 | Certicom Corp. | Accelerated Verification of Digital Signatures and Public Keys |
US20110167255A1 (en) * | 2008-09-15 | 2011-07-07 | Ben Matzkel | System, apparatus and method for encryption and decryption of data transmitted over a network |
US20140108803A1 (en) * | 2009-12-11 | 2014-04-17 | Thomas H. Probert | Steganographic messaging system using code invariants |
US20110231673A1 (en) * | 2010-03-18 | 2011-09-22 | Lsi Corporation | Cryptographic processing using a processor |
US20130202104A1 (en) * | 2010-12-01 | 2013-08-08 | King Fahd University Of Petroleum And Minerals | Xz-elliptic curve cryptography system and method |
US20170295010A1 (en) * | 2014-10-14 | 2017-10-12 | Sony Corporation | Cipher processing apparatus, cipher processing method, and program |
US20170048062A1 (en) * | 2015-07-09 | 2017-02-16 | Nxp B.V. | Methods for facilitating secure communication |
US20170070340A1 (en) * | 2015-09-03 | 2017-03-09 | Cisco Technology, Inc. | Homomorphically-created symmetric key |
US20190103957A1 (en) * | 2016-05-23 | 2019-04-04 | Sony Corporation | Encryption device, encryption method, decryption device and decryption method |
US20190287427A1 (en) * | 2016-07-21 | 2019-09-19 | Koninklijke Philips N.V. | Device and method for performing obfuscated arithmetic |
US11038694B1 (en) * | 2016-08-24 | 2021-06-15 | Bruce Kleinman | Devices, methods, and systems for cryptographic authentication and provenance of physical assets |
US10958424B1 (en) * | 2017-11-02 | 2021-03-23 | Amazon Technologies, Inc. | Mechanism to allow third party to use a shared secret between two parties without revealing the secret |
US20190149333A1 (en) * | 2017-11-15 | 2019-05-16 | International Business Machines Corporation | Methods and systems for supporting fairness in secure computations |
US10404458B1 (en) * | 2017-11-17 | 2019-09-03 | ISARA Corporation | Multi-round key encapsulation process |
US20190342092A1 (en) * | 2018-05-07 | 2019-11-07 | Cryptography Research, Inc. | Generating a key at a device based on a memory of the device |
Cited By (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US11902777B2 (en) | 2019-12-10 | 2024-02-13 | Winkk, Inc. | Method and apparatus for encryption key exchange with enhanced security through opti-encryption channel |
US11928194B2 (en) | 2019-12-10 | 2024-03-12 | Wiinkk, Inc. | Automated transparent login without saved credentials or passwords |
US11928193B2 (en) | 2019-12-10 | 2024-03-12 | Winkk, Inc. | Multi-factor authentication using behavior and machine learning |
US11936787B2 (en) | 2019-12-10 | 2024-03-19 | Winkk, Inc. | User identification proofing using a combination of user responses to system turing tests using biometric methods |
US11934514B2 (en) | 2019-12-10 | 2024-03-19 | Winkk, Inc. | Automated ID proofing using a random multitude of real-time behavioral biometric samplings |
US12010511B2 (en) | 2019-12-10 | 2024-06-11 | Winkk, Inc. | Method and apparatus for encryption key exchange with enhanced security through opti-encryption channel |
US12058127B2 (en) | 2019-12-10 | 2024-08-06 | Winkk, Inc. | Security platform architecture |
US12067107B2 (en) | 2019-12-10 | 2024-08-20 | Winkk, Inc. | Device handoff identification proofing using behavioral analytics |
US12073378B2 (en) | 2019-12-10 | 2024-08-27 | Winkk, Inc. | Method and apparatus for electronic transactions using personal computing devices and proxy services |
US12132763B2 (en) | 2019-12-10 | 2024-10-29 | Winkk, Inc. | Bus for aggregated trust framework |
US12095751B2 (en) | 2021-06-04 | 2024-09-17 | Winkk, Inc. | Encryption for one-way data stream |
US12143419B2 (en) | 2021-06-04 | 2024-11-12 | Winkk, Inc. | Aggregated trust framework |
Also Published As
Publication number | Publication date |
---|---|
WO2020018454A1 (en) | 2020-01-23 |
US20230254120A1 (en) | 2023-08-10 |
US20210028929A1 (en) | 2021-01-28 |
US20230254121A1 (en) | 2023-08-10 |
US11637694B2 (en) | 2023-04-25 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20230254122A1 (en) | Secret material exchange and authentication cryptography operations | |
US20220094545A1 (en) | Low power encryption in motion | |
JP5562687B2 (en) | Securing communications sent by a first user to a second user | |
JP4216475B2 (en) | Cryptographic indexed key update method and device having leakage resistance | |
CN101032117B (en) | Method of authentication based on polynomials, system, and method for demonstration device | |
CN108292402A (en) | The determination of the public secret of secure exchange for information and level certainty key | |
US9648026B2 (en) | Cryptographic method for securely exchanging messages and device and system for implementing this method | |
CN109543434B (en) | Block chain information encryption method, decryption method, storage method and device | |
KR20020025630A (en) | The processing device of secret information, program or system thereof | |
CN113158143A (en) | Key management method and device based on block chain digital copyright protection system | |
EP2742644B1 (en) | Encryption and decryption method | |
CN105339995B (en) | Decrypt device, decryption capabilities provide device, its method and recording medium | |
CA2639649A1 (en) | Cryptography method and system | |
CN117708887B (en) | Longitudinal logistic regression-based federal learning model acquisition method and system | |
Alawatugoda | On the leakage-resilient key exchange | |
Wang | Public key cryptography standards: PKCS | |
Kavin et al. | A Novel M-Commerce Data Security Mechanism using Elliptic Curve Cryptography | |
Al-Adhami et al. | A 256 bit implementation of ECC-RFID based system using Shamir secret sharing scheme and Keccak hash function | |
Prakash et al. | ENHANCING SECURITY IN CRYPTOGRAPHIC SMART CARDS THROUGH ELLIPTIC CURVE CRYPTOGRAPHY AND OPTIMIZED MODIFIED MATRIX ENCODING ALGORITHMS. | |
Jain | Enhancing security in Tokenization using NGE for storage as a service | |
Sarma | An Asymmetric Key based Disk Encryption Scheme | |
Chhetri et al. | Crypto-System: A Modified Ceaser Cipher | |
Branstad et al. | Integrity and security standards based on cryptography | |
Devi et al. | Securing Shared Data Based on Homomorphic Encryption Schemes Check for updates | |
Chan et al. | A new credit card payment scheme using mobile phones based on visual cryptography |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: WINKK, INC., CALIFORNIA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:ISLAMOV, RUSTAM;REEL/FRAME:063366/0142 Effective date: 20200922 |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: DOCKETED NEW CASE - READY FOR EXAMINATION |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: NON FINAL ACTION MAILED |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: FINAL REJECTION MAILED |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: FINAL REJECTION MAILED |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: RESPONSE AFTER FINAL ACTION FORWARDED TO EXAMINER |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: ADVISORY ACTION MAILED |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: DOCKETED NEW CASE - READY FOR EXAMINATION |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: NON FINAL ACTION MAILED |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER |