Generation of Keys with Variable Length from Cryptographic Tables
Description
The technology relates to the generation of keys with variable length (KVLs) that is in the same order of magnitude as the plain text to encrypt. Simple encryption methods such as exclusive or operation (XOR) can be used to securely encrypt plain text. In addition, the method is based on public keys exchanged freely through unsecured communication channels. The scheme is based on cryptographic tables that contain large quantities of random numbers. These tables are securely exchanged between the communicating parties, during a personalization protocol that occurs upfront. The public keys contain the information necessary to allow the communicating parties to independently generate the KVL from the shared cryptographic tables. The public keys can be changed as often as necessary and become single-use. The cryptographic tables can contain binary, ternary, or other multi-state data streams.
Additional information
Patent number and inventor
16/237,366
Bertrand Cambou
Potential applications
This technology is designed for use with cybersecurity and data encryption.
Benefits and advantages
The primary advantage of KVLs is to ease the secure generation of long keys. Encryption methods such as exclusive or operation (XOR)-employing KV are extremely secure, particularly when the length of the key is comparable to the length of the plain text to encrypt it. In addition, the method is low-cost, fast, and implementable with client devices having low computing power, such as the Internet of Things. The addressable public key (PKA) exchange scheme does not need the computing power of other public key infrastructure (PKI) protocols.
Case number and licensing status
2018-004
This invention is available for licensing.