Instructional Leadership, emphasis: K-12 School Leadership (MEd)
Wires that are connected to a computer.

Generation of Keys with Variable Length from Cryptographic Tables


Description

The technology relates to the generation of keys with variable length (KVLs) that is in the same order of magnitude as the plain text to encrypt. Simple encryption methods such as exclusive or operation (XOR) can be used to securely encrypt plain text. In addition, the method is based on public keys exchanged freely through unsecured communication channels. The scheme is based on cryptographic tables that contain large quantities of random numbers. These tables are securely exchanged between the communicating parties, during a personalization protocol that occurs upfront. The public keys contain the information necessary to allow the communicating parties to independently generate the KVL from the shared cryptographic tables. The public keys can be changed as often as necessary and become single-use. The cryptographic tables can contain binary, ternary, or other multi-state data streams.

Additional information

Patent number and inventor

16/237,366

Bertrand Cambou

Potential applications

This technology is designed for use with cybersecurity and data encryption.

Benefits and advantages

The primary advantage of KVLs is to ease the secure generation of long keys. Encryption methods such as exclusive or operation (XOR)-employing KV are extremely secure, particularly when the length of the key is comparable to the length of the plain text to encrypt it. In addition, the method is low-cost, fast, and implementable with client devices having low computing power, such as the Internet of Things. The addressable public key (PKA) exchange scheme does not need the computing power of other public key infrastructure (PKI) protocols.

Case number and licensing status

2018-004

This invention is available for licensing.