首页> 外国专利> A COMPUTER SYSTEM IMPLEMENTED METHOD FOR GENERATING A SYMMETRIC ENCRYPTION KEY FOR ENCRYPTING AND DECRYPTING SECURE DATA

A COMPUTER SYSTEM IMPLEMENTED METHOD FOR GENERATING A SYMMETRIC ENCRYPTION KEY FOR ENCRYPTING AND DECRYPTING SECURE DATA

机译:生成用于加密和解密安全数据的对称加密密钥的计算机系统实现方法

摘要

#$%^&*AU2019101343A420191212.pdf#####ACOMPUTERSYSTEMIMPLEMENTEDMETHODFOR GENERATING A SYMMETRIC ENCRYPTION KEY FOR ENCRYPTING AND DECRYPTING SECURE DATA ABSTRACT Methods and apparatus implemented in a computer system, the methods and apparatus producing a symmetric encryption key termed a Cipherkey produced for protecting a computer system user's hidden data from unauthorised access by an intruder. The methods and apparatus receive a first input item being a user supplied secret termed the Secret, and a second input item termed Encrypted Random Data which is a sufficiently large mass of encrypted data bytes. The Secret can be a password comprised of alphanumeric text, a geometric shape input, biometric data, or more generally any item of unchanging information only known by or more generally insertable only by the valid user of a computer system. The second input item Encrypted Random Data shall be the encrypted transformation of a sufficiently large block of pseudo-random text, a big block of encrypted data stored and preserved in computer storage. After receiving a first input item, a Secret, a computer system performs a precise method of computation based on this input. In a first step the Secret is hashed in three different ways using three different one-way cryptographic hashing algorithms such as SHA-256, SHA-384 and SHA-512 so as to compute three different hash values identified by the terms Hash1, Hash2 and Hash3. In a second step, one of those three different hash values, Hash2, is transformed into a string of text that can be used as a file name identifier or signifier. In the third step, a computer system takes the file name identifier and searches a computer storage to find data with the corresponding file name. If corresponding data is found, a computer system will read the stored data corresponding to the file name and store this input in the memory of a computer system. This data found in storage in the third step is the second input item, the Encrypted Random Data. In a fourth step, the Encrypted Random Data is decrypted using the third hash value as a decryption key, the Hash3 value. The decrypted result of the fourth step is termed a Random Data object. In the fifth step, a computer system joins the bytes of data of the Hash1 value and the decrypted Random Data bytes into a single item of data called a Cipherkey source material. In the sixth step, this Cipherkey source material is hashed with a one-way cryptographic hashing algorithm to output a hash value result termed a Cipherkey, a hash value that can be used a symmetric encryption key for protecting a computer system user's hidden data.1 /13 START 101 OBTAIN USERS SECRET PASSWORD 103 APPLY AT LEAST ONE HASHING ALGORITHM TO HASH THE USERS SECRET PASSWORD AT LEAST ONE TIME CREATING AT LEAST 105 A FIRST HASH VALUE TERMED THE HASH1 PRODUCE A RANDOM DATA 107 ENCRYPTED AND DECRYPTED WITH HASHl PRODUCE CIPHERKEY SOURCE MATERIAL 109 CIPHERKEY SOURCE MATERIAL 111 HASHi VALUE DERIVED FROM USER'S PASSWORD 113 RANDOM DATA 115 APPLY HASHING ALGORITHM TO THE CIPHERKEY SOURCE MATERIAL 117 CREATING A SYMMETRIC KEY TERMED THE CIPHERKEY CIPHERKEY 119 USE CIPHERKEY TO DECRYPT A CONFIGURATION DATA FOR THE USER + 121 USER CONFIGURATION DATA 123 PROVIDE CRYPTOGRAPHIC FUNCTIONS TO THE USER 125 FIG. 1
机译:#$%^&* AU2019101343A420191212.pdf #####计算机系统实现方法为生成一个对称的加密密钥加密和解密安全数据抽象在计算机系统中实现的方法和装置,所述方法和装置产生对称加密密钥,称为Cipherkey,用于保护计算机系统用户的入侵者未经授权访问的隐藏数据。该方法和设备接收第一输入项目是用户提供的机密,称为机密,第二个输入项目是加密的随机数据,它是足够大的加密数据字节。秘密可以是密码由字母数字文本,几何形状输入,生物特征数据或更多组成通常,任何不变的信息项只能由已知,或者通常只能由插入计算机系统的有效用户。第二个输入项“加密随机数据”应为加密的足够大的伪随机文本块,加密的数据存储并保存在计算机存储中。收到第一个输入项“秘密”后,计算机系统根据此输入执行精确的计算方法。第一步使用三种不同的单向加密散列以三种不同的方式对秘密进行散列SHA-256,SHA-384和SHA-512等算法,以计算三个不同的哈希值由术语Hash1,Hash2和Hash3标识。第二步,这三个不同的哈希值之一值Hash2转换为文本字符串,可用作文件名标识符或指示符。第三步,计算机系统获取文件名标识符并搜索计算机存储以查找具有相应文件名的数据。如果找到相应的数据,则计算机系统将读取与文件名相对应的存储数据,并将此输入存储在计算机系统。第三步在存储中找到的数据是第二个输入项,即加密的随机数据。在第四步中,使用第三步对加密的随机数据进行解密哈希值作为解密密钥,即Hash3值。第四步的解密结果称为随机数据对象。在第五步中,计算机系统将Hash1值的数据字节合并以及将解密后的随机数据字节转换成称为Cipherkey源材料的单个数据项。在第六步中,此Cipherkey源材料使用单向加密散列进行散列用于输出称为Cipherkey的哈希值结果的算法,该哈希值可用于对称加密密钥,用于保护计算机系统用户的隐藏数据。1/13开始101获取用户秘密密码103至少采用一种哈希算法来哈希用户至少一次创建秘密密码,至少创建一次105哈希值第一个哈希值产生随机数据107加密和解密与哈希生产CIPHERKEY来源材料109CIPHERKEY来源材料111哈希值从用户密码113随机数据115将哈希算法应用于CIPHERKEY源材料117创建以密钥为中心的对称密钥密码键119使用CIP密钥为用户解密配置数据+ 121用户配置数据123向用户提供密码功能125图。 1个

著录项

  • 公开/公告号AU2019101343A4

    专利类型

  • 公开/公告日2019-12-12

    原文格式PDF

  • 申请/专利权人 MARK ANSON;

    申请/专利号AU20190101343

  • 发明设计人 ANSON MARK RODNEY;

    申请日2019-11-05

  • 分类号H04L9/14;G06F21/60;G06F21/62;G06F21/64;

  • 国家 AU

  • 入库时间 2022-08-21 11:12:05

相似文献

  • 专利
  • 外文文献
  • 中文文献
获取专利

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号