PASSWORD SELF ENCRYPTION METHOD AND SYSTEM AND ENCRYPTION BY KEYS GENERATED FROM PERSONAL SECRET INFORMATION
First Claim
1. A method comprisingsubmitting a user identification for a user from a user computer to a server computer;
- receiving a set of information at the user computer, that is related to the user and useful for encryption from the server computer, andusing the set of information at the user computer in encrypting confidential information to form at least a cipher; and
submitting the cipher from the user computer to the server computer.
3 Assignments
0 Petitions
Accused Products
Abstract
A public key cryptographic system and method is provided for a password or any other predefined personal secret information that defeats key factoring and spoofing attacks. The method adopts a new technique of encrypting a password or any predefined secret information by a numeric function of itself, replacing the fixed public key of the conventional RSA encryption. The whole process involving key generation, encryption, decryption and password handling is discussed in detail. Mathematical and cryptanalytical proofs of defeating factoring and spoofing attacks are furnished.
49 Citations
17 Claims
-
1. A method comprising
submitting a user identification for a user from a user computer to a server computer; -
receiving a set of information at the user computer, that is related to the user and useful for encryption from the server computer, and using the set of information at the user computer in encrypting confidential information to form at least a cipher; and submitting the cipher from the user computer to the server computer. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17)
-
Specification