Claims
- 1. A method for secure distribution of information over a network, comprising:
encrypting payload information using a first encryption key in a first data processor; sending said payload information encrypted using said first encryption key to a second data processor; encrypting said payload information encrypted using said first encryption key using a second encryption key in said second data processor; and sending said payload information encrypted using said first encryption key and said second encryption key to a third data processor, said first and said second keys being selected such that it is possible to generate therefrom a decryption key having the following properties:
a) the decryption key is usable to obtain said payload information from said information encrypted using said first and said second encryption keys, and b) the decryption key is unusable to retrieve either of said first or said second encryption keys, said decryption key being for sending for decryption at said third data processor.
- 2. The method of claim 1, comprising generating said decryption key, for obtaining said payload information at said third processing device.
- 3. The method of claim 1, further comprising generation of secret information and wherein said payload information is generated from said secret information.
- 4. The method of claim 3, wherein said payload information is generated from said secret information using encryption.
- 5. The method of claim 3, wherein said payload information is generated from said secret information using a cryptographic encoding method, wherein said cryptographic encoding method is operable to create two significantly different outputs when presented with two similar inputs.
- 6. The method of claim 1, wherein said payload information is a key used for encoding said secret information.
- 7. The method of claim 1, wherein said encryption comprises: encoding said payload information into an array having indices; and performing a permutation on at least one of the indices of said array and wherein said encryption keys comprise information about said permutation of said indices.
- 8. The method of claim 7, wherein said encoding comprises at least one of the following:
encryption; signing; padding; and error correction code.
- 9. The method of claim 7, wherein said array is one of the following:
a two dimensional matrix; a multi dimensional array of more than two dimensions; and a multi dimensional array where each dimension is of size two.
- 10. The method of claim 7, wherein said array is one of the following:
a binary array; a hexadecimal array; a block array; a sparse array; an octal array; and a decimal array.
- 11. The method of claim 7, wherein said permutation performed on said indices is symmetric on at least two dimensions.
- 12. The method of claim 1, wherein said secret information comprises at least one of the following:
software; binary software data; software source code; video; audio; document; text; and multimedia.
- 13. The method of claim 1, wherein said method further comprise at least one additional step of:
encrypting said encrypted payload information with an additional encryption key; and sending said encrypted payload information encrypted with said additional encryption key to an additional data processor.
- 14. The method of claim 13, comprising generating a decryption key based on said first encryption key and on said second encryption key, and on said additional encryption keys, wherein said decryption key is operable to compute said payload information by decrypting said payload information encrypted with said additional encryption keys.
- 15. A method for encryption of payload information, executed using at least one data processor, the method comprising:
encoding said payload information into an array; and performing a permutation on at least one of the indices of said array, said permutation being performed using at least one encryption key comprising information about said permutation of said indices.
- 16. The method of claim 15, wherein said encoding comprises at least one of the following:
encryption; signing; padding; and error correction encoding.
- 17. The method of claim 15, wherein said array is one of the following:
a two dimensional matrix; a multi dimensional array of more than two dimensions; and a multi dimensional array where each dimension is of size two.
- 18. The method of claim 15, wherein said array is one of the following:
a binary array; a hexadecimal array; a block array; a sparse array; an octal array; and a decimal array.
- 19. The method of claim 15, wherein said permutation performed on said indices is symmetric on at least two dimensions.
- 20. The method of claim 15, further comprising generating a decryption key for restoring said payload information from said permutation.
- 21. The method of claim 20, wherein said encoding is performed at a first network location, said permutation is performed at a second network location, and said decryption key is sent to a third network location.
- 22. The method of claim 21, wherein said permutation is selected such as to require a unique decryption key for each payload.
- 23. The method of claim 21, wherein said encoding comprises a stage of pre-encoding data manipulation to produce a randomized plaintext.
- 24. Apparatus for secure distribution of information over a network, comprising:
a first key generator for generating a first encryption key for first encryption of said information and sending said first encryption key to a first network location for first encryption of said information, a second key generator for generating a second encryption key and sending said second encryption key to a second network location for second encryption of said first encryption; and a decryption key generator, associated with said first and second key generators for using said first encryption key and said second encryption key for generating a decryption key for sending to a third network location, said decryption key being for restoring said information from said second encryption.
- 25. The apparatus of claim 24, further comprising a perturber for perturbing said information prior to said first encryption.
RELATIONSHIP TO EXISTING APPLICATIONS
[0001] The present application claims priority from US Provisional patent application no. 60/316,231, filed Sep. 4, 2001, the contents of which are hereby incorporated by reference.
Provisional Applications (1)
|
Number |
Date |
Country |
|
60316231 |
Sep 2001 |
US |