A portion of the disclosure of this patent document may contain material which is subject to copyright protection. The copyright owner has no objection to the facsimile reproduction by anyone of the patent document or patent disclosure as it appears in the US Patent and Trademark Office patent file or records, but otherwise reserves all copyright rights whatsoever.
The present invention relates to a method of transforming files that will produce a much stronger encryption over conventional encryption methods. Using any standard encryption cypher, a one megabyte file will be rendered 40,000 times more secure by applying the described methodology compared to a file encrypted without the method.
The invention is an improved process for encrypting data in such a way that greatly increases the data's security. This process makes use of standard encryption ciphers, but in a novel and unique way.
Data to be encrypted is compressed and then broken down into chunks the same size as the encryption key. A password provided by the user is combined with certain data taken from the encryption archive, the encryption cipher, and from the source data being encrypted. This password is then transformed, hashed with a strong hashing algorithm, and used to encrypt a single block of data. Each subsequent block of data is encrypted with a different password generated in the identical way. Additionally, each block of data can be encrypted with a unique encryption cipher. This is useful in that it increases obfuscation.
The key improvements over conventional encryption methods are as follows:
a. The file to be encrypted is first broken into very small chunks of data. Each chunk to be encrypted is no bigger (e.g. contains no more characters) than the encryption key.
b. Each chunk of data is encrypted multiple (at least three) times with a unique password, derived from the original password in a cryptographically secure way. The derived passwords are hashed with data derived from the encryption archive and the source data being encrypted using a strong hashing algorithm, meaning that it is impossible to deduce the original password if any of the derived passwords are compromised.
c. Each chunk of data can be encrypted with a unique encryption cypher. This serves to increase obfuscation.
The attached chart shows the process flow at a general level. Each major step is represented: compression of the file, breaking the file into chunks, encrypting each chunk, calculation and manipulation of the password, rotation of the encryption types and the calculation of a hash to allow for integrity checks.
As shown in
The strength of this approach is that it applies key elements of a one-time pad, namely that the data to be encrypted is the same length as the encryption key. Additionally, it adds multiple levels of obfuscation to any attacker, who must discern the hashing and compression algorithms and encryption ciphers used. Decrypting the same file is done with the steps in reverse, with the added consideration: The data to be decrypted is hashed and then compared to the checksum. If it does not match, it can be assumed that the data has been modified and appropriate action can be taken.
Having thus described the invention in detail, it should be apparent that various modifications and changes may be made without departing from the spirit and scope of the present invention. Consequently, these and other modifications are contemplated to be within the spirit and scope of the following claims.
This application claims priority to U.S. Provisional Patent Application No. 61/009,039 filed Dec. 26, 2007. The content of both of these applications is hereby fully incorporated herein by reference.
| Number | Date | Country | |
|---|---|---|---|
| 61009039 | Dec 2007 | US |