METHOD FOR ENCRYPTING AND DECRYPTING DATA WITH A ONE-TIME-KEY
20170214671 ยท 2017-07-27
Assignee
Inventors
Cpc classification
H04L63/0471
ELECTRICITY
H04L63/0435
ELECTRICITY
H04L9/0827
ELECTRICITY
H04L9/0894
ELECTRICITY
International classification
Abstract
A method for encrypting and decrypting data with a session key is proposed. The data is exchanged between a first data processing device and a second data processing device via a communications link that is equipped with a communications server. The method exhibits process steps concerning the generation of a permanent common start value and the provision of a formation rule for the session key, process steps concerning the generation of a session key for the encryption of the data, process steps concerning the encryption of data of the first data processing device using the session key, process steps concerning the generation of a session key for decryption of the data and process steps concerning the decryption of the data.
Claims
1. Method for encrypting and decrypting data which is exchanged between a first data processing device and a second data processing device via a communications link, with a session key, wherein the first data processing device is connected to the second data processing device via the communications link and the communications link exhibits a communications server, comprising the following process steps concerning the generation of a permanent common start value and the provision of a formation rule for the session key: Generation of a start value in the first data processing device, Saving of the start value in a memory of the first data processing device, Exchanging of this start value between the first and second data processing device, Provision of a formation rule in the communications server which generates a session key from at least the start value and a random value generated in the communications server, and the following process steps concerning the generation of a session key for the encryption of the data: Generation of a random value in the communications server, Saving of the random value in the communications server, Either output of the start value by the first data processing device to the communications server and generation of a session key from the start value and the random value by the communications server using the formation rule Or output of the random value and the formation rule by the communications server to the first data processing device and generation of a session key from the start value and the random value by the first data processing device using the formation rule, and the following process steps concerning the encryption of data of the first data processing device using the session key: Encryption of the data using the session key on the communications server or encryption of the data using the session key in the first data processing device and Output of the encrypted data to the communications server, Saving of the encrypted data on the communications server, Deletion of the session key, and the following process steps concerning the generation of a session key for the decryption of the data: Either output of the start value from the second data processing device to the communications server and generation of the session key from the start value and the random value saved on the communications server by the communications server using the formation rule Or output of the random value and the formation rule from the communications server to the second data processing device and generation of the session key from the start value and the random value by the second data processing device using the formation rule, and the following process steps concerning the decryption of the data Either decryption of the encrypted data with the session key by the communications server and output of the decrypted data to the second data processing device Or output of the encrypted data to the second data processing device and decryption of the data in the second data processing device using the session key, Deletion of the session key and the random value.
2. Method according to claim 1, wherein a start value key for encrypting the start value is generated, that the start value is encrypted by the first data processing device using the start value key before it is output to the second data processing device, that the start value key is input into the second data processing device along a channel of communication other than the communications link, and that the encrypted start value in the second data processing device is decrypted using the start value key.
3. Method according to claim 1, wherein the start value is formed according to a random principle.
4. Method according to claim 1, wherein first a session key is formed on the communications server using the formation rule, before the unencrypted data is output from the first data processing device to the communications server.
5. Method according to claim 1, wherein the data exchange takes place over a communications link designed as a secure channel of communication between the first data processing device and the communications server, and between the communications server and the second data processing device.
6. Method according to claim 1, wherein the first data processing device outputs a message to the second data processing device if data of the first data processing device that is intended for the second data processing device is encrypted with a session key and saved on the communications server.
7. Method according to claim 1, wherein the communications server outputs a message to the second data processing device if data of the first data processing device that is intended for the second data processing device is saved encrypted on the communications server.
8. Method according to claim 1, wherein the start value in a memory of the first data processing device and in a memory of the second data processing device is permanently saved and remains constant for several communication processes.
9. Method according to claim 1, wherein the formation rule is a key derivation function.
Description
Drawing
[0170] The drawing shows various model embodiments of the method according to the invention.
[0171]
[0172]
[0173]
[0174]
[0175]
[0176]
[0177]
[0178]
[0179]
[0180]
[0181]
[0182]
[0183]
[0184]
[0185]
[0186]
[0187]
[0188]
[0189]
DESCRIPTION OF THE MODEL EMBODIMENTS
[0190]
[0191]
[0192]
[0193]
[0194] The following table contains a list of the aforementioned sixteen model embodiments. They differ in respect of the devices in which the generation of the session key and the encryption and decryption of the data takes place. The devices here are the communications server, the first data processing device and the second data processing device. The table and
[0198] For the individual lines in the table, the X indicates where the generation of the session key and the encryption and decryption of the data takes place. The number in the first column indicates the number of the model embodiment.
TABLE-US-00001 Generation Generation of the session Encryption of the session Decryption key for of the key for of the encryption data decryption data Variant Server DV1 Server DV1 Server DV2 Server DV2 1 X X X X 2 X X X X 3 X X X X 4 X X X X 5 X X X X 6 X X X X 7 X X X X 8 X X X X 9 X X X X 10 X X X X 11 X X X X 12 X X X X 13 X X X X 14 X X X X 15 X X X X 16 X X X X
[0199] The symbols for the generation of the session key, the encryption of the data and the decryption of the data are represented in
[0200] 1. If the session key for the encryption of the data is formed by the communications server, the start value from the first data processing device to the communications server is output, which then forms the session key, from the random value it forms and the start value, using the formation rule.
[0201] 2. If the session key for the decryption of the data is formed by the communications server, the start value from the second data processing device to the communications server is output, which then forms the session key, from the random value it saves and the start value, using the formation rule.
[0202] 3. If the session key for the encryption of the data is formed by the first data processing device, the random value formed by the communications server and the formation rule are output from the communications server to the first data processing device. These form the session key from their start value and the random value, using the formation rule.
[0203] 4. If the session key for the decryption of the data is formed by the second data processing device, the random value saved by the communications server and the formation rule are output from the communications server to the second data processing device. These form the session key from their start value and the random value, using the formation rule.
[0204] 5. If the key for the encryption of the data is generated by the communications server and if encryption also takes place there, the session key for the encryption of the data need not be output to the first data processing device. The same applies to the session key for the decryption of the data and the second data processing device if the generation of the session key for the decryption of the data and decryption is performed by the communications server.
[0205] 6. If the key for the encryption of the data is generated by the first data processing device and if encryption also takes place there, the session key for the encryption of the data need not be output to the communications server. The same applies to the decryption of the data by the second data processing device if the session key is formed and the data decrypted there.
[0206] 7. If the key for the encryption of the data is generated by the communications server and if the encryption of the data takes place in the first data processing device, the session key must be output from the communications server to the first data processing device.
[0207] 8. If the key for the encryption of the data is generated by the first data processing device and if the encryption of the data takes place in the communications server, the session key must be output from the first data processing device to the communications server.
[0208] 9. If the key for the decryption of the data is generated by the communications server and if the decryption of the data takes place in the second data processing device, the session key must be output from the communications server to the second data processing device.
[0209] 10. If the key for the decryption of the data is generated by the second data processing device and if the decryption of the data takes place in the communications server, the session key must be output from the second data processing device to the communications server.
[0210]
[0211] The second model embodiment according to
[0212] The third model embodiment according to
[0213] The fourth model embodiment according to
[0214] The fifth model embodiment according to
[0215] The sixth model embodiment according to
[0216] The seventh model embodiment according to
[0217] The eighth model embodiment according to
[0218] The ninth model embodiment according to
[0219] The tenth model embodiment according to
[0220] The eleventh model embodiment according to
[0221] The twelfth model embodiment according to
[0222] The thirteenth model embodiment according to
[0223] The fourteenth model embodiment according to
[0224] The fifteenth model embodiment according to
[0225] The sixteenth model embodiment according to
[0226] All features of the invention can be material to the invention both individually and in any combination.