US Patent Application 17804083. SYSTEM AND METHOD FOR INCREMENTAL ENCRYPTION simplified abstract

From WikiPatents
Jump to navigation Jump to search

SYSTEM AND METHOD FOR INCREMENTAL ENCRYPTION

Organization Name

Microsoft Technology Licensing, LLC==Inventor(s)==

[[Category:Yevgeny Yankilevich of Tirat Carmel (IL)]]

[[Category:Vadim Makhervaks of Bellevue WA (US)]]

[[Category:Robert Groza, Jr. of Redmond WA (US)]]

[[Category:Yi Yuan of Redmond WA (US)]]

[[Category:Oren Ish-am of Haifa (IL)]]

SYSTEM AND METHOD FOR INCREMENTAL ENCRYPTION - A simplified explanation of the abstract

This abstract first appeared for US patent application 17804083 titled 'SYSTEM AND METHOD FOR INCREMENTAL ENCRYPTION

Simplified Explanation

The patent application describes a computing system that uses AES-XTS encryption to encrypt data in two separate sessions.

  • The first part of a data stream is encrypted using a tweak key, a data key, and an initial tweak value in the first encryption session.
  • The encrypted first part is then stored.
  • After the first encryption session ends, a second encryption session begins to encrypt the second part of the data stream.
  • The encrypted second part is stored in an encrypted data store.
  • The second part is encrypted using a modified tweak value, which is calculated based on the initial tweak value, the tweak key, and the block index of the last cipher block of the first part of the data stream.


Original Abstract Submitted

A computing system uses AES-XTS encryption to encrypt data of a first part of first data stream using a tweak key, a data key, an initial tweak value, in a first encryption session, store the encrypted first part, then encrypts a second part of the first data stream in a second encryption session commenced after the termination of the first encryption session; and store the encrypted second part in the encrypted data store. The second part of the first data stream is encrypted using a modified tweak value computed based on the initial tweak value, the tweak key, and a block index of a last cipher block of the first part of the first data stream.