Amazon technologies, inc. (20240340273). HYBRID KEY EXCHANGES FOR DOUBLE-HULLED ENCRYPTION simplified abstract

From WikiPatents
Revision as of 15:56, 11 October 2024 by Wikipatents (talk | contribs) (Creating a new page)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to navigation Jump to search

HYBRID KEY EXCHANGES FOR DOUBLE-HULLED ENCRYPTION

Organization Name

amazon technologies, inc.

Inventor(s)

Nicholas Alexander Allen of Kirkland WA (US)

Matthew J. Campagna of Bainbridge Island WA (US)

HYBRID KEY EXCHANGES FOR DOUBLE-HULLED ENCRYPTION - A simplified explanation of the abstract

This abstract first appeared for US patent application 20240340273 titled 'HYBRID KEY EXCHANGES FOR DOUBLE-HULLED ENCRYPTION

Simplified Explanation: The patent application describes a system where two computing systems establish a secure communication session using a hybrid cryptographic scheme. Cryptographic materials are exchanged between the systems to derive multiple cryptographic keys for encrypting and decrypting data.

  • The first computing system proposes a hybrid cryptographic scheme to establish a secure communication session with the second computing system.
  • The second computing system responds by transmitting cryptographic materials to the first system.
  • Both systems exchange cryptographic materials to derive multiple cryptographic keys.
  • One key is used for inner cryptographic operations on data items, while another key is used for outer cryptographic operations on the protected data items.

Key Features and Innovation:

  • Establishment of a secure communication session using a hybrid cryptographic scheme.
  • Exchange of cryptographic materials to derive multiple cryptographic keys.
  • Use of different keys for inner and outer cryptographic operations on data items.

Potential Applications: The technology can be applied in secure communication systems, data encryption, and network security protocols.

Problems Solved: The technology addresses the need for secure communication and data protection between computing systems.

Benefits:

  • Enhanced security in communication sessions.
  • Efficient encryption and decryption of data.
  • Protection against unauthorized access to sensitive information.

Commercial Applications: The technology can be utilized in industries such as cybersecurity, financial services, healthcare, and government agencies to secure sensitive data and communications.

Questions about Cryptographic Scheme: 1. How does the hybrid cryptographic scheme enhance the security of communication sessions? 2. What are the potential vulnerabilities of using multiple cryptographic keys in the system?

Ensure the content is optimized for SEO with relevant keywords and interlinking for credibility and visibility.


Original Abstract Submitted

a first computing system establishes a cryptographically protected communication session with a second computing system by proposing a hybrid cryptographic scheme. in response to the proposed hybrid cryptographic scheme, a second computing system transmits cryptographic materials to the first computing system, and the first computing system transmits cryptographic materials to the second computing system. using the cryptographic materials, two or more cryptographic keys are derived. one cryptographic key is used to perform an inner cryptographic operation on one or more data items, and another cryptographic key is used to perform an outer cryptographic operation on the one or more data items that have been cryptographically protected by the inner cryptographic operation.