Unknown Organization (20240323006). Secure Server Digital Signature Generation for Post-Quantum Cryptography Key Encapsulations simplified abstract

From WikiPatents
Jump to navigation Jump to search

Secure Server Digital Signature Generation for Post-Quantum Cryptography Key Encapsulations

Organization Name

Unknown Organization

Inventor(s)

John A. Nix of Evanston IL (US)

Secure Server Digital Signature Generation for Post-Quantum Cryptography Key Encapsulations - A simplified explanation of the abstract

This abstract first appeared for US patent application 20240323006 titled 'Secure Server Digital Signature Generation for Post-Quantum Cryptography Key Encapsulations

The abstract describes a patent application for a network and a device that can establish a secure session using multiple post-quantum cryptography key encapsulation mechanisms and forward secrecy.

  • The network includes a first server for conducting key encapsulation with the device and a second server for generating a digital signature that can be verified by the device using a server certificate.
  • The first server receives a device ephemeral public key and generates a server ephemeral public key and private key.
  • Data including ciphertext for the device ephemeral public key, server ephemeral public key, and server certificate is sent from the first server to the second server.
  • The second server generates a digital signature over the data and sends it back to the first server.
  • The first server then encrypts the server ephemeral public key and the digital signature using the device ephemeral public key and the ciphertext.

Potential Applications: - Secure communication between devices and networks - Enhanced data encryption and verification processes

Problems Solved: - Ensuring secure sessions between devices and networks - Protecting data from unauthorized access or tampering

Benefits: - Improved security for data transmission - Enhanced privacy protection for users - Efficient encryption and verification processes

Commercial Applications: Title: Secure Communication Technology for IoT Devices This technology can be utilized in industries such as healthcare, finance, and government where secure communication is crucial. It can also be integrated into IoT devices to ensure data privacy and security.

Questions about the technology: 1. How does this technology improve data security in IoT devices? 2. What are the potential challenges in implementing this technology in a network environment?

Frequently Updated Research: Researchers are continuously exploring new post-quantum cryptography techniques to enhance data security in various applications. Stay updated on the latest advancements in this field to ensure the highest level of protection for your data.


Original Abstract Submitted

a network and a device can support a secure session with both (i) multiple post-quantum cryptography (pqc) key encapsulation mechanisms (kem) and (ii) forward secrecy. the network can operate (i) a first server for conducting kem with the device and (ii) a second server for generating a digital signature which can be verified by the device with a server certificate. the first server can receive a device ephemeral public key (epk.device) and generate (i) a server ephemeral public key (epk.server) and private key. the first server can send, to the second server, data comprising ciphertext for the epk.device, epk.server and the server certificate. the second server can (i) generate the digital signature over the data, and (ii) send the digital signature to the first server. the first server can conduct a kem with epk.device and the ciphertext in order to encrypt at least epk.server and the digital signature.