18670919. SIGNCRYPTED ENVELOPE MESSAGE simplified abstract (Wells Fargo Bank, N.A.)
Contents
SIGNCRYPTED ENVELOPE MESSAGE
Organization Name
Inventor(s)
Phillip H. Griffin of Raleigh NC (US)
Jeffrey J. Stapleton of O'Fallon MO (US)
SIGNCRYPTED ENVELOPE MESSAGE - A simplified explanation of the abstract
This abstract first appeared for US patent application 18670919 titled 'SIGNCRYPTED ENVELOPE MESSAGE
The abstract of the patent application describes a method performed by a processor of a computing system, involving the generation of a symmetric content encryption key, encryption of content using the key, generation of cipher text, and signcryption of the hash and content encryption key using various keys to create a signcrypted envelope message for transmission to a recipient.
- Generation of a symmetric content encryption key
- Encryption of content using the encryption key to generate cipher text
- Generation of a hash of the cipher text
- Signcryption of the hash and encryption key using different keys
- Embedding the cipher text in the signcrypted envelope message
- Transmission of the signcrypted envelope message to a recipient
- Unsigncrypting the message using recipient and signcrypting party keys
- Decryption of the cipher text using the content encryption key
Potential Applications: - Secure communication and data transfer - Secure file sharing - Secure messaging platforms
Problems Solved: - Ensuring secure transmission of sensitive information - Protecting data from unauthorized access
Benefits: - Enhanced data security - Secure communication channels - Protection of sensitive information
Commercial Applications: Secure messaging apps, secure file sharing platforms, data encryption services
Questions about the technology: 1. How does signcryption differ from traditional encryption methods? Signcryption combines both signing and encryption into a single operation, providing a more efficient and secure way to protect data during transmission.
2. What are the advantages of using symmetric content encryption keys? Symmetric encryption keys are faster and more efficient for encrypting and decrypting data compared to asymmetric keys, making them ideal for secure communication and data protection.
Original Abstract Submitted
Various embodiments relate to a method performed by a processor of a computing system. An example method includes generating a symmetric content encryption key. Content is encrypted using the content encryption key to generate cipher text. A hash of the cipher text is generated. Each of the hash and the content encryption key is signcrypted using each of a signcrypting party public key, a signcrypting party private key and a recipient public key to generate a signcrypted envelope message. The cipher text is embedded in a component of the signcrypted envelope message. The signcrypted envelope message is transmitted to a recipient. The recipient can unsigncrypt the signcrypted envelope message using each of the recipient public key, a recipient private key, and the signcrypting party public key to retrieve the content encryption key and hash of the cipher text. The recipient can decrypt the cipher text using the content encryption key.