Cryptographic key split combiner

ABSTRACT

A cryptographic key split combiner, which includes a number of key split generators for generating cryptographic key splits and a key split randomizer for randomizing the cryptographic key splits to produce a cryptographic key, and a process for forming cryptographic keys. Each of the key split generators generates key splits from seed data. The key split generators may include a random split generator for generating a random key split based on reference data. Other key split generators may include a token split generator for generating a token key split based on label data, a console split generator for generating a console key split based on maintenance data, and a biometric split generator for generating a biometric key split based on biometric data. All splits may further be based on static data, which may be updated, for example by modifying a prime number divisor of the static data. The label data may be read from a storage medium, and may include user authorization data. The resulting cryptographic key may be, for example, a stream of symbols, at least one symbol block, or a key matrix.

FIELD OF THE INVENTION

[0001] The present invention relates to cryptographic systems. Inparticular, the present invention relates to a system for formulatingcryptographic keys used to encrypt plaintext messages and decryptciphertext communications.

BACKGROUND OF THE INVENTION

[0002] In the modern world, communications are passed between parties ina variety of different ways utilizing many different communicationsmedia. Electronic communication is becoming increasingly popular as anefficient manner of transferring information, and electronic mail inparticular is proliferating due to the immediacy of the medium.

[0003] Unfortunately, drawbacks accompany the benefits provided byelectronic communication, particularly in the area of privacy.Electronic communications may be intercepted by unintended recipients.Wireless transmissions, such as voice communication by cellulartelephone, and electronic mail are especially susceptible to suchinterception.

[0004] The problem of electronic communication privacy has beenaddressed, and solutions to the problem have been put in place. One formof solution uses cryptography to provide privacy for electroniccommunication. Cryptography involves the encrypting or encoding of atransmitted or stored message, followed by the decryption or decoding ofa received or retrieved message. The message usually takes the form of adigital signal, or a digitized analog signal. If the communication isintercepted during transmission or is extracted from storage by anunauthorized entity, the message is worthless to the interloper, whodoes not possess the means to decrypt the encrypted message.

[0005] In a system utilizing cryptography, the encrypting side of thecommunication incorporates an encoding device or encrypting engine. Theencoding device accepts the plaintext (unencrypted) message and acryptographic key, and encrypts the plaintext message with the keyaccording to an encrypt relation that is predetermined for the plaintextcommunication and the key. That is, the message is manipulated with thekey in a predetermined manner set forth by the text/key relation toproduce a ciphertext (encrypted) message.

[0006] Likewise, the decrypting side of the communication incorporates adecoding device or decrypting engine. The decoding device accepts theciphertext message and a cryptographic key, and decrypts the ciphertextmessage with the key according to a decrypt relation that ispredetermined for the ciphertext message and the key. That is, themessage is manipulated with the key in a predetermined manner set forthby the text/key relation to produce a new plaintext message thatcorresponds with the original plaintext message.

[0007] The manner in which the key and the relation are applied in thecommunication process, and the manner in which keys are managed, definea cryptographic scheme. There are many conventional cryptographicschemes in use today. For example, probably the most popular of these isa public-key cryptographic scheme. According to a scheme of this type,the keys used are actually combinations of a public key component thatis available to anyone or to a large group of entities, and a privatekey component that is specific to the particular communication.

[0008] An important consideration in determining whether a particularcryptographic scheme is adequate for the application is the degree ofdifficulty necessary to defeat the cryptography, that is, the amount ofeffort required for an unauthorized person to decrypt the encryptedmessage. One way to improve the security of the cryptographic scheme isto minimize the likelihood that a valid key can be stolen, calculated,or discovered. The more difficult it is for an unauthorized person toobtain a valid key, the more secure communications will be under aparticular scheme.

SUMMARY OF THE INVENTION

[0009] It is therefore an object of the present invention to provide aprocess and apparatus for assembling keys which provides added securityagainst compromising a communication by unauthorized entities.

[0010] It is a further object of the present invention to provide aprocess and apparatus for developing key components that cannot bereproduced by unauthorized parties.

[0011] These and other objects and advantages are provided by acryptographic key split combiner, which includes a number of key splitgenerators for generating cryptographic key splits and a key splitrandomizer for randomizing the cryptographic key splits to produce acryptographic key. Each of the key split generators generates key splitsfrom seed data.

[0012] In one embodiment of the present invention, the key splitgenerators include a random split generator for generating a random keysplit based on reference data. The random split generator may generate arandom sequence based on the reference data, or may generate apseudorandom sequence based on the reference data. The random key splitmay further be based on chronological data. The random key split mayinstead be based on the reference data and on static data, which may beupdated. One manner of updating the static data is by modifying a primenumber divisor of the static data.

[0013] Other key split generators may include, for example, a tokensplit generator for generating a token key split based on label dataand/or organization data and/or static data; a console split generatorfor generating a console key split based on maintenance data, whetherprevious or current, and/or on static data; and a biometric splitgenerator for generating a biometric key split based on biometric data,which may include biometric data vectors and on biometric combiner data,and/or static data. The label data may be read from a storage medium,and may include user authorization data. The resulting cryptographic keymay be, for example, a stream of symbols, at least one symbol block, ora key matrix.

[0014] The present invention also includes a process for formingcryptographic keys, which includes generating a plurality ofcryptographic key splits from seed data and randomizing thecryptographic key splits to produce a cryptographic key. Thecryptographic key splits may include, for example, a random key splitbased on reference data, a token key split based on label data, aconsole key split based on maintenance data, and a biometric key splitbased on biometric data. These key splits may be random sequences orpseudorandom sequences.

[0015] Generating the random key split may include generating a keysplit based on the reference data and on chronological data, or based onthe reference data and on static data. Generating the token key splitmay include generating a key split based on the label data, which may beread from a storage medium and may include authorization data, and onorganization data, or based on the label data and on static data.Generating the console key split may include generating a key splitbased on previous maintenance data and on current maintenance data, orbased on the maintenance data and on static data. Generating thebiometric key split may include generating a key split based onbiometric data vectors and on biometric combiner data, or based on thebiometric data and on static data.

[0016] The static data provided for any of the key splits may beupdated. Updating the static data may include modifying a prime numberdivisor of the static data.

[0017] The resulting cryptographic key may be a stream of symbols, atleast one symbol block, or a key matrix.

BRIEF DESCRIPTION OF THE DRAWINGS

[0018] The present invention will be more completely understood by wayof the following detailed description, with reference to the followingdrawings wherein:

[0019]FIG. 1 shows a block diagram of a communications event featuringcryptography.

[0020]FIG. 2 is a block diagram of a key split combiner.

DETAILED DESCRIPTION OF THE INVENTION

[0021] Referring to FIG. 1, a communication has an origination space 2and a destination space 4. The origination space 2 defines the place andtime at which the communication originates. The destination space 4defines the place and time at which the communication is intended to bedecoded. The origination space 2 and the destination space 4 may beremote in location. Alternatively, they may be collocated but displacedin time. The space and time correspondence between the origination space2 and the destination space 4 depends on the nature of a particularcommunication. The origination space 2 and destination space 4 arecoupled to a common communications channel 6. This communicationschannel 6 may bridge a physical space, such as empty air in the case ofa cellular voice telephone call. Alternatively, the communicationschannel 6 may be temporary storage for the communication while timepasses between the origination space 2 and the destination space 4, suchas a message left in memory on a computer by a first user, for a seconduser to read at a later time on the same computer. The communicationschannel 6 may also be a combination of the two, such as telephone cablesand storage memory in the case of an electronic mail transmission.

[0022] At the origination space 2, the original plaintext message 8 isreceived and encrypted according to the encrypt text/key relation 14,using a provided encrypt key 10, to create a ciphertext message 16. Theciphertext message 16 is received at the destination space 4 via thecommunications channel 6. An authorized entity having a proper decryptkey 20 can then provide the decrypt key 20 to the destination space 4,where it is applied to the ciphertext message 16 according to a decrypttext/key relation 22 to create a new plaintext message 24 whichcorresponds to the original plaintext message 8.

[0023] The origination space 2 and the destination space 4 can be, forexample, computers, or even the same computer. An exemplary computer mayhave a certain amount of storage space in the form of memory for storingthe text/key relation. A microprocessor or similar controller, alongwith a control structure and random access memory for storing originalplaintext and keys provided by a user, can be included in each space andcan perform the functions of the encryption/decryption engine. An inputdevice 26, 28, such as a keyboard. floppy disk drive, CD-ROM drive, orbiometrics reader, can also be provided for accepting the key andplaintext message from the origination user, and the key from thedestination user. At the destination space 4, an output device 30. suchas a monitor, disk drive, or audio speaker, may also be provided topresent the new plaintext message to the destination user. The text/keyrelation can be stored on a floppy disk or other permanent or temporaryportable storage, rather than in hard storage in the computer, to allowdifferent text/key relations to be applied by different users or indifferent situations.

[0024] The keys that are provided at the origination space and at thedestination space may be composed of several components, or splits, eachof which may be provided by a different source. As shown in FIG. 2, arandom key split 32 may be randomly or pseudorandomly generated. Asecond split 34 may be stored on a token. A third split 36 may be storedon a console, and a fourth split 38 may be provided by a biometricsource. The key splits may be combined to form a complete cryptographickey. This key may take the form of a stream of symbols, a group ofsymbol blocks, an N-dimensional key matrix, or any other form usable bythe particular encryption scheme.

[0025] The random split 32 provides a random component to thecryptographic key. This split 32 is randomly or pseudorandomly generatedbased on a seed which is provided by any source as reference data 40.For example, when a user attempts to log on to a system, the date andtime of the user's log-on attempt, represented in digital form, can beused as a seed to generate the key split. That is, the seed may beprovided to a pseudorandom sequence generator or other randomizer toproduce the random split. Such pseudorandom sequence generators are wellknown in the art. For example, a simple hardware implementation couldinclude a shift register, with various outputs of the register XORed andthe result fed back to the input of the register. Alternatively, theseed may be combined, or randomized, with a built-in component 42, suchas a fixed key seed stored at the origination space. The randomizationmay be performed, for example, by applying a variation of the text/keyrelation to the generated seed and the stored fixed key seed. Thisresult may be further randomized with, for example, a digitalrepresentation of the date and time of the encryption 44, in order toproduce the random key split 32.

[0026] The token split 34 may be generated in a similar fashion. In thiscase, the seed is provided on a token, that is, it is stored on a mediumthat is possessed by the user. For example, the seed may be stored on afloppy disk that the system must read as part of the encryptionprocedure. The token may store a number of different seeds, or labeldata 46, each of which corresponds to a different authorization providedby the system or specified by the user. For example, one seed may beused to generate a key split to authorize a particular user to read amessage at a particular destination space. Another key seed may be usedto generate a key split to authorize any member of a group of users toread a message at any destination space, and for one particular user toread the message and write over the message at a particular destinationspace. The label data 46 may even designate a window of time duringwhich access to the communication is valid. This seed may be randomizedwith a built-in component 48, such as a seed stored at the originationspace, which may then be further randomized with organization data 50provided to the organization to which the user belongs.

[0027] The console split 36 is derived from a changing value stored at auser space, such as on a system console. Maintenance data, such as thechecksum taken from a defragmentation table set, may be used to producesuch changing values. For example, the current maintenance data 52 maybe randomized with particular previous maintenance data. Alternatively,all previous maintenance data 54 may be randomized with a built-incomponent 56 stored at the origination space, the results of which areXORed together and randomized with the current maintenance data 52. Therandomization result of the changing value is the console split 36.

[0028] The biometric split 38 is generated from biometric data vectors58 provided by biometric samples of the user. For example, a retinalscanner may be used to obtain a unique retinal signature from the user.This information, in digital form, will then be used to generate thebiometric split 38. This may be accomplished by, for example,randomizing a digital string corresponding to the biometric vectors 58with biometric combiner data 60, which may be a digital hash of theuser's system identification number or some other identifying data thatcan be linked to the user's physical data provided by the biometricreader. The resulting randomized data is the biometric split 38. Thebiometric split 38 provides information that is incapable of beingreproduced by anyone but the user providing the biometric data vector58.

[0029] The built-in key split components 42, 48, 56 described herein maybe static in that they do not change based on uncontrolled parameterswithin the system. They may be updated for control purposes, however.For example, the built-in key split components 42, 48, 56 may be changedto modify the participation status of a particular user. The key splitcomponent may be changed completely to deny access to the user.Alternatively, only a single prime number divisor of the original keysplit component may be taken from the key split component as amodification, in order to preserve a legacy file. That is, the user willbe able to access versions of the file created prior to themodification, but will not be allowed to change the file, effectivelygiving the user read-only access. Likewise, modification of the keysplit component can be effected to grant the user broader access.

[0030] Once the key splits 32, 34, 36, 38 have been generated, they maybe randomized together to produce the cryptographic key 62 for thecommunication. In performing each combination to generate the completecryptographic key, a different variation of the text/key relation may beapplied. The use of a plurality of different text/key relationvariations adds to the security of the overall cryptographic scheme. Itis contemplated that key splits other than those specifically describedherein may be combined in forming the complete key 62. The total numberof splits may also vary, and these splits may be used to build a keymatrix to add to the complexity of the system. This complete key 62should be in a form suitable for use in the particular cryptographicscheme. That is, different fields in the key may have differentfunctions in the protocol of the communication, and should be arrangedaccordingly within the key.

[0031] At the destination space, the process is reversed in order todetermine whether a user attempting to access a message hasauthorization, that is, has the valid key. The key supplied by the userat the destination space must include information required by the labelsthat were used to create the token split at the origination space. Thisinformation may also take the form of a token split. Further, abiometric split may be required as part of the destination key, in orderto provide a link between assigned identification data for the user andphysical data collected from the user biometrically. The token split andthe biometric split may be combined with other splits at the destinationspace to form the complete destination key.

[0032] The invention has been described using exemplary and preferredembodiments. However, the scope of the present invention is not limitedto these particular disclosed embodiments. To the contrary, the presentinvention is contemplated to encompass various modifications and similararrangements The scope of the claims, therefore, should be accorded thebroadest interpretation so as to include all such modifications andsimilar arrangements.

What is claimed is:
 1. A cryptographic key split combiner, comprising:a) a plurality of key split generators for generating cryptographic keysplits; and b) a key split randomizer for randomizing the cryptographickey splits to produce a cryptographic key; c) wherein each of said keysplit generators includes means for generating key splits from seeddata.
 2. The cryptographic key split combiner of claim 1, wherein saidplurality of key split generators includes a random split generator forgenerating a random key split based on reference data.
 3. Thecryptographic key split combiner of claim 2, wherein said random splitgenerator includes means for generating a random sequence based on thereference data.
 4. The cryptographic key split combiner of claim 2,wherein said random split generator includes means for generating apseudorandom sequence based on the reference data.
 5. The Cryptographickey split combiner of claim 2, wherein said random split generatorincludes means for generating a key split based on the reference dataand on chronological data.
 6. The cryptographic key split combiner ofclaim 2, wherein said random split generator includes means forgenerating a key split based on the reference data and on static data.7. The cryptographic key split combiner of claim 6, further includingmeans for updating the static data.
 8. The cryptographic key splitcombiner of claim 7, wherein the means for updating the static dataincludes means for modifying a prime number divisor of the static data.9. The cryptographic key split combiner of claim 1, wherein saidplurality of key split generators includes a token split generator forgenerating a token key split based on label data.
 10. The cryptographickey split combiner of claim 9, further comprising means for reading thelabel data from a storage medium.
 11. The cryptographic key splitcombiner of claim 9, wherein the label data includes user authorizationdata.
 12. The cryptographic key split combiner of claim 9, wherein saidtaken split generator includes means for generating a random sequencebased on the label data.
 13. The cryptographic key split combiner ofclaim 9, wherein said token split generator includes means forgenerating a pseudorandom sequence based on the label data.
 14. Thecryptographic key split combiner of claim 9, wherein said token splitgenerator includes means for generating a key split based on the labeldata and on organization data.
 15. The cryptographic key split combinerof claim 9, wherein said token split generator includes means forgenerating a key split based on the label data and on static data. 16.The cryptographic key split combiner of claim 15, further includingmeans for updating the static data.
 17. The cryptographic key splitcombiner of claim 16, wherein the means for updating the static dataincludes means for modifying a prime number divisor of the static data.18. The cryptographic key split combiner of claim 1, wherein saidplurality of key split generators includes a console split generator forgenerating a console key split based on maintenance data.
 19. Thecryptographic key split combiner of claim 18, wherein said console splitgenerator includes means for generating a random sequence based on themaintenance data.
 20. The cryptographic key split combiner of claim 18,wherein said console split generator includes means for generating apseudorandom sequence based on the maintenance data.
 21. Thecryptographic key split combiner of claim 18, wherein said console splitgenerator includes means for generating a key split based on previousmaintenance data and on current maintenance data.
 22. The cryptographickey split combiner of claim 18, wherein said console split generatorincludes means for generating a key split based on the maintenance dataand on static data.
 23. The cryptographic key split combiner of claim22, further including means for updating the static data.
 24. Thecryptographic key split combiner of claim 22, wherein the means forupdating the static data includes means for modifying a prime numberdivisor of the static data.
 25. The cryptographic key split combiner ofclaim 1, wherein said plurality of key split generators includes abiometric split generator for generating a biometric key split based onbiometric data.
 26. The cryptographic key split combiner of claim 25,wherein said biometric split generator includes means for generating arandom sequence based on the biometric data.
 27. The cryptographic keysplit combiner of claim 25, wherein said biometric split generatorincludes means for generating a pseudorandom sequence based on thebiometric data.
 28. The cryptographic key split combiner of claim 25,wherein said biometric split generator includes means for generating akey split based on biometric data vectors and on biometric combinerdata.
 29. The cryptographic key split combiner of claim 25, wherein saidbiometric split generator includes means for generating a key splitbased on the biometric data and on static data.
 30. The cryptographickey split combiner of claim 29, further including means for updating thestatic data.
 31. The cryptographic key split combiner of claim 30,wherein the means for updating the static data includes means formodifying a prime number divisor of the static data.
 32. Thecryptographic key split combiner of claim 1, wherein the cryptographickey is a stream of symbols.
 33. The cryptographic key split combiner ofclaim 1, wherein the cryptographic key is at least one symbol block. 34.The cryptographic key split combiner of claim 1, wherein thecryptographic key is a key matrix.
 35. A process for formingcryptographic keys, comprising: a) generating a plurality ofcryptographic key splits from seed data; and b) randomizing thecryptographic key splits to produce a cryptographic key.
 36. The processof claim 35, wherein generating a plurality of cryptographic key splitsincludes generating a random key spit based on reference data.
 37. Theprocess of claim 36, wherein generating a random key split includesgenerating a random sequence based on the reference data.
 38. Theprocess of claim 36, wherein generating a random key split includesgenerating a pseudorandom sequence based on the reference data.
 39. Theprocess of claim 36, wherein generating a random key split includesgenerating a key split based on the reference data and on chronologicaldata.
 40. The process of claim 36, wherein generating a random key splitincludes generating a key split based on the reference data and onstatic data.
 41. The process of claim 40, further including updating thestatic data.
 42. The process of claim 41, wherein updating the staticdata includes modifying a prime number divisor of the static data. 43.The process of claim 35, wherein generating a plurality of cryptographickey splits includes generating a token key split based on label data.44. The process of claim 43, further comprising reading the label datafrom a storage medium.
 45. The process of claim 43, wherein the labeldata includes user authorization data.
 46. The process of claim 43,wherein generating a token key split includes generating a randomsequence based on the label data.
 47. The process of claim 43, whereingenerating a token key split includes generating a pseudorandom sequencebased on the label data.
 48. The process of claim 43, wherein generatinga token key split includes generating a key split based on the labeldata and on organization data.
 49. The process of claim 43, whereingenerating a token key split includes generating a key split based onthe label data and on static data.
 50. The process of claim 49, furtherincluding updating the static data.
 51. The process of claim 50, whereinupdating the static data includes modifying a prime number divisor ofthe static data.
 52. The process of claim 35, wherein generating aplurality of cryptographic key splits includes generating a console keysplit based on maintenance data.
 53. The process of claim 52, whereingenerating a console key split includes generating a random sequencebased on the maintenance data.
 54. The process of claim 52, whereingenerating a console key split includes generating a pseudorandomsequence based on the maintenance data.
 55. The process of claim 52,wherein generating a console key split includes generating a key splitbased on previous maintenance data and on current maintenance data. 56.The process of claim 52, wherein generating a console key split includesgenerating a key split based on the maintenance data and on static data.57. The process of claim 56, further including updating the static data.58. The process of claim 56, wherein the updating the static dataincludes modifying a prime number divisor of the static data.
 59. Theprocess of claim 35, wherein generating a plurality of cryptographic keysplits includes generating a biometric key split based on biometricdata.
 60. The process of claim 59, wherein generating a biometric keysplit includes generating a random sequence based on the biometric data.61. The process of claim 59, wherein generating a biometric key splitincludes generating a pseudorandom sequence based on the biometric data.62. The process of claim 59, wherein generating a biometric key splitincludes generating a key split based on biometric data vectors and onbiometric combiner data.
 63. The process of claim 59, wherein generatinga biometric key split includes generating a key split based on thebiometric data and on static data.
 64. The process of claim 63, furtherincluding updating the static data.
 65. The process of claim 63, whereinupdating the static data includes modifying a prime number divisor ofthe static data.
 66. A cryptographic key, formed by the process of claim35.
 67. The cryptographic key of claim 66, including a stream ofsymbols.
 68. The cryptographic key of claim 66, including at least onesymbol block.
 69. The cryptographic key of claim 66, including a keymatrix.