Sunday, September 2, 2018

Encryption Protocol v1.1


Figure 1. Encryption protocol diagram

The diagram above describes a simple communication between an originating node and a terminating node with dynamic encryption technology.

Each node could include an Encryption Key Engine with a set of encryption algorithms.
The Encryption Engine includes a set of encryption algorithms with dynamic names to make decrypting tasks harder for hackers as described earlier in separate notes.

If the Encryption Key Engine is equipped with a set of algorithms, the protocol must be different, so the terminating node would know how to generate correct SSD based on receiving RANDU, which is used in encrypting messages.
Let describe simple communications between nodes that used only 1 encryption algorithm in the Encryption Key Engine.

-         The Encryption Key Engine generates a random number/character, RANDU based on its encryption algorithm and a few keys uniquely identify the system. It also generates an SSD based on that RANDU. Assuming that those parameters called RANDU 1, and SSD 1.

-         The encryption engine would use “a random encryption algorithm” with SSD 1 as the key to encrypt the sending packet.

-         As described earlier notes, the originating node would send RANDU 1 and the encryption name (code) plus message to the terminating node.

-         The terminating node would send the RANDU 1 key to its Encryption Key Engine, so the key engine would send back the corresponding SSD 1.

-         The encryption engine would use the SSD 1 and received encryption name (code) to decrypt the message.
To make cracking tasks harder to hackers, each message is a packet. Each packet would be associated with a unique pair of RANDU and SSD.

No comments:

Post a Comment