Figure 1. Encryption protocol diagram
The diagram above describes a simple communication between an originating node and a terminating node with dynamic encryption technology.
Each
node could include an Encryption Key Engine
with a set of encryption algorithms.
The
Encryption Engine includes a set of
encryption algorithms with dynamic names to make decrypting tasks harder for
hackers as described earlier in separate notes.
If
the Encryption Key Engine is equipped
with a set of algorithms, the protocol must be different, so the terminating
node would know how to generate correct SSD based on receiving RANDU, which is
used in encrypting messages.
Let
describe simple communications between nodes that used only 1 encryption algorithm
in the Encryption Key Engine.
-
The Encryption Key Engine generates a random number/character,
RANDU based on its encryption algorithm and a few keys uniquely identify the
system. It also generates an SSD based on that RANDU. Assuming that those parameters
called RANDU 1, and SSD 1.
-
The encryption engine would use “a random encryption algorithm”
with SSD 1 as the key to encrypt the sending packet.
-
As described earlier notes, the originating node would send RANDU
1 and the encryption name (code) plus message to the terminating node.
-
The terminating node would send the RANDU 1 key to its Encryption
Key Engine, so the key engine would send back the corresponding SSD 1.
-
The encryption engine would use the SSD 1 and received encryption
name (code) to decrypt the message.
To make cracking tasks harder to hackers, each
message is a packet. Each packet would be associated with a unique pair of RANDU
and SSD.
No comments:
Post a Comment