Login| Sign Up| Help| Contact|

Patent Searching and Data


Title:
SECURE COMMUNICATION ACROSS AN INSECURE COMMUNICATION CHANNEL
Document Type and Number:
WIPO Patent Application WO/2023/225712
Kind Code:
A1
Abstract:
There is provided herein a way to communicate securely across an insecure communication channel without any involvement of a receiving party at the t ime of sending involving receiving message text and associated provided response text and prompt text. A cryptographic key is generated using the provided response text and the message text is encrypted using the cryptographic key to generate an encrypted message. A package comprising the encrypted message and the prompt text is transmitted across an insecure communications channel. Upon receipt of the package from the communication channel the prompt text can be loaded from the package and given response text can be received responsive to the display of the prompt text. A cryptographic key can then be generated using the given response text so that the encrypted message can be decrypted using the cryptographic key to obtain the message text.

Inventors:
KATTEL ANUP (AU)
Application Number:
PCT/AU2023/050438
Publication Date:
November 30, 2023
Filing Date:
May 24, 2023
Export Citation:
Click for automatic bibliography generation   Help
Assignee:
SAFECRET PTY LTD (AU)
International Classes:
H04L9/32; H04L9/00
Foreign References:
US20090288150A12009-11-19
US20110150212A12011-06-23
Other References:
ELLISON ET AL.: "Protecting secret keys with personal entropy", FUTURE GENERATION COMPUTER SYSTEMS, vol. 16, no. 4, 2000, pages 311 - 318, XP004185843, DOI: 10.1016/S0167-739X(99)00055-2
BONNEAU JOSEPH: "Alice and Bob's life stories - Cryptographic communication using shared experiences", 17TH INTERNATIONAL WORKSHOP ON SECURITY PROTOCOLS, 1 January 2009 (2009-01-01), pages 189 - 199, XP093115668, Retrieved from the Internet [retrieved on 20240103]
NIKLAS FRYKHOLM ; ARI JUELS: "Error-tolerant password recovery", PROCEEDINGS OF THE 8TH. ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY. (CCS-8). PHILADELPHIA, PA, NOV. 5 - 8, 2001., NEW YORK, NY : ACM., US, 5 November 2001 (2001-11-05) - 8 November 2001 (2001-11-08), US , pages 1 - 9, XP058294635, ISBN: 978-1-58113-385-1, DOI: 10.1145/501983.501985
Attorney, Agent or Firm:
PATENTEC PATENT ATTORNEYS (AU)
Download PDF:
Claims:
Claims

1. Secure communication across an insecure communication channel comprising: encryption and transmission comprising: receiving message text; receiving associated provided response text and prompt text; generating a cryptographic key using the provided response text; encrypting the message text using the cryptographic key to generate an encrypted message; and transmitting a package comprising the encrypted message and the prompt text across an insecure communications channel; and receipt and decryption comprising: receiving the package from the communication channel; loading the prompt text from the package; receiving given response text responsive to the display of the prompt text; generating the cryptographic key using the given response text; decrypting the encrypted message using the cryptographic key to obtain the message text.

2. Secure communication as claimed in claim 1 , wherein the provided response text comprises a plurality of provided response text strings for respective prompt text strings.

3. Secure communication as claimed in claim 2, wherein the provided response text comprises a concatenation of provided response text strings.

4. Secure communication as claimed in claim 2, wherein receipt and decryption comprises: displaying the prompt text strings in a given order; receiving a plurality of given response text strings responsive to the display of the prompt text strings; and concatenating the given response text strings to generate the cryptographic key.

5. Secure communication as claimed in claim 4, wherein the given order is read from the package.

6. Secure communication as claimed in claim 4, wherein the given order is a sequential order.

7. Secure communication as claimed in claim 3, wherein the concatenation comprises separators.

8. Secure communication as claimed in claim 3, further comprising receiving response text until a concatenation of the response text strings exceeds in entropy threshold.

9. Secure communication as claimed in claim 3, further comprising receiving response text until a concatenation of the response text strings exceeds a character length threshold.

10. Secure communication as claimed in claim 1 , wherein encryption and transmission further comprises: generating a salt; generating a cryptographic key using the response texts and the salt; and transmitting the salt across the insecure communications channel; and wherein receipt and decryption comprises: retrieving the salt from the package; and generating the cryptographic key using the response texts and the salt.

1 1 . Secure communication as claimed in claim 1 , wherein encryption and transmission further comprises: generating at least one initialisation vector; encrypting the message text using an encryption algorithm initiated with initialisation vector; and transmitting the vector across the insecure communications channel; and wherein receipt and decryption comprises: retrieving the vector from the package; decrypting the message text using an encryption algorithm initiated with initialisation vector.

Description:
Secure communication across an insecure communication channel

Field of the Invention

[0001 ] This invention relates generally to secure sending of communications across insecure communication channels, such as the Internet.

Summary of the Disclosure

[0002] There are several methods for exchanging encryption keys over an insecure networks and public infrastructure such as the Internet.

[0003] However, these methods require active participation of the receiving party before encryption of the messages.

[0004] There is provided herein a way to communicate securely across an insecure communication channel without any involvement of a receiving party at the time of sending wherein encryption and transmission comprises receiving message text, receiving associated provided response text and prompt text and generating a cryptographic key using the provided response text.

[0005] The message text is then encrypted using the cryptographic key to generate an encrypted message and the encrypted messages transmitted in a package along with the prompt text across an insecure communications channel.

[0006] Thereafter, receipt and decryption comprises receiving the package from the communication channel and loading the prompt text from the package.

[0007] Then given response text is received responsive to the display of the prompt text. The given response text is used to generate the cryptographic key using the given response text.

[0008] The cryptographic key is used to decrypt the encrypted message using the cryptographic key to obtain the message text.

[0009] As such, no involvement is required by the recipient of the message at the time of the sending of the message.

[0010] Other aspects of the invention are also disclosed. Brief Description of the Drawings

[001 1 ] Notwithstanding any other forms which may fall within the scope of the present invention, preferred embodiments of the disclosure will now be described, by way of example only, with reference to the accompanying drawings in which:

Fig. 1 illustrates secure communication across an insecure communication channel;

Fig. 2 shows encryption and transmission in accordance with an embodiment; and

Fig. 3 shows receipt and decryption in accordance with an embodiment.

Description of Embodiments

[0012] Figure 1 illustrates Bob sending a secure message across an insecure communication channel 1 10 to Alice. Figure 2 illustrates encryption and transmission 1 12 and Figure 3 illustrates receipt and decryption 121.

[0013] Encryption and transmission 1 12 comprises receiving message text 1 08 at step 1 13. Email communication will be used herein is an example. As such, the message text 108 may comprise subject text and body text of an email message.

[0014] At step 1 14, provided response text 101 and associated prompt text 102 is received. In one embodiment, the provided response text 101 and associated prompt text 102 is information known or obtainable by both Bob and Alice without using the insecure communication channel 1 10.

[0015] In one simple example, the prompt text 102 may comprise text composed by Bob comprising “what colour car do I drive?”, with the associated provided response text 101 comprising the text “blue”. Here Bob assumes that Alice knows the answer.

[0016] In alternative embodiments as alluded to above, the response text 101 may be obtainable by Alice without using the insecure communication channel 1 10.

[0017] In the present example, prior sending an email, Bob’s email client may prompt for at least one prompt 102 and at least one provided response 101 . [0018] In embodiments, a plurality of prompts 102 and provide responses 101 may be given. As such, at step 1 15, the encryption 1 12 may comprise prompting Bob if Bob wishes to provide more prompts 102.

[0019] In embodiments, at step 1 16, the encryption 1 12 may ensure that a minimum threshold T of entropy is met. If not, the encryption 1 12 may comprise repeatedly prompting Bob for prompts 102 and provide responses 101 until the threshold T is satisfied.

[0020] For example, for an entropy threshold T, c being the possible number of characters and m being the length of the provided response, all possible combinations for the entropy T = 2 T . Further, for all possible combinations for c number of possibilities for password length of m = c m . Therefore, c m = 2 T , m = log c 2 T .

[0021 ] For example, an entropy of 128 (T = 128), using all lowercase English characters (c = 26), minimum required length m = Iog26 2 128 ( ~ 27.231494855 characters).

[0022] At step 1 17 of the encryption 1 12, the provided response text 101 may comprise a concatenation of provided response text strings which may be further concatenated with separators, such as commas, dashes and the like. For example, prompt text strings 102 provided by Bob may comprise “What colour is my car?”, “What country do I live in?”, “What is your daughter’s name?” wherein the concatenation of provided response text strings 102 may comprise “blue, australia, sarah’.

[0023] In embodiments, the response texts may comprise lower text characters only. Alternatively, the response texts may be case sensitive and/or include special characters, numbers and the like.

[0024] At step 1 18, a cryptographic key 106 is generated using the provided response text 101. The cryptographic key 106 may be produced by a key derivation algorithm such as PBKDF2, bcrypt, scyrpt, Argon2id and the like.

[0025] In embodiments, encryption 1 12 may comprise generating salt 104 and further generating the cryptographic key 106 with the salt 104. For example, the input to the key derivation algorithm may comprise a concatenation of the provided response text

101 and the salt 104.

[0026] At step 1 19, the generated cryptographic key 106 is used to encrypt the message text 108 to generate ciphertext 109 comprising the encrypted message 107 at step 1 19.

[0027] An encryption algorithm such as AES, Triple DES, Blowfish and the like may be used to encrypt the message 108 to the encrypted message 107 using the generated cryptographic key 106.

[0028] In embodiments, encryption 1 12 may comprise generation of an initialisation vector 105 and wherein the encryption algorithm is initiated with the initialisation vector 105. It should be noted that, in embodiments, more than one vector 105 may be used for encryption and subsequent decryption.

[0029] At step 120, a package is transmitted across the insecure communication channel 1 10. As is shown in Figure 1 , the package comprises ciphertext 109 comprising the encrypted message 107 and plaintext 1 1 1 comprising the prompt text 102.

[0030] Where salt 104 is used and/or an initialisation vector 105 is used, the salt 104 and/or vector 105 may be transmitted within the package in the plaintext 1 1 1.

[0031 ] The receipt and decryption 121 shown in Figure 3 comprises receipt of the package from the insecure communication channel 1 10 at step 122.

[0032] At step 123, the prompt text 102 is loaded from the plaintext 1 1 1.

[0033] Where the provided response text 101 comprises a concatenation of response text strings 101 , step 123 may comprise loading the respective prompt text strings. In this regard, the prompt text 102 may similarly comprise a concatenation of separate prompt text strings, including those separated by a separator.

[0034] Loading the prompt text strings may comprise loading the prompt text strings in a given order which may either be transmitted with the package or alternatively obtained in sequential order from the prompt text string 102.

[0035] At step 124, the decryption 121 comprises receiving given response text 103. For example, for each prompt text string obtained from the plaintext 111 , Alice’s email client may display the prompts in order, each having an associated input field for receiving respective given response text strings.

[0036] At step 125, the given response text string received from Alice may similarly be concatenated in the same way as step 117 of the encryption 112.

[0037] At step 126, the given response text 103 received from Alice may be used to generate the cryptographic key 106. In embodiments, the plaintext 11 1 may further specify the type of key derivation algorithm and configuration/settings used to derive the cryptographic key 106.

[0038] Where salt 104 is transmitted in plaintext 11 1 , step 123 may comprise loading the salt 104 from the plaintext 1 11 and using the salt 104 to generate the cryptographic key 106. Decryption 121 may comprise checking whether the package comprises salt 104 and either using the salt 104 to generate the cryptographic key or not.

[0039] At step 127, the decryption 121 comprises decrypting the encrypted message 107 using the generated cryptographic key 106.

[0040] Similarly, where the package is transmitted with the initialisation vector 105, the decryption 121 may detect the present thereof within the package, load the vector 105 and initialise the decryption algorithm using the vector 105 prior decrypting the encrypted message 107. In embodiments, the package may further specify the type of encryption algorithm and configuration/settings used to encrypt the encrypted message 107. As alluded to above, the package may be transmitted with more than one initialisation vector 105 which are detected during decryption 121 and used to initialise the decryption algorithm prior decrypting the encrypted message 107.

[0041 ] The decrypted message 108 is then displayed by Alice’s email client.

[0042] The foregoing description, for purposes of explanation, used specific nomenclature to provide a thorough understanding of the invention. However, it will be apparent to one skilled in the art that specific details are not required in order to practise the invention. Thus, the foregoing descriptions of specific embodiments of the invention are presented for purposes of illustration and description. They are not intended to be exhaustive or to limit the invention to the precise forms disclosed as obviously many modifications and variations are possible in view of the above teachings. The embodiments were chosen and described in order to best explain the principles of the invention and its practical applications, thereby enabling others skilled in the art to best utilize the invention and various embodiments with various modifications as are suited to the particular use contemplated. It is intended that the following claims and their equivalents define the scope of the invention.