-
公开(公告)号:US11750580B2
公开(公告)日:2023-09-05
申请号:US17592254
申请日:2022-02-03
Applicant: Avast Software s.r.o.
Inventor: Christopher Joseph O'Connell , Barna Csukas , Gabor Miklos , Vitalii Sydorovych , Rui Santos , Michal Hojsík
CPC classification number: H04L63/0457 , H04L9/065 , H04L9/14 , H04L9/3073 , H04L9/3242 , H04L63/0435 , H04L63/166
Abstract: A system, computer-readable storage medium, and method for secure network communication. A first device employs a first secret to establish a stream between the first and a second device. A third key, first ciphertext based on a first key, and hash of the first key are received from the second device by the first. A second key is applied to recover a second secret from the first ciphertext. The third key is encrypted to generate a second ciphertext including a third secret. Fourth and fifth keys are derived based on the first, second, and third secrets. A message authentication code is generated based on the fourth and third keys, first ciphertext, hash of the first key, and second ciphertext. The second ciphertext and message authentication code are transmitted by the first to the second device, and the fifth key is employed by the first device to modify the stream.
-
公开(公告)号:US20230247010A1
公开(公告)日:2023-08-03
申请号:US17592254
申请日:2022-02-03
Applicant: Avast Software s.r.o.
Inventor: Christopher Joseph O’Connell , Barna Csukas , Gabor Miklos , Vitalii Sydorovych , Rui Santos , Michal Hojsík
CPC classification number: H04L63/0457 , H04L9/14 , H04L9/065 , H04L9/3073 , H04L9/3242 , H04L63/166 , H04L63/0435
Abstract: A system, computer-readable storage medium, and method for secure network communication. A first device employs a first secret to establish a stream between the first and a second device. A third key, first ciphertext based on a first key, and hash of the first key are received from the second device by the first. A second key is applied to recover a second secret from the first ciphertext. The third key is encrypted to generate a second ciphertext including a third secret. Fourth and fifth keys are derived based on the first, second, and third secrets. A message authentication code is generated based on the fourth and third keys, first ciphertext, hash of the first key, and second ciphertext. The second ciphertext and message authentication code are transmitted by the first to the second device, and the fifth key is employed by the first device to modify the stream.
-