{"id":356,"date":"2023-04-24T23:10:38","date_gmt":"2023-04-24T23:10:38","guid":{"rendered":"https:\/\/nau.edu\/research\/?page_id=356"},"modified":"2024-12-12T18:19:41","modified_gmt":"2024-12-12T18:19:41","slug":"generation-of-keys-with-variable-length","status":"publish","type":"page","link":"https:\/\/in.nau.edu\/research\/innovations\/available-technologies\/cybersecurity\/generation-of-keys-with-variable-length\/","title":{"rendered":"Generation of Keys with Variable Length from Cryptographic Tables"},"content":{"rendered":"<div class=\"nau-block nau-block-left-nav-top-bound\">\n    \t<button id=\"left-nav-toggle-btn\" onclick=\"toggleNav();\">\n\t\tON THIS PAGE \n\t\t<i id=\"chevron-icon\" class=\"fas fa-solid fa-chevron-down\"><\/i>\n\t<\/button>\n\t<div id=\"left-nav-menu-track\">\n\t\t<div id=\"left-nav-wrapper\">\n\t\t\t<div class=\"rfi-above-anchor-tags\">\n\t\t\t\t<div class=\"ri-container\">\n\t\t\t\t\t<a href=\"https:\/\/nau.edu\/admissions\/request-information\/\" id=\"request-info\" class=\"btn bg-true-blue left-nav-menu-bottom-button display-mobile\">Request info&nbsp;&nbsp;<\/a>\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t<div id=\"left-nav-menu\">\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"menu-section backcolor\">\n\t\t\t\t\t<div class=\"header\">\n\t\t\t\t\t\tHOW CAN WE HELP?\t\t\t\t\t<\/div>\n\t\t\t\t\t<ul class=\"responsive-icons\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><a href=\"tel:928-523-4620\"><img decoding=\"async\" src=\"https:\/\/in.nau.edu\/wp-content\/themes\/nau-marketing-2021\/img\/icon-phone.svg\" alt=\"Telephone:\"> 928-523-4620<\/a>\n\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t\t\t\t\t<li><a href=\"mailto:nauinnovations@nau.edu\"><img decoding=\"async\" src=\"https:\/\/in.nau.edu\/wp-content\/themes\/nau-marketing-2021\/img\/icon-email.svg\" alt=\"Email:\"><span class=\"left-nav-email\"> nauinnovations&#8203;@nau.edu <\/span><\/a><\/li>\n\t\t\t\t\t<\/ul>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\n\t\t\t<\/div>\n\t\t<\/div>\n\t<\/div>\n<\/div>\n\n<section class=\"nau-block left-nav-section\"><header class=\"entry-header\"><div class=\"breadcrumb\"><ol class=\"breadcrumbs\"><li><a href=\"https:\/\/in.nau.edu\">IN<\/a><span class=\"breadcrumb-chevron\" aria-hidden=\"true\">&gt;<\/span><\/li><li><a href=\"https:\/\/in.nau.edu\/research\">Research<\/a><span class=\"breadcrumb-chevron\" aria-hidden=\"true\">&gt;<\/span><\/li><li class=\"current\">Pages<\/li><\/ol><\/div><h1 class=\"entry-title text-left \">Generation of Keys with Variable Length from Cryptographic Tables<\/h1><hr class=\"h1-hr  text-left \" role=\"none\"><\/header><!-- .entry-header --><\/section><!-- <section class=\"nau-block left-nav-section grid-md-12\">\n    <header class=\"entry-header\">\n        <h1 class=\"entry-title text-left \" tabindex=\"0\" id=\"h1-first\">Dummy H1<\/h1>\n        <hr class=\"h1-hr  text-left \" role=\"none\">\n    <\/header>\n<\/section> -->\n\n<section class=\"nau-block left-nav-section grid-md-12\">\n    <div class=\"page-content\">\n        \n\n<h2 class=\"wp-block-heading\">Description<\/h2>\n\n\n\n<p>The technology relates to the generation of keys with variable length (KVLs) that is in the same order of magnitude as the plain text to encrypt. Simple encryption methods such as exclusive or operation (XOR) can be used to securely encrypt plain text. In addition, the method is based on public keys exchanged freely through unsecured communication channels. The scheme is based on cryptographic tables that contain large quantities of random numbers. These tables are securely exchanged between the communicating parties, during a personalization protocol that occurs upfront. The public keys contain the information necessary to allow the communicating parties to independently generate the KVL from the shared cryptographic tables. The public keys can be changed as often as necessary and become single-use. The cryptographic tables can contain binary, ternary, or other multi-state data streams.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Additional information <\/h2>\n\n\n\n<section  \n    class=\"nau-block nau-block-panels   \" \n    data-layout_mobile=\"groupLayout-Stack gutter_Default panelLayoutPhotoTextVertical  photoAspect-1-1\"\n        data-layout_tablet=\"groupLayout-Stack gutter_Default panelLayoutPhotoTextVertical  photoAspect-1-1\"\n        data-layout_desktop=\"groupLayout-Tabs gutter_Default panelLayoutPhotoTextVertical  photoAspect-1-1\"\n        data-layout_xl=\"groupLayout-Tabs gutter_Default panelLayoutPhotoTextVertical  photoAspect-1-1\">\n\n    <div class=\"background-wrapper\">\n        <div class=\"block-main-content\">\n            \n            \n                            <div class=\"tab-nav\" role=\"tablist\" aria-label=\"Tabs for  articles\">\n                                                \n                        <button data-panel=\"panel--0\"\n                            role=\"tab\"\n                            aria-controls=\"panel--0\"\n                            class=\"active bg-true-blue bg-none\"\n                            tabindex=\"0\">Patent number and inventor<\/button>\n                                                \n                        <button data-panel=\"panel--1\"\n                            role=\"tab\"\n                            aria-controls=\"panel--1\"\n                            class=\"after-active bg-true-blue bg-none\"\n                            tabindex=\"-1\">Potential applications<\/button>\n                                                \n                        <button data-panel=\"panel--2\"\n                            role=\"tab\"\n                            aria-controls=\"panel--2\"\n                            class=\" bg-true-blue bg-none\"\n                            tabindex=\"-1\">Benefits and advantages<\/button>\n                                                \n                        <button data-panel=\"panel--3\"\n                            role=\"tab\"\n                            aria-controls=\"panel--3\"\n                            class=\" bg-true-blue bg-none\"\n                            tabindex=\"-1\">Case number and licensing status<\/button>\n                                    <\/div>\n            \n            \n            \n            <div class=\"panel-wrapper\">\n                \n                                \n                        <div class=\"panel bg-true-blue  panelTypeText  noHover \"\n                            data-role=\"tabpanel\"\n                            data-panel=\"panel--0\"\n                            id=\"panel--0\">\n\n                            \n                                                                    <div class=\"content\">\n                                            <div class=\"text-wrapper\">\n                                                                                                <h3 class=\"h3-tab-index\">Patent number and inventor<\/h3>\n                                                \n                                                                                                    <div class=\"text\">\n                                                        <p>16\/237,366<\/p>\n<p>Bertrand Cambou<\/p>\n                                                    <\/div>\n                                                \n                                                                                            <\/div>\n                                        <\/div>\n\n                                    \n                                \n                                                        <\/div>\n                    \n                        <div class=\"panel bg-true-blue  panelTypeText  noHover \"\n                            data-role=\"tabpanel\"\n                            data-panel=\"panel--1\"\n                            id=\"panel--1\">\n\n                            \n                                                                    <div class=\"content\">\n                                            <div class=\"text-wrapper\">\n                                                                                                <h3 class=\"h3-tab-index\">Potential applications<\/h3>\n                                                \n                                                                                                    <div class=\"text\">\n                                                        <p>This technology is designed for use with cybersecurity and data encryption.<\/p>\n                                                    <\/div>\n                                                \n                                                                                            <\/div>\n                                        <\/div>\n\n                                    \n                                \n                                                        <\/div>\n                    \n                        <div class=\"panel bg-true-blue  panelTypeText  noHover \"\n                            data-role=\"tabpanel\"\n                            data-panel=\"panel--2\"\n                            id=\"panel--2\">\n\n                            \n                                                                    <div class=\"content\">\n                                            <div class=\"text-wrapper\">\n                                                                                                <h3 class=\"h3-tab-index\">Benefits and advantages<\/h3>\n                                                \n                                                                                                    <div class=\"text\">\n                                                        <p>The primary advantage of KVLs is to ease the secure generation of long keys. Encryption methods such as exclusive or operation (XOR)-employing KV are extremely secure, particularly when the length of the key is comparable to the length of the plain text to encrypt it. In addition, the method is low-cost, fast, and implementable with client devices having low computing power, such as the Internet of Things. The addressable public key (PKA) exchange scheme does not need the computing power of other public key infrastructure (PKI) protocols.<\/p>\n                                                    <\/div>\n                                                \n                                                                                            <\/div>\n                                        <\/div>\n\n                                    \n                                \n                                                        <\/div>\n                    \n                        <div class=\"panel bg-true-blue  panelTypeText  noHover \"\n                            data-role=\"tabpanel\"\n                            data-panel=\"panel--3\"\n                            id=\"panel--3\">\n\n                            \n                                                                    <div class=\"content\">\n                                            <div class=\"text-wrapper\">\n                                                                                                <h3 class=\"h3-tab-index\">Case number and licensing status<\/h3>\n                                                \n                                                                                                    <div class=\"text\">\n                                                        <p>2018-004<\/p>\n<p>This invention is available for licensing.<\/p>\n                                                    <\/div>\n                                                \n                                                                                            <\/div>\n                                        <\/div>\n\n                                    \n                                \n                                                        <\/div>\n                                                <\/div>\n\n                    <\/div>\n    <\/div>\n<\/section>\n\n    <\/div>\n<\/section>\n\n<div class=\"nau-block nau-block-left-nav-bottom-bound\">\n\n<\/div>","protected":false},"excerpt":{"rendered":"","protected":false},"author":276,"featured_media":1278,"parent":59,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"","_relevanssi_noindex_reason":"","ring_central_script_selection":"","footnotes":""},"class_list":["post-356","page","type-page","status-publish","has-post-thumbnail","hentry"],"acf":[],"_links":{"self":[{"href":"https:\/\/in.nau.edu\/research\/wp-json\/wp\/v2\/pages\/356","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/in.nau.edu\/research\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/in.nau.edu\/research\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/in.nau.edu\/research\/wp-json\/wp\/v2\/users\/276"}],"replies":[{"embeddable":true,"href":"https:\/\/in.nau.edu\/research\/wp-json\/wp\/v2\/comments?post=356"}],"version-history":[{"count":12,"href":"https:\/\/in.nau.edu\/research\/wp-json\/wp\/v2\/pages\/356\/revisions"}],"predecessor-version":[{"id":6146,"href":"https:\/\/in.nau.edu\/research\/wp-json\/wp\/v2\/pages\/356\/revisions\/6146"}],"up":[{"embeddable":true,"href":"https:\/\/in.nau.edu\/research\/wp-json\/wp\/v2\/pages\/59"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/in.nau.edu\/research\/wp-json\/wp\/v2\/media\/1278"}],"wp:attachment":[{"href":"https:\/\/in.nau.edu\/research\/wp-json\/wp\/v2\/media?parent=356"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}