Public Key Enciphering/ Deciphering Transformations Using a Conventional Algorithm
Original Publication Date: 1982-Aug-01
Included in the Prior Art Database: 2005-Feb-09
A method is disclosed for performing pseudo public-key enciphering/ deciphering transformations using a conventional cryptographic algorithm. In the present article, a data-encrypting key (K) is enciphered under a variant (KMX) of a host master key (KM0), with the resulting encipherment, i.e., E(KMX) (K), being used only for enciphering data. With this arrangement, the user who possesses the quantity E(KMX) (K) can only encipher data, whereas the user who possesses the quantity E(KM0) (K) can encipher and decipher data. Thus, E(KMX) (K) logically corresponds to a public (non-secret) key used in a public key cryptosystem while E(KM0) (K) logically corresponds to the private (secret) key used in the public key cryptosystem.