CPC H04L 9/0866 (2013.01) [H04L 9/0643 (2013.01); H04L 9/0825 (2013.01)] | 20 Claims |
1. A computer-implemented method, comprising:
providing, by a first device, a request to establish a secure communication with a second device communicatively coupled with the first device via a network;
hiding, by the first device, public keys based on a commutative legacy compatible encryption process sharing a modulus and based on quasi-Carmichael numbers larger than the modulus with quadratic residuals;
utilizing, by the first device, variable extendable-output function hashing, based on the modulus, with bloom filtering to generate an output that prevents creation of classical rainbow tables;
utilizing, by the first device, a key derivation function to generate a symmetric key based on the output; and
establishing, by the first device, the secure communication over the network with the second device based on the symmetric key.
|