US 12,170,728 B2
Providing communications that are secure from quantum computer models
Benjamin Glen McCarty, Washington, DC (US)
Assigned to Accenture Global Solutions Limited, Dublin (IE)
Filed by Accenture Global Solutions Limited, Dublin (IE)
Filed on Jul. 26, 2022, as Appl. No. 17/815,050.
Prior Publication US 2024/0039715 A1, Feb. 1, 2024
Int. Cl. H04L 9/08 (2006.01); H04L 9/06 (2006.01); H04L 9/30 (2006.01); H04L 9/32 (2006.01); H04L 9/40 (2022.01)
CPC H04L 9/0866 (2013.01) [H04L 9/0643 (2013.01); H04L 9/0825 (2013.01)] 20 Claims
OG exemplary drawing
 
1. A computer-implemented method, comprising:
providing, by a first device, a request to establish a secure communication with a second device communicatively coupled with the first device via a network;
hiding, by the first device, public keys based on a commutative legacy compatible encryption process sharing a modulus and based on quasi-Carmichael numbers larger than the modulus with quadratic residuals;
utilizing, by the first device, variable extendable-output function hashing, based on the modulus, with bloom filtering to generate an output that prevents creation of classical rainbow tables;
utilizing, by the first device, a key derivation function to generate a symmetric key based on the output; and
establishing, by the first device, the secure communication over the network with the second device based on the symmetric key.