Abstract: The present disclosure provides a system and method for generating an encryption key for an input string. The system (100) comprises a data acquiring unit (102) to receive the input string comprising at least one character, and a converter (104) to convert the at least one character into an 8-bit binary representation. The system (100) comprises a sequence position identification unit (106) to determine index positions of a pre-defined binary value in the 8-bit binary representation, and generate a list of index values corresponding to the at least one character. The system (100) also includes an encryption key generation unit (108) configured to generate one or more character values of the encryption key based on mapping of each index value from the list of index values with corresponding character values selected from a pre-defined set of character values.
Description:TECHNICAL FIELD
[0001] The present disclosure relates generally to the field of data security and cryptographic systems. More specifically, the present disclosure relates to systems and methods for generating encryption keys to improve flexibility, security, and efficiency of cryptographic processes.
BACKGROUND
[0002] Encryption is a critical component of modern data protection technologies, ensuring the confidentiality, integrity, and authenticity of sensitive information transmitted across insecure networks. Given the growing reliance on digital communication and the increasing frequency of cyber threats, there is a significant need for advanced techniques to generate robust, secure encryption keys tailored to specific data inputs. Encryption involves transforming plaintext data into an unreadable format using an encryption algorithm and an encryption key. The security of an encrypted message heavily depends on the secrecy and unpredictability of the encryption key.
[0003] Traditionally, encryption keys can be either symmetric (the same key is used for both encryption and decryption) or asymmetric (a public-private key pair is used). However, regardless of the encryption scheme, the strength of the encryption system is directly tied to the method by which the key is generated, as well as how securely it is stored and exchanged. For any encryption scheme to be effective, the key must be complex enough to withstand brute-force attacks, where an attacker attempts to guess the key by systematically trying all possible combinations.
[0004] Modern encryption standards, such as the Advanced Encryption Standard (AES) and Rivest–Shamir–Adleman (RSA), use very large key sizes to prevent these attacks. However, the process of generating the key itself can be computationally intensive and susceptible to vulnerabilities. Thus, there is a need for a more efficient, adaptable, and secure method of generating encryption keys, particularly for dynamic or context-specific data.
[0005] In current cryptographic systems, encryption key generation is typically achieved through a random key generation mechanism, which involves utilizing Random Number Generators (RNGs) or pseudo-random number generators (PRNGs) to generate encryption keys. The randomness of these keys is crucial to ensuring that the key cannot be easily predicted or reproduced by attackers. However, achieving true randomness in computer systems is challenging, and poor-quality RNGs can lead to weak keys that are susceptible to attacks. Password-based key generation schemes are also common for generating encryption keys based on a password or passphrase. In such schemes, a user provides a secret password, which is then processed through a key derivation function (KDF) to generate an encryption key. While password-based systems are convenient, they suffer from vulnerabilities such as weak passwords, reuse of passwords across multiple platforms, and susceptibility to dictionary and brute-force attacks.
[0006] In asymmetric encryption systems like RSA, the generation of public and private key pairs is typically based on mathematical algorithms that rely on the difficulty of factoring large prime numbers. While these key pairs are secure, the generation process is computationally expensive, and the security of the system depends on the protection of the private key. Despite their wide adoption, these conventional methods for generating encryption keys often face limitations in terms of security, performance, and adaptability to specific contexts. Furthermore, as the volume and diversity of digital data grow, existing key generation methods are increasingly found to be inefficient or vulnerable in certain use cases, such as generating keys dynamically based on the content or context of the data itself.
[0007] Existing key generation techniques can be constrained by several factors. For instance, random or password-based key generation may fall prey to key prediction attacks if the underlying randomness is not sufficiently unpredictable or if passwords are weak. Many existing encryption techniques generate static keys that do not take into account the specific context or content of the data being encrypted. A generic key generation system might not be optimized for encrypting strings with varying levels of sensitivity or for applications where the data itself should influence the strength or characteristics of the key. As encryption systems scale to handle vast amounts of data in real-time applications, such as big data analytics, Internet of Things (IoT) devices, and cloud services, existing key generation methods may become a bottleneck, requiring too much time or computational power to generate robust encryption keys on the fly.
[0008] The increasing volume of digital data, coupled with the growing sophistication of cyber-attacks, underscores the need for a more adaptable, efficient, and secure method of generating encryption keys tailored to the specific data being encrypted. A more effective system could address the limitations of existing encryption key generation methods by allowing dynamic and context-sensitive encryption key generation that adapts to the content or characteristics of an input string, while enhancing the security of the encryption key by ensuring that it is resistant to known cryptographic attacks, such as brute-force, side-channel, or pattern-based attacks. Reducing reliance on external entropy sources, which may be vulnerable to weaknesses in random number generation, is also critical to ensuring the security of encryption keys.
[0009] Therefore, there is a need for a reliable solution that enables the generation of an encryption key for an input string while addressing the aforesaid deficiencies, providing a more robust and secure cryptographic solution. The present invention provides a novel system and method for generating encryption keys that overcome the shortcomings of existing encryption processes. The system and method enable the generation of encryption keys based on specific attributes of the input string, allowing for more secure, context-sensitive, and computationally efficient key generation for a variety of cryptographic applications. The present invention improves the overall performance and security of encryption infrastructure, particularly in environments where data is highly dynamic and where traditional key generation methods may fall short.
OBJECTS OF THE PRESENT DISCLOSURE
[0010] It is an object of the present disclosure to provide a system and method for generating context-sensitive encryption keys based on an input string, making the encryption keys more dynamic and adaptable to different use cases.
[0011] It is another object of the present disclosure to enhance the security of encryption keys by making them more resistant to traditional cryptographic attacks, such as brute-force or pattern recognition attacks.
[0012] It is another object of the present disclosure to provide a system and method capable of efficiently generating encryption keys without requiring excessive computational resources, making them suitable for real-time applications and large datasets.
[0013] It is another object of the present disclosure to provide a system that is efficiently scalable to handle large amounts of data, making it suitable for use in cloud computing, Internet of Things (IoT) devices, and other data-intensive applications.
[0014] These and other objects, features, and advantages of the present disclosure will become apparent from the following detailed description and the accompanying claims.
SUMMARY
[0015] Aspects of the present disclosure relate to a system and method for generating context-sensitive encryption keys based on an input string, making the keys more dynamic and adaptable to various use cases. The system ensures that the encryption keys are tailored to the specific characteristics of the input string, enhancing security by increasing their resistance to brute-force and pattern recognition attacks. Additionally, the system efficiently generates encryption keys without requiring excessive computational resources, making it suitable for real-time applications and large datasets. The system is also scalable, ensuring that it can handle vast amounts of data, making it ideal for use in cloud computing, Internet of Things (IoT) devices, and other data-intensive applications where rapid key generation is necessary for security and performance.
[0016] In an aspect, the present disclosure provides a system for generating an encryption key for an input string. The system includes a data acquiring unit configured to receive the input string including at least one character selected from one or more of alphabetic characters, numeric characters and special characters, and a converter configured to convert the at least one character of the input string into an 8-bit binary representation. The system includes a sequence position identification unit configured to determine one or more index positions of a pre-defined binary value in the 8-bit binary representation generated by the converter, and generate a list of index values corresponding to the at least one character of the input string based on said determination. The system also includes an encryption key generation unit configured to generate one or more character values of the encryption key based on mapping of each index value from the list of index values with corresponding character values selected from a pre-defined set of character values.
[0017] According to an embodiment, the pre-defined binary value may be selected as ‘1’.
[0018] According to an embodiment, the converter may include a character conversion unit configured to convert the at least one character of the input string into an American Standard Code for Information Interchange (ASCII) value. The converter may also include a binary conversion unit configured to convert the ASCII value generated by the character conversion unit into the 8-bit binary representation.
[0019] According to an embodiment, the one or more character values of the encryption key may include any or a combination of alphabetic characters, numeric characters and special characters.
[0020] According to an embodiment, each index value among the list of index values corresponding to each character of the at least one character of the input string may indicate the one or more index positions of the pre-defined binary value in the 8-bit binary representation pertaining to said character.
[0021] According to another aspect of the present disclosure, a method for generating an encryption key for an input string includes receiving the input string containing at least one character selected from one or more of alphabetic characters, numeric characters and special characters, and converting the at least one character of the input string into an 8-bit binary representation. The method may also include determining one or more index positions of a pre-defined binary value in the 8-bit binary representation generated during the conversion process, and generating a list of index values corresponding to the at least one character of the input string based on said determination. The method may further include generating one or more character values of the encryption key based on mapping of each index value from the list of index values with corresponding character values selected from a pre-defined set of character values.
[0022] According to an embodiment, the pre-defined binary value may be selected as ‘1’.
[0023] According to an embodiment, the step of converting (204) may include converting the at least one character of the input string into an American Standard Code for Information Interchange (ASCII) value, and then converting the ASCII value into the 8-bit binary representation.
[0024] According to an embodiment, each index value among the list of index values corresponding to each character of the at least one character of the input string may indicate the one or more index positions of the pre-defined binary value in the 8-bit binary representation pertaining to said character.
[0025] Various objects, features, aspects and advantages of the inventive subject matter will become more apparent from the following detailed description of preferred embodiments, along with the accompanying drawing figures in which like numerals represent like components.
BRIEF DESCRIPTION OF THE DRAWINGS
[0026] The accompanying drawings are included to provide a further understanding of the present disclosure, and are incorporated in and constitute a part of this specification. The drawings illustrate exemplary embodiments of the present disclosure and, together with the description, serve to explain the principles of the present disclosure.
[0027] FIG. 1 illustrates an exemplary schematic representation of a system for generating an encryption key for an input string, in accordance with an embodiment of the present disclosure;
[0028] FIG. 2 illustrates an exemplary flow chart representation of a method for generating an encryption key for an input string, in accordance with an embodiment of the present disclosure;
[0029] FIG. 3 shows an exemplary flow chart representation of a process of conversion of one or more characters of the input string into an 8-bit binary representation, in accordance with an embodiment of the present disclosure;
[0030] FIG. 4 illustrates an exemplary flow chart representation of a process of the method for generating a list of index values corresponding to each character of the input string, in accordance with an embodiment of the present disclosure; and
[0031] FIG. 5 illustrates an exemplary flow chart representation of a process of the method for generating character values of the encryption key, in accordance with an embodiment of the present disclosure.
DETAILED DESCRIPTION
[0032] The following is a detailed description of embodiments of the disclosure depicted in the accompanying drawings. The embodiments are in such details as to clearly communicate the disclosure. However, the amount of detail offered is not intended to limit the anticipated variations of embodiments; on the contrary, the intention is to cover all modifications, equivalents, and alternatives falling within the scope of the present disclosures as defined by the appended claims.
[0033] Embodiments described herein relate to a system and method for generating encryption keys that are tailored to specific context of an input string, making the keys more dynamic and adaptable to a wide range of use cases. Unlike traditional static encryption keys, this approach customizes the key generation process based on the unique characteristics of the data being encrypted, enhancing both the security and flexibility of the system. By linking the encryption key to the context-specific information of the input string, the system and method increase the unpredictability and complexity of the key, making it more resistant to common cryptographic attacks such as brute-force and pattern recognition attempts. Additionally, the system is configured to be computationally efficient, enabling rapid key generation even in real-time applications and large-scale datasets without excessive resource consumption. Its scalability ensures that it can handle large volumes of data across diverse environments, such as cloud computing and big data analytics, where quick and secure encryption is critical. This makes the system and method highly versatile, capable of adapting to the demands of modern, data-heavy applications while maintaining high security and performance standards.
[0034] FIG. 1 illustrates an exemplary schematic representation of a system 100 for generating an encryption key based on an input string that may contain at least one character selected from any combination of alphabetic characters, numeric characters, and special characters. The system 100 facilitates the generation of the encryption key by utilizing context-specific information derived from the input string. The system 100 includes a data acquiring unit 102, which is configured to receive the input string from a computing device, such as a smartphone, personal computer, computing terminal, and the like. The data acquiring unit 102 may be operatively connected to the computing device either wirelessly or through a wired connection, ensuring flexibility in how the input string is received for encryption.
[0035] The system 100 also includes a converter 104 configured to convert one or more characters from the input string into an 8-bit binary representation. This binary representation contains 8 index positions, each storing a binary value of either ‘0’ or ‘1’. The converter 104 may include a character conversion unit 104-1 configured to convert each character of the input string into its corresponding American Standard Code for Information Interchange (ASCII) value. Additionally, the converter 104 may include a binary conversion unit 104-2, which further converts the generated ASCII values into the 8-bit binary format.
[0036] The system 100 also includes a sequence position identification unit 106, which is configured to determine the index positions of a predefined binary value (e.g., ‘1’) within the 8-bit binary representation generated by the converter 104. In an exemplary embodiment, the sequence position identification unit 106 identifies the index positions that contain the binary value ‘1’. The sequence position identification unit 106 then generates a list of index values corresponding to each character of the input string based on the identified positions. Each index value in this list pertains to a specific character in the input string, ensuring that the index values are correctly mapped to the all characters of the input string.
[0037] In an exemplary embodiment, each index value in the list generated by the sequence position identification unit 106 corresponds to the position(s) within the 8-bit binary representation for each character of the input string, where the predefined binary value (such as ‘1’) occurs. These index positions are crucial for the accurate mapping of the binary values to the characters of the input string, where each character has its own corresponding set of index values.
[0038] The system 100 also includes an encryption key generation unit 108 configured to generate one or more character values of the encryption key. The encryption key generation unit 108 maps each index value from the list of index values with corresponding character values selected from a pre-defined set of character values, to generate the character values of the encryption key. The character values may contain any or a combination of alphabetic characters, numeric characters, and special characters.
[0039] In an exemplary embodiment, various “units” of the system 100, including the data acquiring unit 102, the character conversion unit 104-1, the binary conversion unit 104-2, the sequence position identification unit 106, and the encryption key generation unit 108, may be implemented using various hardware configurations or a combination of software and hardware features. For instance, such units may incorporate microcontrollers, switches, relays, gates, and specialized hardware features like application-specific integrated circuits (ASICs), electrically erasable programmable read-only memories (EEPROMs), or field-programmable gate arrays (FPGAs). In some cases, memory components like non-volatile random access memory (RAM) or read-only memory (ROM) may also form part of the units. In another embodiment, the various units may be entirely software-based, operating either as part of an operating system or as an application running on one. The units may be connected to one another either wirelessly or in a wired configuration.
[0040] FIG. 2 illustrates an exemplary flow chart representation of a method 200 for generating an encryption key for an input string. The method 200 is performed by the system 100 depicted in FIG. 1. The method 200 facilitates generation of encryption keys based on context-specific information contained within an input string having one or more characters selected from any or a combination of alphabetic characters, numeric characters and special characters. The method 200 includes, at step 202, receiving or acquiring, by the data acquiring unit 102 of the system 100, the input string from a computing device, and, at step 204, converting, by the converter 104 of the system 100, each character of the input string into an 8-bit binary representation. This binary representation contains 8 index positions, each storing a binary value of either ‘0’ or ‘1’. The step 204 of conversion may include converting, by a character conversion unit 104-1 of the converter 104, each character of the input string into its corresponding ASCII value. The step 204 of converting may also include converting, by a binary conversion unit 104-2 of the converter 104, the generated ASCII values into the 8-bit binary format/representation.
[0041] The method 200 includes a step 206 of determining, by the sequence position identification unit 106 of the system 100, one or more index positions within the 8-bit binary representation that contain a pre-defined binary value (e.g., ‘1’) to facilitate generation of the encryption key. In an exemplary embodiment, the step 206 of the method 200 involves identifying the index positions within the 8-bit binary representation of the input string that contain the binary value ‘1’. The step 206 also involves generating a list of index values corresponding to each character of the input string based on the identified index positions that contain the binary value ‘1’. Each index value in this list pertains to a specific character in the input string, ensuring that the index values are correctly mapped to the all characters of the input string.
[0042] In an exemplary embodiment, each index value in the list generated during step 206 of the method 200 represents the index position(s) within the 8-bit binary representation of each character in the input string where the pre-defined binary value (e.g., ‘1’) appears. These index positions play a critical role in accurately associating binary values with their respective characters, as each character in the input string has a unique set of corresponding index values.
[0043] The method 200 includes a step 208 of generating, by the encryption key generation unit 108 of the system 100, one or more character values of an encryption key based on mapping of each index value from the list of index values with corresponding character values selected from a pre-defined set of character values. These character values may contain any or a combination of alphabetic characters, numeric characters, and special characters.
[0044] Referring now to FIG. 3, an exemplary flow chart illustrates the step/process 204 for converting each character of the input string into its corresponding 8-bit binary representation. When the data acquiring unit 102 of the system 100 receives an input string containing one or more characters, the data acquiring unit 102 first determines the length of the input string, which indicates the total number of characters present, as shown in block 302. Following this, at block 304, the data acquiring unit 102 may generate an array comprising two values including a first value representing the length of the input string, and a second value denoting the fixed length of the binary representation, which is 8 bits. At block 306, the character conversion unit 104-1 initiates a loop to iterate through each character in the input string. For every character, the character conversion unit 104-1 retrieves its corresponding American Standard Code for Information Interchange (ASCII) value from a pre-defined table or a remote server, as depicted in block 308. Subsequently, at block 310, the binary conversion unit 104-2 converts each ASCII value into an 8-bit binary string. Thereafter, at block 312, each resulting 8-bit binary string is stored in a binary vector, which holds the binary representations of all characters in the input string in a structured format for further processing. The binary vector may also store or have access to the array generated by the data acquiring unit 102 at block 304.
[0045] FIG. 4 illustrates an exemplary flowchart representation of process 206 of method 200, which involves generating a list of index values corresponding to each character of the input string. This process 206 is performed by the sequence position identification unit 106. Following the storage of the 8-bit binary strings in the binary vector at block 312, the process 206 continues with iterating through each row of the binary vector, as shown in block 402. This iteration is performed to identify the presence of the pre-defined binary value (for example, ‘1’) within each 8-bit binary string stored in the binary vector. At block 404, the sequence position identification unit 106 determines the index positions within each binary string where the pre-defined binary value appears. These index positions indicate the specific locations in the binary string where the pre-defined binary value ‘1’ is present. Once identified, at block 406, the sequence position identification unit 106 stores these index positions in an index vector, with each set of positions corresponding to the binary string, and therefore, the original character, from which it was derived. The index vector forms the basis for further mapping in the encryption key generation process.
[0046] FIG. 5 illustrates an exemplary flow chart representation of process 208 of method 200, which involves generating character values of the encryption key. The process 208 is performed by the encryption key generation unit 108. After the index positions corresponding to each character of the input string have been stored in the index vector at block 406, the process 208 begins with iterating through a list of index values, as shown in block 502. Each index value in this list corresponds to the pre-defined bit positions (e.g., where the value ‘1’ occurs) within the 8-bit binary representation for each character of the input string. At block 504, the index values associated with each character are concatenated to form a numeric value, effectively compressing the position data into a single number for each character. These numeric values are then stored in an encryption vector or array, as indicated in block 506. Next, at block 508, each numeric value in the encryption vector is mapped to a pre-defined table containing a plurality of character values. This table defines a correlation between the numeric values and corresponding characters, which may include alphabetic, numeric, or special characters. The character values resulting from this mapping process constitute the components of the encryption key. Since the encryption key is derived from the specific binary patterns of the input string, the resulting encryption key is context-sensitive and unique to the input string. This enhances the security and robustness of the encrypted data by generating keys that are less predictable and more resistant to conventional cryptographic attacks.
[0047] EXAMPLE 1
[0048] In an exemplary implementation, if the input string received by the data acquiring unit 102 contains plain text “Hello”, the character conversion unit 104-1 determines ASCII values for each character of the input strings, as follows:
H → 72
e → 101
l → 108
l → 108
o → 111
[0049] After obtaining the ASCII values, the binary conversion unit 104-2 converts each ASCII value into an 8-bit binary representation to standardize the data for further processing, as shown below:
72 → 01001000
101 → 01100101
108 → 01101100
108 → 01101100
111 → 01101111
[0050] Thereafter, the sequence position identification unit 106 identifies sequence position of the binary value ‘1’ in each 8-bit binary string, to extract the index positions where the binary value ‘1’ appears in each binary string, forming a point list as shown below:
01001000 → Positions: [2, 5]
01100101 → Positions: [1, 2, 6, 8]
01101100 → Positions: [1, 2, 4, 5]
01101100 → Positions: [1, 2, 4, 5]
01101111 → Positions: [1, 2, 4, 5, 6, 7, 8]
[0051] This point list is essential for structuring the encryption key. After generation of the point list, the encryption key generation unit 108 maps each point value to a corresponding character value available in a pre-defined table that defines correlation between the point values and the character values. This mapping is done based on a pre-defined scheme (e.g., using ASCII characters, hexadecimal values, or a predefined encoding scheme). An example of the mapping process is as follows:
[0052] For the index positions [2, 5] pertaining to the character “H” of the input string, the point value is “25”. For the index positions [1, 2, 6, 8] pertaining to the character “e” of the input string, the point value is “12” and “68”. For the index positions [1, 2, 4, 5] pertaining to the character “l” of the input string, the point value is “12” and “45”. For the index positions [1, 2, 4, 5, 6, 7, 8] pertaining to the character “o” of the input string, the point value is “12”, “45” , “67” and “8”. The encryption key generation unit 108 may map these point values to specific character values in the pre-defined table, to obtain the relevant character values to form the encryption key. This process continues until the entire length of the input string is processed, ensuring that each character contributes uniquely to the encryption key. After processing the entire length of the input string, the resulting encryption key is a structured representation derived from the input characters’ binary properties and sequence patterns. This makes the encryption key unique and secure, enhancing encryption strength.
[0053] EXAMPLE 2
[0054] In another exemplary implementation, if the input string received by the data acquiring unit 102 contains the plain text “AI RandomTees LLC”, the character conversion unit 104-1 first determines the ASCII values corresponding to each character in the input string, as shown in Table 1 below. Once the ASCII values are obtained, the binary conversion unit 104-2 converts each value into its 8-bit binary representation, ensuring a standardized binary format for subsequent processing. Table 1 also includes a point list that presents multiple point values, which are calculated based on the identified index positions where the binary value ‘1’ appears within each 8-bit binary string.
Character(s) ASCII value(s) Binary string Index value(s) Character value(s)
A 65 01000001 [1, 2], [1, 8] \x0c\x12
I 73 01001001 [2, 2], [2, 5] \x16\x19\x1c
32 00100000 [3, 3]] !
R 82 01010010 [4, 2], [4, 4], [4, 7] *,/
a 97 01100001 [5, 2], [5, 3], [5, 8] 45:
n 110 01101110 [6, 2], [6, 3], [6, 5], [6, 6], [6, 7] >?ABC
d 100 01100100 [7, 2], [7, 3], [7, 6] HIL
o 111 01101111 [8, 2], [8, 3], [8, 5], [8, 6], [8, 7], [8, 8] RSUVWX
m 109 01101101 [9, 2], [9, 3], [9, 5], [9, 6], [9, 8] \]_`b
T 84 01010100 [10, 2], [10, 4], [10, 6] fhj
r 114 01110010 [11, 2], [11, 3], [11, 4], [11, 7] pqru
e 101 01100101 [12, 2], [12, 3], [12, 6], [12, 8] z{~\x80
e 101 01100101 [13, 2], [13, 3], [13, 6], [13, 8] \x84\x85\x88\x8a
s 115 01110011 [14, 2], [14, 3], [14, 4], [14, 7], [14, 8] \x8e\x8f\x90\x93\x94
32 00100000 [15, 3] \x99
L 76 01001100 [16, 2], [16, 5], [16, 6] ¢¥¦
L 76 01001100 [17, 2], [17, 5], [17, 6] ¬¯°
C 67 01000011 [18, 2], [18, 7], [18, 8] ¶»¼
Encryption Key '\x0c\x12\x16\x19\x1c!*,/45:>?ABCHILRSUVWX\\]_`bfhjpqruz{~\x80\x84\x85\x88\x8a\x8e\x8f\x90\x93\x94\x99¢¥¦¬¯°¶»¼'
Table 1
[0055] Once the point list is generated, the encryption key generation unit 108 maps each point value to a corresponding character from a predefined table. This mapping is carried out using a specific scheme, which may involve ASCII characters, hexadecimal values, or another predefined encoding method. After retrieving the appropriate character values from the table, the final encryption key is assembled, as shown in the last row of Table 1. This key is a structured output derived from the binary characteristics and positional patterns of the input string, resulting in a unique and secure encryption key that strengthens the overall encryption process.
[0056] Thus, the system and method of the present disclosure facilitate generation of encryption keys that are tailored to the specific context of input strings, making them more dynamic and adaptable than traditional static keys. By using characteristics unique to the input strings, the system increases the complexity and unpredictability of the encryption keys, improving resistance to attacks such as brute-force and pattern recognition. Designed for efficiency, the system enables fast key generation suitable for real-time and large-scale applications without heavy computational demands. The system is also scalable, making it well-suited for data-intensive environments like cloud computing and big data analytics, where quick and secure encryption is essential. This versatility allows the system and method to meet the high-performance and security needs of modern applications.
[0057] While the foregoing describes various embodiments of the invention, other and further embodiments of the invention may be devised without departing from the basic scope thereof. The scope of the invention is determined by the claims that follow. The invention is not limited to the described embodiments, versions or examples, which are included to enable a person having ordinary skill in the art to make and use the invention when combined with information and knowledge available to the person having ordinary skill in the art.
ADVANTAGES OF THE PRESENT DISCLOSURE
[0058] The present disclosure provides a system and method for generating context-sensitive encryption keys based on an input string, making the encryption keys more dynamic and adaptable to a variety of use cases. This ensures that the encryption keys are not static or uniform, but rather tailored to the specific characteristics of the data being encrypted. Such adaptability enables the system and method to more effectively meet the security needs of diverse applications, ranging from simple file encryption to more complex, data-driven scenarios.
[0059] The present disclosure provides a system and method that enhance security of encryption keys by making them more resistant to traditional cryptographic attacks, such as brute-force and pattern recognition attacks. By generating encryption keys that are intricately tied to the input string and its binary representation, the system and method increase the unpredictability and complexity of the keys, thereby reducing the likelihood that attackers can successfully guess or deduce the encryption key using conventional methods. This added layer of security strengthens the overall cryptographic defense against unauthorized decryption.
[0060] The present disclosure provides a system and method capable of efficiently generating encryption keys without requiring excessive computational resources, making them particularly suitable for real-time applications and large datasets. The system optimizes the key generation process, ensuring that it can scale effectively with the volume of data being encrypted. This efficiency ensures that encryption remains feasible even in high-demand environments, where time and computational capacity may be limited, such as in live data streams or large-scale data processing systems.
[0061] The present disclosure provides a system and method that are efficiently scalable to handle large amounts of data, making it suitable for use in cloud computing, Internet of Things (IoT) devices, and other data-intensive applications. As these platforms often deal with vast quantities of data and require the processing of large numbers of encryption keys in real time, the scalability of the system ensures that it can meet the demands of such environments. Whether for cloud storage systems, IoT security, or big data analytics, the system’s ability to generate encryption keys rapidly and at scale makes it a versatile solution for modern, data-heavy applications.
, Claims:1. A system (100) for generating an encryption key for an input string, comprising:
a data acquiring unit (102) configured to receive the input string comprising at least one character selected from one or more of alphabetic characters, numeric characters and special characters;
a converter (104) configured to convert the at least one character of the input string into an 8-bit binary representation;
a sequence position identification unit (106) configured to determine one or more index positions of a pre-defined binary value in the 8-bit binary representation generated by the converter (104), and generate a list of index values corresponding to the at least one character of the input string based on said determination; and
an encryption key generation unit (108) configured to generate one or more character values of the encryption key based on mapping of each index value from the list of index values with corresponding character values selected from a pre-defined set of character values.
2. The system (100) as claimed in claim 1, wherein the pre-defined binary value is ‘1’.
3. The system (100) as claimed in claim 1, wherein the converter (104) comprises a character conversion unit (104-1) configured to convert the at least one character of the input string into an American Standard Code for Information Interchange (ASCII) value.
4. The system (100) as claimed in claim 3, wherein the converter (104) comprises a binary conversion unit (104-2) configured to convert the ASCII value generated by the character conversion unit (104-1) into the 8-bit binary representation.
5. The system (100) as claimed in claim 1, wherein the one or more character values of the encryption key comprise any or a combination of alphabetic characters, numeric characters and special characters.
6. The system (100) as claimed in claim 1, wherein each index value among the list of index values corresponding to each character of the at least one character of the input string indicates the one or more index positions of the pre-defined binary value in the 8-bit binary representation pertaining to said character.
7. A method (200) for generating an encryption key for an input string, comprising the steps of:
receiving, by a data acquiring unit (102), the input string comprising at least one character selected from one or more of alphabetic characters, numeric characters and special characters;
converting, by a converter (104), the at least one character of the input string into an 8-bit binary representation;
determining, by a sequence position identification unit (106), one or more index positions of a pre-defined binary value in the 8-bit binary representation generated by the converter (104), and generating a list of index values corresponding to the at least one character of the input string based on said determination; and
generating, by an encryption key generation unit (108), one or more character values of the encryption key based on mapping of each index value from the list of index values with corresponding character values selected from a pre-defined set of character values.
8. The method (200) as claimed in claim 7, wherein the pre-defined binary value is ‘1’.
9. The method (200) as claimed in claim 7, wherein the step of converting comprises:
converting, by a character conversion unit (104-1) of the converter (104), the at least one character of the input string into an American Standard Code for Information Interchange (ASCII) value; and
converting, by a binary conversion unit (104-2) of the converter (104), the ASCII value generated by the character conversion unit (104-1) into the 8-bit binary representation.
10. The method (200) as claimed in claim 7, wherein each index value among the list of index values corresponding to each character of the at least one character of the input string indicates the one or more index positions of the pre-defined binary value in the 8-bit binary representation pertaining to said character.
| # | Name | Date |
|---|---|---|
| 1 | 202541045328-STATEMENT OF UNDERTAKING (FORM 3) [10-05-2025(online)].pdf | 2025-05-10 |
| 2 | 202541045328-POWER OF AUTHORITY [10-05-2025(online)].pdf | 2025-05-10 |
| 3 | 202541045328-FORM FOR SMALL ENTITY(FORM-28) [10-05-2025(online)].pdf | 2025-05-10 |
| 4 | 202541045328-FORM FOR SMALL ENTITY [10-05-2025(online)].pdf | 2025-05-10 |
| 5 | 202541045328-FORM 1 [10-05-2025(online)].pdf | 2025-05-10 |
| 6 | 202541045328-EVIDENCE FOR REGISTRATION UNDER SSI(FORM-28) [10-05-2025(online)].pdf | 2025-05-10 |
| 7 | 202541045328-EVIDENCE FOR REGISTRATION UNDER SSI [10-05-2025(online)].pdf | 2025-05-10 |
| 8 | 202541045328-DRAWINGS [10-05-2025(online)].pdf | 2025-05-10 |
| 9 | 202541045328-DECLARATION OF INVENTORSHIP (FORM 5) [10-05-2025(online)].pdf | 2025-05-10 |
| 10 | 202541045328-COMPLETE SPECIFICATION [10-05-2025(online)].pdf | 2025-05-10 |
| 11 | 202541045328-Proof of Right [19-05-2025(online)].pdf | 2025-05-19 |
| 12 | 202541045328-FORM-9 [03-07-2025(online)].pdf | 2025-07-03 |
| 13 | 202541045328-FORM-26 [15-07-2025(online)].pdf | 2025-07-15 |