Abstract: 7. ABSTRACT The present invention discloses a system for secure internal communication within an organization's data sharing comprises of AES 256 key generator module (102), a PQC key generator module (104), an Encapsulator module, a Key Decryptor module (112), a proxy communicator module, and a Key Database module (110). The AES 256 key generator module (102) configured to generate symmetric keys for encrypting exchanged data. The PQC key generator module (104) configured to generate public and private keys using post-quantum cryptography algorithms. The Encapsulator module configured to encrypt the symmetric key using the public key from the PQC key generator module (104) whereas the Key Decryptor module (112) configured to decrypt the PQC-encrypted symmetric key using the private key. A communicator module acting as the gateway for key exchange and data flow control and the Key Database module (110) for storing PQC-encrypted AES keys with associated metadata. This system and method provide organizations with a secure internal communication environment. The figure associated with abstract is Fig. 1.
DESC:4. DESCRIPTION
Technical Field of the Invention
The present invention relates to a system for information security. More particularly focuses on secure key generation, encryption, and communication mechanisms within an organization's data sharing infrastructure.
Background of the Invention
In the rapidly evolving landscape of digital communication and data sharing, organizations face mounting challenges in safeguarding their sensitive information against sophisticated cyber threats. With the proliferation of quantum computing looming on the horizon, traditional encryption methods are increasingly vulnerable, necessitating the development of innovative approaches to ensure data security. The field of cryptographic systems has been instrumental in addressing these concerns, offering encryption techniques to protect sensitive data during transmission and storage. However, the emergence of quantum computing presents a formidable challenge to conventional cryptographic systems, as quantum algorithms have the potential to break widely-used encryption standards such as RSA and ECC.
The problem of securing internal communication within organizations' data sharing infrastructure is compounded by the threat posed by quantum computing. While classical encryption methods like AES 256 provide robust security against classical attacks, they are susceptible to being compromised by quantum algorithms. This vulnerability threatens the confidentiality and integrity of sensitive information exchanged within organizational networks, posing significant risks to data privacy and organizational security.
Existing solutions in the realm of cryptographic systems have focused on enhancing encryption standards and protocols to mitigate the risks posed by quantum computing. Efforts have been made to develop post-quantum cryptography (PQC) algorithms that are resistant to quantum attacks, offering a potential solution to the looming threat of quantum computing. PQC algorithms, such as Crystal Kyber, leverage mathematical principles that are believed to withstand quantum cryptanalysis, providing a foundation for secure communication in the quantum era. However, integrating these PQC algorithms into existing communication systems presents technical challenges and requires careful consideration of compatibility and interoperability issues.
Despite advancements in PQC algorithms, there remains a pressing need for a comprehensive solution that seamlessly integrates classical and post-quantum cryptography to ensure secure internal communication within organizational networks. The limitations of existing approaches underscore the urgency of developing a robust cryptographic system that can withstand quantum attacks while maintaining compatibility with legacy systems and ensuring efficient key management.
The inventors of the present solution recognized the shortcomings of existing cryptographic systems in addressing the challenges posed by quantum computing. Motivated by the need for a more secure and resilient communication framework, they embarked on developing a quantum-resistant cryptographic system tailored specifically for internal communication within organizations. By leveraging the strengths of both classical encryption methods and post-quantum cryptography algorithms, the inventors sought to create a holistic solution that would provide comprehensive protection against quantum threats while ensuring compatibility and efficiency in key management and exchange processes.
The present solution represents a groundbreaking advancement in cryptographic systems, offering a sophisticated yet practical approach to secure internal communication within organizational networks. By developing a quantum-safe communication channel by using post-quantum algorithms and quantum random number generator. This solution facilitates secure generation and storage of AES256 keys between clients and servers within the organization through the utilization of quantum-resistant algorithms such as CRYSTALS-Kyber for key exchange and CRYSTALS-Dilithium for authentication. The AES-256 keys are generated by quantum random number generators, which can offer true randomness to the keys. The inventors' innovative approach addresses the fundamental challenges posed by quantum computing, offering organizations a reliable and future-proof solution for safeguarding their sensitive information in the quantum era.
In brief, the field of cryptographic systems is undergoing a paradigm shift in response to the imminent threat of quantum computing. The inventors of the present solution have identified the need for a comprehensive cryptographic system that can withstand quantum attacks while ensuring compatibility and efficiency in key management. By developing a quantum-resistant cryptographic system tailored for internal communication within organizations, the inventors have introduced a pioneering solution that promises to redefine the security landscape in the quantum era.
Brief Summary of the Invention
The following presents a simplified summary of the disclosure in order to provide a basic understanding to the reader. This summary is not an extensive overview of the disclosure and it does not identify key/critical elements of the invention or delineate the scope of the invention. Its sole purpose is to present some concepts disclosed herein in a simplified form as a prelude to the more detailed description that is presented later.
It is a primary objective of the invention is to establish a quantum-safe communication channel within an organization by employing a combination of post-quantum algorithms and quantum random number generator for key generation purpose.
It is yet another object of the invention, focuses on generating, encapsulating, and exchanging AES 256-bit symmetric keys, ensuring robust security and protection against quantum attacks.
It is yet another object of the invention is to offer a scalable and performance-optimized solution for secure internal communication, accommodating multiple users simultaneously.
It is yet another object of the invention is to provide an intuitive interface for a quantum-safe communication channel where client’s data routes through this secure channel via secure key generation, exchange, and quantum-safe algorithms, enhancing overall data security within the organization
According to an aspect of the present invention, system for secure internal communication within an organization's data sharing infrastructure is disclosed. The system comprises A proxy module, authentication and Key exchange module, user-authentication module, key generation module (Including QRNG), and database management module
In accordance with an aspect of the present invention, wherein the Key Generation Module, powered by QuRNG (built inhouse and integrated) in the QSleeve product, leverages quantum randomness to enhance the key generation process. By harnessing quantum-generated entropy, the module produces 256-bit AES keys characterized by robust encryption. This utilization of quantum randomness ensures that the generated keys possess a high degree of unpredictability and randomness, thereby bolstering the security of encrypted data and communication channels within the QSleeve.
In accordance with an aspect of the present invention, the Authentication and Key Exchange Module in QSleeve provides a crucial layer of security by authenticating users using certificates based on post-quantum cryptography (PQC) algorithms, ensuring robust verification processes resistant to potential threats posed by quantum computing advancements. Additionally, the module facilitates secure key exchange protocols to establish encrypted communication channels between users and servers, enhancing the confidentiality and integrity of data transmission.
In accordance with an aspect of the present invention, wherein The Proxy Module within QSleeve facilitates quantum-safe data transmission of application data, ensuring enhanced security through quantum-resistant encryption methods. Acting as an intermediary between the application and the recipient, the module seamlessly integrates with QSleeve's quantum-resistant algorithms and secure key management features. By employing advanced encryption techniques that are resistant to potential attacks from quantum computers, the Proxy Module adds an extra layer of protection to communication channels, safeguarding sensitive data against emerging cyber threats.
In accordance with an aspect of the present invention, wherein the Database Management Module in QSleeve plays a critical role in safeguarding various sensitive elements such as user credentials, AES keys, session details, and encryption keys to ensure the security of communication channels. By securely storing this information, the module prevents unauthorized access and potential breaches, thus maintaining the integrity and confidentiality of data exchanged within the QSleeve ecosystem.
In accordance with an aspect of the present invention, the system operates via distinctive functional components, comprising organizational functions that handle the generation and management of keys within the organizational framework, and client functions which facilitate secure processes for clients to receive and decrypt keys, ensuring robust communication channels.
Further scope of applicability of the present invention will become apparent from the detailed description given hereinafter. However, the detailed description and specific examples, while indicating preferred embodiments of the invention, will be given by way of illustration along with complete specification.
Brief Summary of the Drawings
The invention will be further understood from the following detailed description of a preferred embodiment taken in conjunction with an appended drawing, in which:
Fig. 1 illustrates a flow diagram of components involved in system, in accordance with an exemplary embodiment of the present invention;
Fig. 2 illustrates a block diagram of users with QSleeve server, in accordance with an exemplary embodiment of the present invention;
Fig. 3 illustrates a block diagram for organizational functions, in accordance with an exemplary embodiment of the present invention;
Fig. 4 illustrates a block diagram for client functions, in accordance with an exemplary embodiment of the present invention.
Detailed Description of the Invention
With the rise of digital communication channels in organizational networks, robust security measures are crucial to safeguard sensitive information from unauthorized access and cyber threats. Traditional cryptographic techniques, though effective, are under scrutiny due to the emergence of quantum computing, which poses significant challenges to data encryption security. In response, the Enhanced Quantum-Safe Communication Channel has been developed, merging the robustness of AES 256 symmetric key encryption utilizing quantum-random number generators with the resilience of post-quantum cryptography (PQC) algorithms. This comprehensive overview delves into the architecture, functionalities, and advantages of the system, highlighting its capability to protect sensitive data and counter cyber threats in organizational environments.
In today's interconnected digital landscape, securing internal communication channels within organizational networks is essential to safeguard sensitive information from unauthorized access and cyber threats. Encryption has long been a cornerstone of cybersecurity, with techniques such as AES 256 providing robust protection for data transmission. However, the advent of quantum computing presents new challenges to cryptographic systems, as quantum algorithms have the potential to compromise the confidentiality and integrity of encrypted data. To address these challenges and ensure the security of internal communication systems, the Enhanced Secure Internal Communication System leverages a combination of AES 256 encryption and post-quantum cryptography algorithms. This integration enhances the resilience of organizational networks against both conventional and potential quantum attacks, providing a comprehensive solution for secure data communication.
The foundation of the quantum-safe communication system is the Key Generator module. The Key Generation Module utilizes quantum randomness, powered by QuRNG, to produce 256-bit AES keys for encryption purposes. Quantum-random number generators (QRNGs) are employed to ensure the generation of truly random and unpredictable keys. By harnessing quantum randomness, the module enhances the security of AES keys, making them resistant to potential attacks from quantum computers. This ensures the confidentiality and integrity of encrypted data within the QSleeve. The Key Generation Module is integral to establishing secure communication channels and protecting sensitive information from cyber threats. The generated symmetric keys serve as the basis for encrypting and decrypting data exchanged between organizational systems, forming the cornerstone of the system's security architecture.
In conjunction with the AES 256 Key Generator Module, the system incorporates a Post-Quantum Cryptography (PQC) Key Generator Module. This module utilizes advanced cryptographic algorithms, such as Crystal Kyber, to generate pairs of public and private keys. Unlike traditional cryptographic methods, PQC algorithms offer resistance against potential quantum attacks, providing an additional layer of security to key generation processes within the system. By integrating PQC techniques, the system ensures the long-term security of cryptographic keys, mitigating the risk of compromise posed by emerging quantum technologies.
Once the symmetric key is generated by the AES 256 Key Generator Module, it is passed to the Encapsulator or Key Encryptor Module. This module is responsible for encapsulating the symmetric key using the public key obtained from the PQC Key Generator Module. By encrypting the symmetric key with PQC encryption algorithms, such as Crystal Kyber, the module ensures the confidentiality and integrity of the key during transmission between organizational systems. This encapsulation process mitigates the risk of interception or tampering by malicious entities, safeguarding the security of data communication within the network.
The Proxy Module serves as a middleman facilitating data transmission between clients and servers within QSleeve. Encrypted data passes through the proxy module, guaranteeing the secure transmission of application data and bolstering overall security. After securely establishing the AES keys using the Kyber encapsulation scheme and key generation using QuRNG, the data undergoes encryption using the generated AES keys. Subsequently, the encrypted data is routed through the proxy module between clients and servers. Moreover, the Proxy Module streamlines data transmission processes, ensuring efficient and dependable communication channels while upholding rigorous security standards.
Critical to the system's architecture is the Key Database Module, which acts as a secure repository for storing PQC-encrypted AES keys. The Database Management Module securely stores and manages user credentials, AES keys, session details, and other sensitive information on Server side. It implements robust encryption and access control mechanisms to safeguard data integrity and confidentiality. Access to stored data is restricted to authorized users, and stringent security measures are in place to prevent unauthorized access and potential breaches. This helps maintain the security and integrity of communication channels within the quantum-safe communication system.
On the receiving end, the Decryptor or Key Decryptor Module plays a crucial role in decrypting PQC-encrypted symmetric keys using the private key obtained from the PQC Key Generator Module. This module ensures the secure retrieval of symmetric keys for decryption purposes, enabling authorized organizational systems to access encrypted data transmitted within the network. By providing a secure mechanism for key decryption, the module ensures the confidentiality and integrity of data communication within the organizational network.
The Organizational, or the client functions code encompasses the operational functionalities of the Enhanced Secure Internal Communication System. This codebase drives key generation, encapsulation, decryption, communication control, and key storage processes within the system. By adhering to standardized protocols and security best practices, the codebase ensures seamless integration and interoperability across organizational systems and client interfaces. The codebase is designed to be modular and scalable, allowing for easy customization and adaptation to the specific security requirements of different organizational environments.
The Quantum-safe Communication System represents a significant advancement in securing internal communication channels within organizational networks. By integrating AES 256 encryption with post-quantum cryptography algorithms, the system offers a robust defense against cyber threats, ensuring the confidentiality, integrity, and availability of sensitive data. With its multi-layered security architecture and seamless integration capabilities, the system sets a new standard for secure internal communication systems, empowering organizations.
Referring to figures, Fig. 1 illustrates block diagram of method of secure internal communication within an organization's data sharing infrastructure, comprising the steps of:
a. AES 256 key generator module (102) generate a secure symmetric key of 256 bits.
b. Authentication module (103): Authenticate users using PQC algorithms based certificates
c. PQC key generator module (104) to generate a pair of public and private keys using post-quantum cryptography algorithms like Crystal Kyber.
d. Encapsulator or key encryptor module (106) to encrypt the symmetric key generated earlier using the public key obtained from the PQC key generator (104).
e. Proxy Module (220): Quantum-safe data transmission of application data via Qsleeve for enhanced security.
f. Implement the decryptor or key decryptor module (112) to decrypt the PQC-encrypted symmetric key using the private key obtained from the PQC Key generator.
g. Store the PQC-encrypted AES keys along with user credentials, AES keys, session details, and other sensitive information, securely in the key database module (110).
h. Organizational functions code executes the AES256 Key Generator (102), Authentication module (103), Kyber key generator (104), Kyber encryptor (106), Kyber decryptor (112), Key database (110), and Proxy-communicator module (108). Client functions code (114) executes the Kyber key generator (104), Kyber decryptor (112), and communicator modules (108).
i. Emphasize the seamless integration of AES 256 and post-quantum cryptography algorithms throughout the process, ensuring a robust defense against potential cyber threats and quantum attacks.
Fig. 2 illustrates the QSleeve server which supporting the integration of post-quantum cryptography (PQC) algorithms within the communication system. It acts as a facilitator, enabling the seamless incorporation of advanced PQC techniques, such as crystal Kyber, into the overall security framework. By providing a dedicated space for the integration of PQC algorithms, the QSleeve server enhances the system's resilience against potential quantum attacks, contributing to the robustness of key encapsulation (106) and exchange processes within the organization's (114) internal communication infrastructure.
Fig. 3 illustrates organizational functions within the proposed system involve the orchestration of key generation (104), encapsulation (106), and proxy communication (108) processes to maintain the internal security framework of the organization (114). These functions encompass the execution of the AES 256 Key Generator (102) for generating symmetric keys using QuRNG , the PQC key generator (104) for generating public and private key pairs using post-quantum cryptography algorithms, the encapsulator (106) for encrypting symmetric keys, the decryptor (112) for decrypting PQC-encrypted keys, the proxy communicator (108) for controlling key exchange and data flow, and the key database (110) for secure storage of keys (228) with associated metadata.
Fig. 4 illustrates client functionalities focus on the secure reception and decryption of keys for communication purposes. The PQC key generator (104), decryptor (112), and proxy communicator modules (108) are executed in the client functions code (114), allowing clients to securely obtain and decrypt AES keys for their communication needs. This clear division of functions ensures a comprehensive yet modular approach to secure internal communication within the organizational infrastructure.
The present invention pertains to secure internal communication system within an organisation's data sharing infrastructure integrating the strengths of AES 256 symmetric key encryption, where the keys are generated through QRNG (206) method and post-quantum cryptography algorithms like Crystal Kyber used for key exchange and dilithium based PQC certificates used for authentication, and these combinations of the system ensures a resilient defense against both conventional and potential quantum threats. The methodical execution of organizational and client functions, coupled with the dedicated QSleeve server for PQC algorithm integration, contributes to the overall efficiency and security of the communication process. With an emphasis on secure key generation, authentication, exchange, and management, the invention provides a comprehensive solution that addresses the evolving challenges of cyber security within organizational settings, establishing a foundation for trustworthy and protected data communication.
Advantages:
One of the primary advantages of the Quantum-safe communication system is its robust security features. By leveraging a combination of AES 256 encryption and post-quantum cryptography algorithms, the system provides enhanced protection against a wide range of cyber threats, including eavesdropping, data tampering, and unauthorized access. The AES 256 encryption ensures the confidentiality and integrity of data transmitted within organizational networks, while post-quantum cryptography algorithms offer resistance against potential quantum attacks, safeguarding the long-term security of cryptographic keys.
Traditional cryptographic techniques are vulnerable to attacks from quantum computers, which have the potential to break encryption algorithms with unprecedented speed and efficiency. By integrating post-quantum cryptography algorithms such as Crystal Kyber, the Enhanced Secure Internal Communication System mitigates the risk posed by quantum threats. These advanced cryptographic techniques provide an additional layer of defense against quantum attacks, ensuring the security and integrity of data transmission within organizational networks.
Another key advantage of the system is its scalability and interoperability. The modular architecture of the system allows for easy integration with existing organizational infrastructure, enabling seamless communication between different systems and applications. Whether deployed in small-scale or large-scale environments, the Enhanced Secure Internal Communication System can adapt to the specific requirements of organizations, ensuring efficient data exchange and communication across diverse platforms and networks.
The system's Key Database Module serves as a centralized repository for storing PQC-encrypted AES keys, streamlining key management processes within the organization. By maintaining a comprehensive database of encrypted keys and associated metadata, the module facilitates efficient key generation, Authentication, distribution, and retrieval, enhancing the overall security and manageability of the system
With the increasing emphasis on data privacy and regulatory compliance, the Enhanced Secure Internal Communication System offers organizations a robust solution for protecting sensitive information. The encryption of symmetric keys using post-quantum cryptography algorithms ensures the privacy and confidentiality of data exchanged within the network, mitigating the risk of data breaches and unauthorized access. By implementing industry-standard encryption techniques and access controls, the system enables organizations to maintain compliance with data protection regulations and industry standards.
By providing a centralized communication gateway, the proxy communicator module simplifies and streamlines communication processes within the organization. Encrypted data passes through the Proxy Module, guaranteeing the secure transmission of sensitive information. This fortifies overall security by mitigating the risks of unauthorized access and cyber threats, safeguarding against potential data breaches or interception.
Applications:
The Enhanced Secure Internal Communication System is ideally suited for use in enterprise communication environments, where secure data exchange and collaboration are essential. Whether deployed within a single organization or across multiple branches and departments, the system provides a secure and reliable platform for internal communication, enabling employees to share sensitive information and collaborate on projects with confidence.
Financial institutions, such as banks and investment firms, handle vast amounts of sensitive data, including customer financial information and transaction records. The Enhanced Secure Internal Communication System can be deployed to secure internal communication channels within financial organizations, ensuring the confidentiality and integrity of financial data. By encrypting data transmission and protecting cryptographic keys from quantum threats, the system helps financial institutions maintain compliance with industry regulations and safeguard customer assets.
In the healthcare sector, protecting patient confidentiality and securing sensitive medical information are paramount concerns. The Enhanced Secure Internal Communication System can be utilized to secure communication channels within healthcare organizations, such as hospitals, clinics, and medical laboratories. By encrypting patient data and ensuring secure transmission between healthcare professionals and administrative staff, the system helps healthcare organizations comply with patient privacy regulations, such as HIPAA, and maintain the confidentiality of medical records.
Government agencies and departments handle a wide range of sensitive information, including classified documents, intelligence reports, and law enforcement data. The Enhanced Secure Internal Communication System offers government agencies a robust solution for securing internal communication channels and protecting classified information. By implementing advanced encryption techniques and quantum-resistant cryptography, the system enables government organizations to safeguard national security interests and prevent unauthorized access to sensitive data.
Educational institutions, such as universities and research laboratories, often collaborate on research projects and share intellectual property across academic departments and research teams. The Enhanced Secure Internal Communication System can be deployed to secure communication channels within educational institutions, ensuring the confidentiality and integrity of research data and intellectual property. By encrypting data transmission and protecting cryptographic keys from quantum threats, the system helps educational institutions protect valuable research assets and maintain the integrity of academic collaboration.
Technology companies rely heavily on secure communication channels to protect proprietary information, trade secrets, and intellectual property. The Enhanced Secure Internal Communication System can be integrated into the communication infrastructure of technology companies, providing a secure platform for internal collaboration and data exchange. By implementing robust encryption techniques and quantum-resistant cryptography, the system helps technology companies safeguard sensitive information and maintain a competitive edge in the global marketplace.
In total, the Enhanced Secure Internal Communication System offers organizations a comprehensive solution for securing internal communication channels and protecting sensitive information from cyber threats. With its robust security features, scalability, and interoperability, the system can be applied across a wide range of industries and organizational environments, providing enhanced data privacy, operational efficiency, and regulatory compliance.
Test Results:
Functional Testing:
This test verifies that each component of the system functions as expected according to the provided specifications.
Test Results: The AES 256 key generator produces 256-bit symmetric keys, the PQC key generator generates public and private key pairs resilient against quantum attacks, and the communicator module successfully facilitates key exchange and data transmission.
Security Testing:
This test evaluates the system's resilience against various security threats, including encryption/decryption attacks and key management vulnerabilities.
Test Results: The system demonstrates robust encryption and decryption processes, ensuring that encrypted data remains secure. Additionally, the key management system prevents unauthorized access to keys and protect against key leakage or manipulation.
Integration Testing:
This test verifies the seamless integration of all system components and their interactions with each other.
Test Results: Integration testing ensured that modules communicate correctly with each other, data flows smoothly between components, and there are no compatibility issues. All modules collaborating effectively to achieve the system's overall objectives.
Performance Testing:
This test evaluates the system's performance under various load conditions to ensure it meets specified performance requirements.
Test Results: Response time, throughput, and resource utilization is tested. The system demonstrated satisfactory performance metrics, such as quick key generation, efficient encryption/decryption speeds, and minimal latency during data transmission.
Usability Testing:
This test assesses the system's usability and user-friendliness, focusing on aspects such as ease of configuration, key management, and error handling.
Test Results: Usability testing evaluated how easily administrators can configure and manage the system, as well as how intuitive the user interface is for end-users. The system provided clear instructions, error messages, and user prompts to facilitate smooth operation.
Resilience Testing:
This test evaluated the system's ability to recover from failures or disruptions, such as network outages or hardware failures.
Test Results: Resilience testing assesses how quickly the system can recover from failures and resume normal operation. The system demonstrated robust fault tolerance mechanisms and effective failover procedures to minimize downtime and data loss.
Scalability Testing:
This test assesses the system's ability to handle increasing workloads and scale resources accordingly.
Test Results: The system exhibited linear or near-linear scalability, allowing it to accommodate growing demands without significant degradation in performance.
By conducting these tests, the inventors ensure that the system meets its functional requirements, operates securely, performs efficiently, and delivers a satisfactory user experience.
,CLAIMS:5. CLAIMS
I/We Claim
1. A system for secure internal communication within an organization's data sharing infrastructure, comprising:
an AES 256 key generator module (102) for generating symmetric keys;
a PQC key generator module (104) for generating public and private keys using post-quantum cryptography algorithms;
an encapsulator, or a key encryptor module (106) for encrypting the symmetric key with the public key from the PQC key generator module (104);
a decryptor, or a key decryptor module (112) for decrypting the PQC-encrypted symmetric key with the private key;
a communicator module (108) acting as the gateway for key exchange and data flow control;
a key database module (110) for storing PQC-encrypted AES keys with associated metadata;
a QSleeve server (116) supporting PQC algorithm integration;
organizational functions code (114) executing the AES 256 key generator, PQC key generator, encapsulator, decryptor, key database, and communicator modules (108);
client functions code (114) executing the PQC key generator, decryptor, and communicator modules (108);
Characterized in that,
the AES 256 key generator module (102) utilizes libraries implementing AES encryption standards to generate 256-bit symmetric keys;
the PQC key generator module (104) utilizes post-quantum cryptography algorithms, such as Crystal Kyber , for generating public and private key pairs resilient against quantum attacks;
the encapsulator module encrypts the symmetric key generated by the AES 256 key generator module (102) using the public key from the PQC key generator module (104);
the decryptor module (112) decrypts the PQC-encrypted symmetric key using the private key from the PQC key generator module (104);
the communicator module serves as the gateway for encrypted key exchange and data transmission among organizational systems;
the key database module (110) stores PQC-encrypted AES keys and metadata, ensuring secure and efficient key management within the organization's infrastructure;
the integration of AES 256 and post-quantum cryptography algorithms ensures robust security in key encapsulation and exchange processes.
2. The system as claimed in claim 1, wherein the AES 256 key generator module (102) generates symmetric keys of 256 bits using AES encryption standards.
3. The system as claimed in claim 1, wherein the PQC key generator module (104) generates public and private key pairs resistant to quantum attacks using post-quantum cryptography algorithms, such as Crystal Kyber.
4. The system as claimed in claim 1, wherein the encapsulator or key encryptor module (106) encrypts the symmetric key generated by the AES 256 key generator module (102) using the public key from the PQC key generator module (104).
5. The system as claimed in claim 1, wherein the decryptor or key decryptor module (112) decrypts the PQC-encrypted symmetric key using the private key generated by the PQC key generator module (104).
6. The system as claimed in claim 1, wherein the communicator module serves as the gateway for key exchange and data flow control, facilitating encrypted key exchange and transmission among organizational systems.
7. The system as claimed in claim 1, wherein the key database module (110) stores PQC-encrypted AES keys and metadata, ensuring secure and efficient key management within the organization's infrastructure.
8. The system as claimed in claim 1, wherein the QSleeve server supports the integration of PQC algorithms to enhance the security of the communication system against quantum attacks.
9. A method for ensuring secure internal communication within an organization's data sharing infrastructure, comprising:
generating symmetric keys using an AES 256 key generator module (102);
generating public and private keys using a PQC key generator module (104);
encrypting the symmetric key using the public key from the PQC key generator module (104);
decrypting the PQC-encrypted symmetric key using the private key;
exchanging encrypted keys and data through a communicator module acting as the gateway;
storing PQC-encrypted AES keys with associated metadata in a key database module (110);
executing organizational functions code comprising the AES 256 key generator, PQC key generator, encapsulator, decryptor, key database, and communicator modules (108);
executing client functions code (114) comprising the PQC key generator, decryptor, and communicator modules (108);
Characterized by the integration of AES 256 and post-quantum cryptography algorithms, ensuring secure key encapsulation and exchange processes within the organization's data sharing environment.
10. The method as claimed in claim 9, wherein the symmetric keys are generated using AES 256-bit encryption in the AES256 Key Generator module.
11. The method as claimed in claim 9, wherein the public and private keys are generated using the Crystal Kyber algorithm in the PQC key generator module (104).
12. The method as claimed in claim 9, wherein the symmetric key is encrypted using the public key from the PQC key generator module (104) in the Encapsulator module.
13. The method as claimed in claim 9, wherein the PQC-encrypted symmetric key is decrypted using the private key in the Decryptor module (112).
14. The method as claimed in claim 9, wherein the encrypted keys and data are exchanged through a communicator module acting as the gateway.
15. The method as claimed in claim 9, wherein the QSleeve server enables users to access keys from the database after successful exchange, contributing to the robustness of the internal communication infrastructure.
16. The method as claimed in claim 9, wherein PQC-encrypted AES keys with associated metadata are stored in a Key Database module (110).
17. The method as claimed in claim 9, wherein the Organizational Functions code executes the AES256 Key Generator, Kyber Key Generator, Kyber Encryptor, Kyber Decryptor, Key Database, and Communicator modules (108).
18. The method as claimed in claim 9, wherein the Client functions code (114) executes the Kyber Key Generator, Kyber Decryptor, and Communicator modules (108).
| # | Name | Date |
|---|---|---|
| 1 | 202341046359-PROVISIONAL SPECIFICATION [10-07-2023(online)].pdf | 2023-07-10 |
| 2 | 202341046359-FORM FOR STARTUP [10-07-2023(online)].pdf | 2023-07-10 |
| 3 | 202341046359-FORM FOR SMALL ENTITY(FORM-28) [10-07-2023(online)].pdf | 2023-07-10 |
| 4 | 202341046359-FORM 1 [10-07-2023(online)].pdf | 2023-07-10 |
| 5 | 202341046359-EVIDENCE FOR REGISTRATION UNDER SSI(FORM-28) [10-07-2023(online)].pdf | 2023-07-10 |
| 6 | 202341046359-EVIDENCE FOR REGISTRATION UNDER SSI [10-07-2023(online)].pdf | 2023-07-10 |
| 7 | 202341046359-DRAWINGS [10-07-2023(online)].pdf | 2023-07-10 |
| 8 | 202341046359-Proof of Right [25-07-2023(online)].pdf | 2023-07-25 |
| 9 | 202341046359-FORM-26 [25-07-2023(online)].pdf | 2023-07-25 |
| 10 | 202341046359-FORM 3 [25-07-2023(online)].pdf | 2023-07-25 |
| 11 | 202341046359-ENDORSEMENT BY INVENTORS [25-07-2023(online)].pdf | 2023-07-25 |
| 12 | 202341046359-DRAWING [26-04-2024(online)].pdf | 2024-04-26 |
| 13 | 202341046359-COMPLETE SPECIFICATION [26-04-2024(online)].pdf | 2024-04-26 |
| 14 | 202341046359-FORM-9 [04-05-2024(online)].pdf | 2024-05-04 |
| 15 | 202341046359-FORM 18 [04-05-2024(online)].pdf | 2024-05-04 |
| 16 | 202341046359-STARTUP [11-05-2024(online)].pdf | 2024-05-11 |
| 17 | 202341046359-FORM28 [11-05-2024(online)].pdf | 2024-05-11 |
| 18 | 202341046359-FORM FOR STARTUP [11-05-2024(online)].pdf | 2024-05-11 |
| 19 | 202341046359-FORM 18A [11-05-2024(online)].pdf | 2024-05-11 |
| 20 | 202341046359-EVIDENCE FOR REGISTRATION UNDER SSI [11-05-2024(online)].pdf | 2024-05-11 |
| 21 | 202341046359-FER.pdf | 2024-07-04 |
| 22 | 202341046359-OTHERS [23-07-2024(online)].pdf | 2024-07-23 |
| 23 | 202341046359-FORM-5 [23-07-2024(online)].pdf | 2024-07-23 |
| 24 | 202341046359-FORM 3 [23-07-2024(online)].pdf | 2024-07-23 |
| 25 | 202341046359-FER_SER_REPLY [23-07-2024(online)].pdf | 2024-07-23 |
| 26 | 202341046359-RELEVANT DOCUMENTS [27-07-2024(online)].pdf | 2024-07-27 |
| 27 | 202341046359-PETITION UNDER RULE 137 [27-07-2024(online)].pdf | 2024-07-27 |
| 28 | 202341046359-Request Letter-Correspondence [30-07-2024(online)].pdf | 2024-07-30 |
| 29 | 202341046359-Power of Attorney [30-07-2024(online)].pdf | 2024-07-30 |
| 30 | 202341046359-FORM28 [30-07-2024(online)].pdf | 2024-07-30 |
| 31 | 202341046359-Form 1 (Submitted on date of filing) [30-07-2024(online)].pdf | 2024-07-30 |
| 32 | 202341046359-Covering Letter [30-07-2024(online)].pdf | 2024-07-30 |
| 33 | 202341046359-CERTIFIED COPIES TRANSMISSION TO IB [30-07-2024(online)].pdf | 2024-07-30 |
| 34 | 202341046359-US(14)-HearingNotice-(HearingDate-10-10-2024).pdf | 2024-09-12 |
| 35 | 202341046359-Correspondence to notify the Controller [30-09-2024(online)].pdf | 2024-09-30 |
| 36 | 202341046359-Annexure [30-09-2024(online)].pdf | 2024-09-30 |
| 37 | 202341046359-Written submissions and relevant documents [22-10-2024(online)].pdf | 2024-10-22 |
| 38 | 202341046359-FORM 3 [26-10-2024(online)].pdf | 2024-10-26 |
| 39 | 202341046359-PatentCertificate19-11-2024.pdf | 2024-11-19 |
| 40 | 202341046359-IntimationOfGrant19-11-2024.pdf | 2024-11-19 |
| 41 | 202341046359-NO [01-07-2025(online)].pdf | 2025-07-01 |
| 1 | 6359searchE_02-07-2024.pdf |