发明名称 |
System and method for deterring malicious network attacks |
摘要 |
A system and method for deterring malicious network attacks. The system and method is configured to execute instructions on at least one of the processors to generate a plurality of random blocks of data; generate a first XOR result by using the XOR function with the plurality of random blocks of data as the XOR function inputs; generate a tail value by using the XOR function with the first XOR result and a random encryption key as the XOR function inputs; encrypt a designated file using the random encryption key; write the plurality of random blocks and tail value to at least one storage medium; and write the encrypted designated file to at least one storage medium. |
申请公布号 |
US9483640(B2) |
申请公布日期 |
2016.11.01 |
申请号 |
US201414242235 |
申请日期 |
2014.04.01 |
申请人 |
Georgetown University |
发明人 |
Shields Thomas Clay |
分类号 |
H04L29/06;G06F21/55 |
主分类号 |
H04L29/06 |
代理机构 |
Klarquist Sparkman, LLP |
代理人 |
Klarquist Sparkman, LLP |
主权项 |
1. A computerized method for deterring malicious network attacks, the method being performed by a computer system that comprises one or more processors and one or more storage media operatively coupled to at least one of the processors, the method comprising:
executing instructions on at least one of the processors to generate a plurality of random blocks of data; generating a first XOR result by using an XOR function with the plurality of random blocks of data as the XOR function inputs; generating a tail value by using the XOR function with the first XOR result and a random encryption key as the XOR function inputs; encrypting a designated file using the random encryption key; writing the plurality of random blocks and the tail value to the at least one storage medium; writing the encrypted designated file to the at least one storage medium; and resizing including:
removing designated blocks from the plurality of random blocks to create a subset of random blocks;generating a new tail value using the XOR function with the random encryption key and the subset of random blocks as the XOR function inputs; andappending the new tail value to the subset of random blocks. |
地址 |
Washington DC US |