Patents by Inventor Sebastian Reynaldo VERSCHOOR

Sebastian Reynaldo VERSCHOOR has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11930101
    Abstract: A system and method are provided for mitigating key-exhaustion attacks in a key exchange protocol. The method includes computationally confirming an exchange of key bits has provided fresh shared key material before information theoretically confirming the exchange of key bits has provided fresh shared key material, while maintaining synchronization between messaging parties. In one implementation, maintaining synchronization includes updating keys in between each post-processing message session and managing a local state of each messaging party in the key exchange protocol prior to sending a next post-processing message. In another implementation, maintaining synchronization includes hiding a message containing the information theoretic authenticator by executing a decoy authentication process, prior to using an information theoretical key.
    Type: Grant
    Filed: March 25, 2021
    Date of Patent: March 12, 2024
    Assignee: evolutionQ Inc.
    Inventors: Sebastian Reynaldo Verschoor, Michele Mosca, Thomas Parry, James Godfrey
  • Publication number: 20220166606
    Abstract: A system and method are provided for mitigating key-exhaustion attacks in a key exchange protocol. The method includes computationally confirming an exchange of key bits has provided fresh shared key material before information theoretically confirming the exchange of key bits has provided fresh shared key material, while maintaining synchronization between messaging parties. In one implementation, maintaining synchronization includes updating keys in between each post-processing message session and managing a local state of each messaging party in the key exchange protocol prior to sending a next post-processing message. In another implementation, maintaining synchronization includes hiding a message containing the information theoretic authenticator by executing a decoy authentication process, prior to using an information theoretical key.
    Type: Application
    Filed: March 25, 2021
    Publication date: May 26, 2022
    Applicant: evolutionQ
    Inventors: Sebastian Reynaldo VERSCHOOR, Michele MOSCA, Thomas PARRY, James GODFREY
  • Publication number: 20210351917
    Abstract: Quantum Key Exchange (QKE, also known as Quantum Key Distribution or QKD) allows communicating parties to securely establish cryptographic keys. It is a well-established fact that all QKE protocols require that the parties have access to an authentic channel. Without this authenticated link, QKE is vulnerable to man-in-the-middle attacks. Overlooking this fact results in exaggerated claims and/or false expectations about the potential impact of QKE. In this paper we present a systematic comparison of QKE with traditional key establishment protocols in realistic secure communication systems.
    Type: Application
    Filed: March 25, 2021
    Publication date: November 11, 2021
    Applicant: evolutionQ
    Inventors: Sebastian Reynaldo VERSCHOOR, Michele MOSCA, Thomas PARRY, James GODFREY