Elite Fitness Stealth Messaging: How it Works

With Elite Fitness Stealth Messaging, users create their own passphrases, and the secure server does the rest.

  • Figure 1. 1,024 bits of random numbers are converted into a pair of keys -- one private key and one public key. (What the public key locks, the private key unlocks, and vice-versa.) Every Elite Fitness Stealth Messaging user will have his or her unique pair of keys. The user's passphrase encrypts and decrypts the user's private key so that no one but the user ever has access to it. Not even Elite Fitness.


    Private key

    Public key
    Figure 1.


  • Figure 2. The passphrase, combined with the Blowfish algorithm, encrypts the private key. A one-time message key, unique to each email that is sent, is used to encrypt and decrypt the email message itself.


    Figure 2.


  • Figure 3. The message key, which is a component of the Blowfish algorithm, encrypts the email. The recipient's public key is used to encrypt the message key.


    Figure 3.


  • Figure 4. The message key is asymmetrically encrypted using the recipient's public key. Both the encrypted email and the encrypted message key are combined and sent to the recipient. The email may only be decrypted by using the one-time message key. The message key can only be decrypted by using the recipient's private key. The recipient's private key can only be decrypted by entering the recipient's personal passphrase.


    Figure 4.


  • Figure 5. The encrypted email and the encrypted message key are sent to the recipient. So, not only is the email securely coded, before it is ever stored on a server, but the key to decode the email is also encoded. Further, the key to decrypt this key is also encrypted.

    Figure 5.