Elite Fitness Stealth Messaging: How it Works
With Elite Fitness Stealth Messaging, users create their own passphrases,
and the secure server does the rest.
- Figure 1. 1,024 bits of random numbers are converted
into a pair of keys -- one private key and one public key.
(What the public key locks, the private key unlocks, and vice-versa.)
Every Elite Fitness Stealth Messaging user will have his or
her unique pair of keys. The user's passphrase encrypts and
decrypts the user's private key so that no one but the user
ever has access to it. Not even Elite Fitness.
Private key |
Public key |
Figure 1.
- Figure 2. The passphrase, combined with the Blowfish
algorithm, encrypts the private key. A one-time message key,
unique to each email that is sent, is used to encrypt and
decrypt the email message itself.
Figure
2.
- Figure 3. The message key, which is a component of
the Blowfish algorithm, encrypts the email. The recipient's
public key is used to encrypt the message key.
Figure
3.
- Figure 4. The message key is asymmetrically encrypted
using the recipient's public key. Both the encrypted email
and the encrypted message key are combined and sent to the
recipient. The email may only be decrypted by using the one-time
message key. The message key can only be decrypted by using
the recipient's private key. The recipient's private key can
only be decrypted by entering the recipient's personal passphrase.
Figure
4.
- Figure 5. The encrypted email and the encrypted message
key are sent to the recipient. So, not only is the email securely
coded, before it is ever stored on a server, but the key to
decode the email is also encoded. Further, the key to decrypt
this key is also encrypted.
Figure
5.
|
|