NO20074210L - Method and system for deriving an encryption key using common randomness not shared with others - Google Patents
Method and system for deriving an encryption key using common randomness not shared with othersInfo
- Publication number
- NO20074210L NO20074210L NO20074210A NO20074210A NO20074210L NO 20074210 L NO20074210 L NO 20074210L NO 20074210 A NO20074210 A NO 20074210A NO 20074210 A NO20074210 A NO 20074210A NO 20074210 L NO20074210 L NO 20074210L
- Authority
- NO
- Norway
- Prior art keywords
- key
- shared
- encryption key
- deriving
- jrnso
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0838—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
- H04L9/0841—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0875—Generation of secret information including derivation or calculation of cryptographic keys or passwords based on channel impulse response [CIR]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/321—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/04—Key management, e.g. using generic bootstrapping architecture [GBA]
- H04W12/043—Key management, e.g. using generic bootstrapping architecture [GBA] using a trusted network node as an anchor
- H04W12/0431—Key distribution or pre-distribution; Key agreement
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/34—Encoding or coding, e.g. Huffman coding or error correction
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/80—Wireless
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2463/00—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
- H04L2463/061—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00 applying further key derivation, e.g. deriving traffic keys from a pair-wise master key
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
- H04L63/065—Network architectures or network communication protocols for network security for supporting key management in a packet data network for group communications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0892—Network architectures or network communication protocols for network security for authentication of entities by using authentication-authorization-accounting [AAA] servers or protocols
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/20—Network architectures or network communication protocols for network security for managing network security; network security policies in general
- H04L63/205—Network architectures or network communication protocols for network security for managing network security; network security policies in general involving negotiation or determination of the one or more network security mechanisms to be used, e.g. by negotiation between the client and the server or between peers or by selection according to the capabilities of the entities involved
Abstract
Den foreliggende oppfinnelse vedrører en fremgangsmåte og system for å utlede krypteringsnøkkel ved hjelp av felles tilfeldighet ikke delt med andre (JRNSO). Kommuniserende enheter danner JRNSO bit fra et kanalimpulsrespons (CIR) estimat og JRNSO bitene brukes i dannelsen av en krypteringsnøkkel. Autentifiseringstypen kan være IEEE 802.I x eller et forhåndsdelt nøkkel system. I et IEEE 802.I x system dannes en hovednøkkel, en parvis hovednøkkel eller en parvis transient nøkkel ved hjelp av JRNSO bitene. Krypteringsnøkkelen kan utledes ved å bruke en Diffie-Hellman nøkkelutledningsalgoritme.The present invention relates to a method and system for deriving encryption key by means of shared randomness not shared with others (JRNSO). Communicating units generate JRNSO bits from a channel impulse response (CIR) estimate and JRNSO bits are used in the formation of an encryption key. The authentication type can be IEEE 802.I x or a pre-shared key system. In an IEEE 802.I x system, a master key, a pair master key or a pair transient key is generated using the JRNSO bits. The encryption key can be derived using a Diffie-Hellman key derivation algorithm.
Applications Claiming Priority (5)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US64748205P | 2005-01-27 | 2005-01-27 | |
US71617705P | 2005-09-12 | 2005-09-12 | |
US73433105P | 2005-11-07 | 2005-11-07 | |
US11/318,381 US8280046B2 (en) | 2005-09-12 | 2005-12-23 | Method and system for deriving an encryption key using joint randomness not shared by others |
PCT/US2006/001839 WO2006081122A2 (en) | 2005-01-27 | 2006-01-19 | Method and system for deriving an encryption key using joint randomness not shared by others |
Publications (1)
Publication Number | Publication Date |
---|---|
NO20074210L true NO20074210L (en) | 2007-10-24 |
Family
ID=36740955
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
NO20074210A NO20074210L (en) | 2005-01-27 | 2007-08-16 | Method and system for deriving an encryption key using common randomness not shared with others |
Country Status (9)
Country | Link |
---|---|
EP (1) | EP1847060A4 (en) |
JP (1) | JP4734344B2 (en) |
KR (3) | KR101011470B1 (en) |
CN (1) | CN101951383B (en) |
CA (1) | CA2596067C (en) |
MX (1) | MX2007009063A (en) |
NO (1) | NO20074210L (en) |
TW (2) | TWI378701B (en) |
WO (1) | WO2006081122A2 (en) |
Families Citing this family (34)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
TW200943886A (en) * | 2006-04-18 | 2009-10-16 | Interdigital Tech Corp | Method and system for securing wireless communications |
CN101554011A (en) * | 2006-09-21 | 2009-10-07 | 交互数字技术公司 | Group-wise secret key generation |
KR101546205B1 (en) | 2006-10-12 | 2015-08-20 | 인터디지탈 테크날러지 코포레이션 | A method and system for enhancing cryptographic capabilities of a wireless device using broadcasted random noise |
GB2447674B (en) * | 2007-03-21 | 2011-08-03 | Lancaster University | Generation of a cryptographic key from device motion |
US10091648B2 (en) | 2007-04-26 | 2018-10-02 | Qualcomm Incorporated | Method and apparatus for new key derivation upon handoff in wireless networks |
JP5376408B2 (en) * | 2007-07-20 | 2013-12-25 | 日本電気株式会社 | Cryptographic communication method and cryptographic communication system |
US9198033B2 (en) * | 2007-09-27 | 2015-11-24 | Alcatel Lucent | Method and apparatus for authenticating nodes in a wireless network |
WO2009061962A2 (en) | 2007-11-06 | 2009-05-14 | Interdigital Patent Holdings, Inc. | Method and apparatus for enabling physical layer secret key generation |
CN102027706B (en) * | 2008-05-12 | 2014-01-22 | 交互数字专利控股公司 | Information-theoretically secure secrecy generation |
WO2010006035A2 (en) * | 2008-07-08 | 2010-01-14 | Interdigital Patent Holdings, Inc. | Support of physical layer security in wireless local area networks |
FR2976431B1 (en) * | 2011-06-07 | 2014-01-24 | Commissariat Energie Atomique | SECRET KEY GENERATION METHOD FOR WIRELESS COMMUNICATION SYSTEM |
KR101269026B1 (en) * | 2011-12-21 | 2013-05-29 | 한국전자통신연구원 | Apparatus and method for group key generation using wireless channel status |
US10146850B2 (en) | 2012-10-30 | 2018-12-04 | FHOOSH, Inc. | Systems and methods for collecting, classifying, organizing and populating information on electronic forms |
US20140269362A1 (en) * | 2013-03-15 | 2014-09-18 | Shahrnaz Azizi | Techniques to Update a Wireless Communication Channel Estimation |
US9124580B1 (en) * | 2014-02-07 | 2015-09-01 | The Boeing Company | Method and system for securely establishing cryptographic keys for aircraft-to-aircraft communications |
DE102014209046A1 (en) | 2014-05-13 | 2015-11-19 | Robert Bosch Gmbh | A method for generating a secret, cryptographic key in a mobile terminal |
DE102014208964A1 (en) | 2014-05-13 | 2015-11-19 | Robert Bosch Gmbh | Method for generating a key in a network as well as network subscribers established for this purpose |
DE102014208965A1 (en) | 2014-05-13 | 2015-11-19 | Robert Bosch Gmbh | Method for authenticating a network participant and network participant, network and computer program for this purpose |
DE102014208975A1 (en) | 2014-05-13 | 2015-11-19 | Robert Bosch Gmbh | A method for generating a key in a network and subscribers to a network and network |
DE102014208974A1 (en) | 2014-05-13 | 2015-11-19 | Robert Bosch Gmbh | Method for determining information about the distance between two devices and devices and computer programs set up for this purpose |
DE102014217330A1 (en) | 2014-08-29 | 2016-03-03 | Robert Bosch Gmbh | Method for comparing information between devices and device set up for this purpose |
DE102014217320A1 (en) | 2014-08-29 | 2016-03-03 | Robert Bosch Gmbh | Method for generating a cryptographic key in a device and device set up for this purpose |
US10579823B2 (en) | 2014-09-23 | 2020-03-03 | Ubiq Security, Inc. | Systems and methods for secure high speed data generation and access |
US9842227B2 (en) | 2014-09-23 | 2017-12-12 | FHOOSH, Inc. | Secure high speed data storage, access, recovery, and transmission |
DE102015215569A1 (en) | 2015-08-14 | 2017-02-16 | Robert Bosch Gmbh | Method for generating a secret between subscribers of a network and subscribers of the network established for this purpose |
WO2017063716A1 (en) * | 2015-10-16 | 2017-04-20 | Huawei Technologies Co., Ltd. | Secure paring method for mimo systems |
DE102015225220A1 (en) | 2015-12-15 | 2017-06-22 | Robert Bosch Gmbh | Method for generating a secret sequence of values in a device depending on measured physical properties of a transmission channel |
DE102015225222A1 (en) | 2015-12-15 | 2017-06-22 | Robert Bosch Gmbh | Method for generating a secret sequence of values in a device depending on measured physical properties of a transmission channel |
FR3046315B1 (en) * | 2015-12-29 | 2018-04-27 | Thales | METHOD FOR UNIVALENT AND UNIVERSAL EXTRACTION OF KEYS FROM THE PROPAGATION CHANNEL |
KR20180097903A (en) | 2017-02-24 | 2018-09-03 | 삼성전자주식회사 | Apparatus and method for generating secure key in wireless communication system |
US11349656B2 (en) * | 2018-03-08 | 2022-05-31 | Ubiq Security, Inc. | Systems and methods for secure storage and transmission of a data stream |
GB201817117D0 (en) | 2018-10-19 | 2018-12-05 | Nat Univ Ireland Maynooth | Encryption method |
EP3697052A1 (en) * | 2019-02-14 | 2020-08-19 | Siemens Aktiengesellschaft | Method and system for transfer of data in a network |
WO2023287537A1 (en) * | 2021-07-16 | 2023-01-19 | Qualcomm Incorporated | Secret key verification in wireless communication |
Family Cites Families (16)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP0301282A1 (en) * | 1987-07-31 | 1989-02-01 | BBC Brown Boveri AG | Signal transmission method |
US5450456A (en) * | 1993-11-12 | 1995-09-12 | Daimler Benz Ag | Method and arrangement for measuring the carrier frequency deviation in a multi-channel transmission system |
EP0767543A3 (en) * | 1995-10-06 | 2000-07-26 | Siemens Aktiengesellschaft | Code division multiplex communication with interference suppression |
US5745578A (en) * | 1996-06-17 | 1998-04-28 | Ericsson Inc. | Apparatus and method for secure communication based on channel characteristics |
JP2004032679A (en) * | 2002-02-28 | 2004-01-29 | Matsushita Electric Ind Co Ltd | Communication apparatus and communication system |
JP2006180549A (en) * | 2002-02-28 | 2006-07-06 | Matsushita Electric Ind Co Ltd | Communication apparatus and communication method |
JP2003273856A (en) * | 2002-03-14 | 2003-09-26 | Communication Research Laboratory | Communication apparatus and communication method |
JP4245972B2 (en) * | 2002-05-29 | 2009-04-02 | Nttエレクトロニクス株式会社 | Wireless communication method, wireless communication device, communication control program, communication control device, key management program, wireless LAN system, and recording medium |
US7587598B2 (en) * | 2002-11-19 | 2009-09-08 | Toshiba America Research, Inc. | Interlayer fast authentication or re-authentication for network communication |
JP2004187197A (en) * | 2002-12-06 | 2004-07-02 | Doshisha | Radio communication system, radio communication method and radio station |
JP2004208073A (en) * | 2002-12-25 | 2004-07-22 | Sony Corp | Radio communication system |
JP2005130127A (en) * | 2003-10-22 | 2005-05-19 | Sumitomo Electric Ind Ltd | Confidential communication method and communication terminal |
US7505596B2 (en) * | 2003-12-05 | 2009-03-17 | Microsoft Corporation | Automatic detection of wireless network type |
WO2006011345A1 (en) * | 2004-07-29 | 2006-02-02 | Matsushita Electric Industrial Co., Ltd. | Wireless communication apparatus and wireless communication method |
EP1764946A1 (en) * | 2004-08-04 | 2007-03-21 | Matsushita Electric Industrial Co., Ltd. | Radio communication method, radio communication system, and radio communication device |
RU2007104173A (en) * | 2004-08-04 | 2008-08-10 | Мацусита Электрик Индастриал Ко., Лтд. (Jp) | RADIO COMMUNICATION DEVICE, RADIO COMMUNICATION SYSTEM AND RADIO COMMUNICATION METHOD |
-
2006
- 2006-01-19 EP EP06718847A patent/EP1847060A4/en not_active Withdrawn
- 2006-01-19 KR KR1020077018125A patent/KR101011470B1/en not_active IP Right Cessation
- 2006-01-19 KR KR1020077018514A patent/KR101253370B1/en not_active IP Right Cessation
- 2006-01-19 CA CA2596067A patent/CA2596067C/en not_active Expired - Fee Related
- 2006-01-19 JP JP2007553138A patent/JP4734344B2/en not_active Expired - Fee Related
- 2006-01-19 KR KR1020117010823A patent/KR20110076992A/en not_active Application Discontinuation
- 2006-01-19 CN CN2010102981704A patent/CN101951383B/en not_active Expired - Fee Related
- 2006-01-19 WO PCT/US2006/001839 patent/WO2006081122A2/en active Application Filing
- 2006-01-19 MX MX2007009063A patent/MX2007009063A/en not_active Application Discontinuation
- 2006-01-20 TW TW095102241A patent/TWI378701B/en not_active IP Right Cessation
- 2006-01-20 TW TW095128389A patent/TWI404393B/en not_active IP Right Cessation
-
2007
- 2007-08-16 NO NO20074210A patent/NO20074210L/en not_active Application Discontinuation
Also Published As
Publication number | Publication date |
---|---|
KR101253370B1 (en) | 2013-04-11 |
KR20070096008A (en) | 2007-10-01 |
KR20110076992A (en) | 2011-07-06 |
KR101011470B1 (en) | 2011-01-28 |
EP1847060A2 (en) | 2007-10-24 |
CN101951383B (en) | 2013-06-19 |
CA2596067C (en) | 2013-09-17 |
TWI378701B (en) | 2012-12-01 |
TW200633460A (en) | 2006-09-16 |
MX2007009063A (en) | 2007-10-02 |
EP1847060A4 (en) | 2011-09-14 |
KR20070088821A (en) | 2007-08-29 |
TW200723818A (en) | 2007-06-16 |
CA2596067A1 (en) | 2006-08-03 |
CN101951383A (en) | 2011-01-19 |
WO2006081122A3 (en) | 2007-11-22 |
JP4734344B2 (en) | 2011-07-27 |
TWI404393B (en) | 2013-08-01 |
JP2008529413A (en) | 2008-07-31 |
WO2006081122A2 (en) | 2006-08-03 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
NO20074210L (en) | Method and system for deriving an encryption key using common randomness not shared with others | |
MX2019004655A (en) | Recovering encrypted transaction information in blockchain confidential transactions. | |
PH12018550109A1 (en) | Determining a common secret for the secure exchange of information and hierarchical, deterministic cryptographic keys | |
PH12018501745A1 (en) | Personal device security using elliptic curve cryptography for secret sharing | |
WO2009025459A3 (en) | Method of and apparatus for sharing secret information between devices in home network | |
MX336828B (en) | Key sharing device and system for configuration thereof. | |
DE602006005957D1 (en) | PHYSICAL DISTRIBUTION OF SECRETS AND PROVISIONS NEARBY USING PUFS | |
WO2013049857A3 (en) | Differential client-side encryption of information originating from a client | |
WO2014176046A3 (en) | Community of interest-based secured communications over ipsec | |
TW200610349A (en) | Key derivation functions to enhance security | |
ATE472133T1 (en) | DECRYPTION PROCEDURE | |
CN104158880A (en) | User-end cloud data sharing solution | |
CN105763333A (en) | Method and system for negotiating asymmetric key | |
CN106209360A (en) | A kind of authentication identifying method of wildcard based on the close algorithm of state | |
CN107493169A (en) | A kind of authentication identifying method based on quantum key and national secret algorithm | |
Pandey et al. | Particle swarm optimization in cryptanalysis of DES | |
Singh et al. | An Instinctive Approach for Secure Communication–Enhanced Data Encryption Standard (EHDES) | |
Shah et al. | Efficient Cryptography for data security | |
Murugan et al. | Securing cloud data using DNA and Morse code: A triple encryption scheme | |
WO2016073058A3 (en) | Method and apparatus for secure elgamal-type cryptography | |
Vasiliu et al. | Modified method of security amplification for quantum direct communication protocols | |
Zhang et al. | Impersonation attack on two identity-based authenticated key exchange protocols | |
CN106100843B (en) | The generation of multivariable public key, encryption and decryption approaches | |
CN103986693A (en) | Feature information and key binding method | |
Singh et al. | Protecting small keys in authentication protocols for wireless sensor networks |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
FC2A | Withdrawal, rejection or dismissal of laid open patent application |