NO20074210L - Method and system for deriving an encryption key using common randomness not shared with others - Google Patents

Method and system for deriving an encryption key using common randomness not shared with others

Info

Publication number
NO20074210L
NO20074210L NO20074210A NO20074210A NO20074210L NO 20074210 L NO20074210 L NO 20074210L NO 20074210 A NO20074210 A NO 20074210A NO 20074210 A NO20074210 A NO 20074210A NO 20074210 L NO20074210 L NO 20074210L
Authority
NO
Norway
Prior art keywords
key
shared
encryption key
deriving
jrnso
Prior art date
Application number
NO20074210A
Other languages
Norwegian (no)
Inventor
Marian Rudolf
Rajat Pritam Mukherjee
Original Assignee
Interdigital Tech Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Family has litigation
First worldwide family litigation filed litigation Critical https://patents.darts-ip.com/?family=36740955&utm_source=google_patent&utm_medium=platform_link&utm_campaign=public_patent_search&patent=NO20074210(L) "Global patent litigation dataset” by Darts-ip is licensed under a Creative Commons Attribution 4.0 International License.
Priority claimed from US11/318,381 external-priority patent/US8280046B2/en
Application filed by Interdigital Tech Corp filed Critical Interdigital Tech Corp
Publication of NO20074210L publication Critical patent/NO20074210L/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0838Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
    • H04L9/0841Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0875Generation of secret information including derivation or calculation of cryptographic keys or passwords based on channel impulse response [CIR]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/321Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • H04W12/043Key management, e.g. using generic bootstrapping architecture [GBA] using a trusted network node as an anchor
    • H04W12/0431Key distribution or pre-distribution; Key agreement
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/34Encoding or coding, e.g. Huffman coding or error correction
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/80Wireless
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2463/00Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
    • H04L2463/061Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00 applying further key derivation, e.g. deriving traffic keys from a pair-wise master key
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/065Network architectures or network communication protocols for network security for supporting key management in a packet data network for group communications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0892Network architectures or network communication protocols for network security for authentication of entities by using authentication-authorization-accounting [AAA] servers or protocols
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general
    • H04L63/205Network architectures or network communication protocols for network security for managing network security; network security policies in general involving negotiation or determination of the one or more network security mechanisms to be used, e.g. by negotiation between the client and the server or between peers or by selection according to the capabilities of the entities involved

Abstract

Den foreliggende oppfinnelse vedrører en fremgangsmåte og system for å utlede krypteringsnøkkel ved hjelp av felles tilfeldighet ikke delt med andre (JRNSO). Kommuniserende enheter danner JRNSO bit fra et kanalimpulsrespons (CIR) estimat og JRNSO bitene brukes i dannelsen av en krypteringsnøkkel. Autentifiseringstypen kan være IEEE 802.I x eller et forhåndsdelt nøkkel system. I et IEEE 802.I x system dannes en hovednøkkel, en parvis hovednøkkel eller en parvis transient nøkkel ved hjelp av JRNSO bitene. Krypteringsnøkkelen kan utledes ved å bruke en Diffie-Hellman nøkkelutledningsalgoritme.The present invention relates to a method and system for deriving encryption key by means of shared randomness not shared with others (JRNSO). Communicating units generate JRNSO bits from a channel impulse response (CIR) estimate and JRNSO bits are used in the formation of an encryption key. The authentication type can be IEEE 802.I x or a pre-shared key system. In an IEEE 802.I x system, a master key, a pair master key or a pair transient key is generated using the JRNSO bits. The encryption key can be derived using a Diffie-Hellman key derivation algorithm.

NO20074210A 2005-01-27 2007-08-16 Method and system for deriving an encryption key using common randomness not shared with others NO20074210L (en)

Applications Claiming Priority (5)

Application Number Priority Date Filing Date Title
US64748205P 2005-01-27 2005-01-27
US71617705P 2005-09-12 2005-09-12
US73433105P 2005-11-07 2005-11-07
US11/318,381 US8280046B2 (en) 2005-09-12 2005-12-23 Method and system for deriving an encryption key using joint randomness not shared by others
PCT/US2006/001839 WO2006081122A2 (en) 2005-01-27 2006-01-19 Method and system for deriving an encryption key using joint randomness not shared by others

Publications (1)

Publication Number Publication Date
NO20074210L true NO20074210L (en) 2007-10-24

Family

ID=36740955

Family Applications (1)

Application Number Title Priority Date Filing Date
NO20074210A NO20074210L (en) 2005-01-27 2007-08-16 Method and system for deriving an encryption key using common randomness not shared with others

Country Status (9)

Country Link
EP (1) EP1847060A4 (en)
JP (1) JP4734344B2 (en)
KR (3) KR101011470B1 (en)
CN (1) CN101951383B (en)
CA (1) CA2596067C (en)
MX (1) MX2007009063A (en)
NO (1) NO20074210L (en)
TW (2) TWI378701B (en)
WO (1) WO2006081122A2 (en)

Families Citing this family (34)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TW200943886A (en) * 2006-04-18 2009-10-16 Interdigital Tech Corp Method and system for securing wireless communications
CN101554011A (en) * 2006-09-21 2009-10-07 交互数字技术公司 Group-wise secret key generation
KR101546205B1 (en) 2006-10-12 2015-08-20 인터디지탈 테크날러지 코포레이션 A method and system for enhancing cryptographic capabilities of a wireless device using broadcasted random noise
GB2447674B (en) * 2007-03-21 2011-08-03 Lancaster University Generation of a cryptographic key from device motion
US10091648B2 (en) 2007-04-26 2018-10-02 Qualcomm Incorporated Method and apparatus for new key derivation upon handoff in wireless networks
JP5376408B2 (en) * 2007-07-20 2013-12-25 日本電気株式会社 Cryptographic communication method and cryptographic communication system
US9198033B2 (en) * 2007-09-27 2015-11-24 Alcatel Lucent Method and apparatus for authenticating nodes in a wireless network
WO2009061962A2 (en) 2007-11-06 2009-05-14 Interdigital Patent Holdings, Inc. Method and apparatus for enabling physical layer secret key generation
CN102027706B (en) * 2008-05-12 2014-01-22 交互数字专利控股公司 Information-theoretically secure secrecy generation
WO2010006035A2 (en) * 2008-07-08 2010-01-14 Interdigital Patent Holdings, Inc. Support of physical layer security in wireless local area networks
FR2976431B1 (en) * 2011-06-07 2014-01-24 Commissariat Energie Atomique SECRET KEY GENERATION METHOD FOR WIRELESS COMMUNICATION SYSTEM
KR101269026B1 (en) * 2011-12-21 2013-05-29 한국전자통신연구원 Apparatus and method for group key generation using wireless channel status
US10146850B2 (en) 2012-10-30 2018-12-04 FHOOSH, Inc. Systems and methods for collecting, classifying, organizing and populating information on electronic forms
US20140269362A1 (en) * 2013-03-15 2014-09-18 Shahrnaz Azizi Techniques to Update a Wireless Communication Channel Estimation
US9124580B1 (en) * 2014-02-07 2015-09-01 The Boeing Company Method and system for securely establishing cryptographic keys for aircraft-to-aircraft communications
DE102014209046A1 (en) 2014-05-13 2015-11-19 Robert Bosch Gmbh A method for generating a secret, cryptographic key in a mobile terminal
DE102014208964A1 (en) 2014-05-13 2015-11-19 Robert Bosch Gmbh Method for generating a key in a network as well as network subscribers established for this purpose
DE102014208965A1 (en) 2014-05-13 2015-11-19 Robert Bosch Gmbh Method for authenticating a network participant and network participant, network and computer program for this purpose
DE102014208975A1 (en) 2014-05-13 2015-11-19 Robert Bosch Gmbh A method for generating a key in a network and subscribers to a network and network
DE102014208974A1 (en) 2014-05-13 2015-11-19 Robert Bosch Gmbh Method for determining information about the distance between two devices and devices and computer programs set up for this purpose
DE102014217330A1 (en) 2014-08-29 2016-03-03 Robert Bosch Gmbh Method for comparing information between devices and device set up for this purpose
DE102014217320A1 (en) 2014-08-29 2016-03-03 Robert Bosch Gmbh Method for generating a cryptographic key in a device and device set up for this purpose
US10579823B2 (en) 2014-09-23 2020-03-03 Ubiq Security, Inc. Systems and methods for secure high speed data generation and access
US9842227B2 (en) 2014-09-23 2017-12-12 FHOOSH, Inc. Secure high speed data storage, access, recovery, and transmission
DE102015215569A1 (en) 2015-08-14 2017-02-16 Robert Bosch Gmbh Method for generating a secret between subscribers of a network and subscribers of the network established for this purpose
WO2017063716A1 (en) * 2015-10-16 2017-04-20 Huawei Technologies Co., Ltd. Secure paring method for mimo systems
DE102015225220A1 (en) 2015-12-15 2017-06-22 Robert Bosch Gmbh Method for generating a secret sequence of values in a device depending on measured physical properties of a transmission channel
DE102015225222A1 (en) 2015-12-15 2017-06-22 Robert Bosch Gmbh Method for generating a secret sequence of values in a device depending on measured physical properties of a transmission channel
FR3046315B1 (en) * 2015-12-29 2018-04-27 Thales METHOD FOR UNIVALENT AND UNIVERSAL EXTRACTION OF KEYS FROM THE PROPAGATION CHANNEL
KR20180097903A (en) 2017-02-24 2018-09-03 삼성전자주식회사 Apparatus and method for generating secure key in wireless communication system
US11349656B2 (en) * 2018-03-08 2022-05-31 Ubiq Security, Inc. Systems and methods for secure storage and transmission of a data stream
GB201817117D0 (en) 2018-10-19 2018-12-05 Nat Univ Ireland Maynooth Encryption method
EP3697052A1 (en) * 2019-02-14 2020-08-19 Siemens Aktiengesellschaft Method and system for transfer of data in a network
WO2023287537A1 (en) * 2021-07-16 2023-01-19 Qualcomm Incorporated Secret key verification in wireless communication

Family Cites Families (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0301282A1 (en) * 1987-07-31 1989-02-01 BBC Brown Boveri AG Signal transmission method
US5450456A (en) * 1993-11-12 1995-09-12 Daimler Benz Ag Method and arrangement for measuring the carrier frequency deviation in a multi-channel transmission system
EP0767543A3 (en) * 1995-10-06 2000-07-26 Siemens Aktiengesellschaft Code division multiplex communication with interference suppression
US5745578A (en) * 1996-06-17 1998-04-28 Ericsson Inc. Apparatus and method for secure communication based on channel characteristics
JP2004032679A (en) * 2002-02-28 2004-01-29 Matsushita Electric Ind Co Ltd Communication apparatus and communication system
JP2006180549A (en) * 2002-02-28 2006-07-06 Matsushita Electric Ind Co Ltd Communication apparatus and communication method
JP2003273856A (en) * 2002-03-14 2003-09-26 Communication Research Laboratory Communication apparatus and communication method
JP4245972B2 (en) * 2002-05-29 2009-04-02 Nttエレクトロニクス株式会社 Wireless communication method, wireless communication device, communication control program, communication control device, key management program, wireless LAN system, and recording medium
US7587598B2 (en) * 2002-11-19 2009-09-08 Toshiba America Research, Inc. Interlayer fast authentication or re-authentication for network communication
JP2004187197A (en) * 2002-12-06 2004-07-02 Doshisha Radio communication system, radio communication method and radio station
JP2004208073A (en) * 2002-12-25 2004-07-22 Sony Corp Radio communication system
JP2005130127A (en) * 2003-10-22 2005-05-19 Sumitomo Electric Ind Ltd Confidential communication method and communication terminal
US7505596B2 (en) * 2003-12-05 2009-03-17 Microsoft Corporation Automatic detection of wireless network type
WO2006011345A1 (en) * 2004-07-29 2006-02-02 Matsushita Electric Industrial Co., Ltd. Wireless communication apparatus and wireless communication method
EP1764946A1 (en) * 2004-08-04 2007-03-21 Matsushita Electric Industrial Co., Ltd. Radio communication method, radio communication system, and radio communication device
RU2007104173A (en) * 2004-08-04 2008-08-10 Мацусита Электрик Индастриал Ко., Лтд. (Jp) RADIO COMMUNICATION DEVICE, RADIO COMMUNICATION SYSTEM AND RADIO COMMUNICATION METHOD

Also Published As

Publication number Publication date
KR101253370B1 (en) 2013-04-11
KR20070096008A (en) 2007-10-01
KR20110076992A (en) 2011-07-06
KR101011470B1 (en) 2011-01-28
EP1847060A2 (en) 2007-10-24
CN101951383B (en) 2013-06-19
CA2596067C (en) 2013-09-17
TWI378701B (en) 2012-12-01
TW200633460A (en) 2006-09-16
MX2007009063A (en) 2007-10-02
EP1847060A4 (en) 2011-09-14
KR20070088821A (en) 2007-08-29
TW200723818A (en) 2007-06-16
CA2596067A1 (en) 2006-08-03
CN101951383A (en) 2011-01-19
WO2006081122A3 (en) 2007-11-22
JP4734344B2 (en) 2011-07-27
TWI404393B (en) 2013-08-01
JP2008529413A (en) 2008-07-31
WO2006081122A2 (en) 2006-08-03

Similar Documents

Publication Publication Date Title
NO20074210L (en) Method and system for deriving an encryption key using common randomness not shared with others
MX2019004655A (en) Recovering encrypted transaction information in blockchain confidential transactions.
PH12018550109A1 (en) Determining a common secret for the secure exchange of information and hierarchical, deterministic cryptographic keys
PH12018501745A1 (en) Personal device security using elliptic curve cryptography for secret sharing
WO2009025459A3 (en) Method of and apparatus for sharing secret information between devices in home network
MX336828B (en) Key sharing device and system for configuration thereof.
DE602006005957D1 (en) PHYSICAL DISTRIBUTION OF SECRETS AND PROVISIONS NEARBY USING PUFS
WO2013049857A3 (en) Differential client-side encryption of information originating from a client
WO2014176046A3 (en) Community of interest-based secured communications over ipsec
TW200610349A (en) Key derivation functions to enhance security
ATE472133T1 (en) DECRYPTION PROCEDURE
CN104158880A (en) User-end cloud data sharing solution
CN105763333A (en) Method and system for negotiating asymmetric key
CN106209360A (en) A kind of authentication identifying method of wildcard based on the close algorithm of state
CN107493169A (en) A kind of authentication identifying method based on quantum key and national secret algorithm
Pandey et al. Particle swarm optimization in cryptanalysis of DES
Singh et al. An Instinctive Approach for Secure Communication–Enhanced Data Encryption Standard (EHDES)
Shah et al. Efficient Cryptography for data security
Murugan et al. Securing cloud data using DNA and Morse code: A triple encryption scheme
WO2016073058A3 (en) Method and apparatus for secure elgamal-type cryptography
Vasiliu et al. Modified method of security amplification for quantum direct communication protocols
Zhang et al. Impersonation attack on two identity-based authenticated key exchange protocols
CN106100843B (en) The generation of multivariable public key, encryption and decryption approaches
CN103986693A (en) Feature information and key binding method
Singh et al. Protecting small keys in authentication protocols for wireless sensor networks

Legal Events

Date Code Title Description
FC2A Withdrawal, rejection or dismissal of laid open patent application