ATE523017T1 - Schlüsselvereinbarungs- und transportprotokoll - Google Patents

Schlüsselvereinbarungs- und transportprotokoll

Info

Publication number
ATE523017T1
ATE523017T1 AT04733283T AT04733283T ATE523017T1 AT E523017 T1 ATE523017 T1 AT E523017T1 AT 04733283 T AT04733283 T AT 04733283T AT 04733283 T AT04733283 T AT 04733283T AT E523017 T1 ATE523017 T1 AT E523017T1
Authority
AT
Austria
Prior art keywords
value
session key
transport protocol
key agreement
cryptographic function
Prior art date
Application number
AT04733283T
Other languages
German (de)
English (en)
Inventor
Marinus Struik
Original Assignee
Certicom Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Family has litigation
First worldwide family litigation filed litigation Critical https://patents.darts-ip.com/?family=33449796&utm_source=google_patent&utm_medium=platform_link&utm_campaign=public_patent_search&patent=ATE523017(T1) "Global patent litigation dataset” by Darts-ip is licensed under a Creative Commons Attribution 4.0 International License.
Application filed by Certicom Corp filed Critical Certicom Corp
Application granted granted Critical
Publication of ATE523017T1 publication Critical patent/ATE523017T1/de

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/126Applying verification of the received information the source of the received data
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0838Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
    • H04L9/0841Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols
    • H04L9/0844Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols with user authentication or key authentication, e.g. ElGamal, MTI, MQV-Menezes-Qu-Vanstone protocol or Diffie-Hellman protocols using implicitly-certified keys
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • H04L9/3242Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving keyed hash functions, e.g. message authentication codes [MACs], CBC-MAC or HMAC
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F7/00Methods or arrangements for processing data by operating upon the order or content of the data handled
    • G06F7/60Methods or arrangements for performing computations using a digital non-denominational number representation, i.e. number representation without radix; Computing devices using combinations of denominational and non-denominational quantity representations, e.g. using difunction pulse trains, STEELE computers, phase computers
    • G06F7/72Methods or arrangements for performing computations using a digital non-denominational number representation, i.e. number representation without radix; Computing devices using combinations of denominational and non-denominational quantity representations, e.g. using difunction pulse trains, STEELE computers, phase computers using residue arithmetic
    • G06F7/724Finite field arithmetic
    • G06F7/725Finite field arithmetic over elliptic curves

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Power Engineering (AREA)
  • Computer And Data Communications (AREA)
  • Storage Device Security (AREA)
AT04733283T 2003-05-16 2004-05-17 Schlüsselvereinbarungs- und transportprotokoll ATE523017T1 (de)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US10/440,486 US7334127B2 (en) 1995-04-21 2003-05-16 Key agreement and transport protocol
PCT/CA2004/000727 WO2004102918A2 (en) 2003-05-16 2004-05-17 Key agreement and transport protocol

Publications (1)

Publication Number Publication Date
ATE523017T1 true ATE523017T1 (de) 2011-09-15

Family

ID=33449796

Family Applications (1)

Application Number Title Priority Date Filing Date
AT04733283T ATE523017T1 (de) 2003-05-16 2004-05-17 Schlüsselvereinbarungs- und transportprotokoll

Country Status (6)

Country Link
US (1) US7334127B2 (enExample)
EP (1) EP1642437B1 (enExample)
JP (2) JP4781269B2 (enExample)
AT (1) ATE523017T1 (enExample)
CA (1) CA2525894C (enExample)
WO (1) WO2004102918A2 (enExample)

Families Citing this family (36)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR100571820B1 (ko) * 2003-10-20 2006-04-17 삼성전자주식회사 신원 정보를 기반으로 하는 암호 시스템에서의 컨퍼런스세션 키 분배 방법
JP4741503B2 (ja) * 2003-10-28 2011-08-03 サーティコム コーポレーション 公開鍵を検証可能に生成する方法及び装置
US7788480B2 (en) * 2003-11-05 2010-08-31 Cisco Technology, Inc. Protected dynamic provisioning of credentials
US7757086B2 (en) * 2004-05-27 2010-07-13 Silverbrook Research Pty Ltd Key transportation
US7328956B2 (en) * 2004-05-27 2008-02-12 Silverbrook Research Pty Ltd Printer comprising a printhead and at least two printer controllers connected to a common input of the printhead
US7484831B2 (en) * 2004-05-27 2009-02-03 Silverbrook Research Pty Ltd Printhead module having horizontally grouped firing order
US7427117B2 (en) * 2004-05-27 2008-09-23 Silverbrook Research Pty Ltd Method of expelling ink from nozzles in groups, alternately, starting at outside nozzles of each group
US7549718B2 (en) * 2004-05-27 2009-06-23 Silverbrook Research Pty Ltd Printhead module having operation controllable on basis of thermal sensors
US7735944B2 (en) 2004-05-27 2010-06-15 Silverbrook Research Pty Ltd Printer comprising two printhead modules and at least two printer controllers
US20060294312A1 (en) * 2004-05-27 2006-12-28 Silverbrook Research Pty Ltd Generation sequences
ES2348240T3 (es) * 2004-10-29 2010-12-01 Thomson Licensing Canal autenticado seguro.
US7545932B2 (en) * 2004-10-29 2009-06-09 Thomson Licensing Secure authenticated channel
AU2008201456B2 (en) * 2004-10-29 2010-04-29 Thomson Licensing Secure authenticated channel
EP1906587A3 (en) 2004-10-29 2008-04-16 Thomson Licensing, Inc. Secure authenticated channel
WO2006051517A1 (en) * 2004-11-12 2006-05-18 Dublin City University Identity based encryption
JP2006155045A (ja) * 2004-11-26 2006-06-15 Sony Corp 電子価値情報伝送システム及び電子価値情報伝送方法
KR100675836B1 (ko) * 2004-12-10 2007-01-29 한국전자통신연구원 Epon 구간내에서의 링크 보안을 위한 인증 방법
US8099598B1 (en) * 2005-01-03 2012-01-17 Gary Gang Liu Secure messaging system with automatic recipient enrollment
DE102005026982A1 (de) * 2005-06-10 2006-12-14 Siemens Ag Verfahren zur Vereinbarung eines Sicherheitsschlüssels zwischen mindestens einem ersten und einem zweiten Kommunikationsteilnehmer zur Sicherung einer Kommunikationsverbindung
US7627760B2 (en) * 2005-07-21 2009-12-01 Microsoft Corporation Extended authenticated key exchange
US7694141B2 (en) 2005-07-26 2010-04-06 Microsoft Corporation Extended authenticated key exchange with key confirmation
US8190895B2 (en) * 2005-08-18 2012-05-29 Microsoft Corporation Authenticated key exchange with derived ephemeral keys
US7908482B2 (en) * 2005-08-18 2011-03-15 Microsoft Corporation Key confirmed authenticated key exchange with derived ephemeral keys
US7783041B2 (en) * 2005-10-03 2010-08-24 Nokia Corporation System, method and computer program product for authenticating a data agreement between network entities
US7664955B2 (en) * 2006-03-07 2010-02-16 Atheros Communications, Inc. Establishing shared information in a network
US20090100264A1 (en) * 2006-04-28 2009-04-16 Yuichi Futa Communication device and communication system
US7913085B2 (en) * 2007-06-15 2011-03-22 Koolspan, Inc. System and method of per-packet keying
CN101917270B (zh) * 2010-08-03 2012-08-22 中国科学院软件研究所 一种基于对称密码的弱认证和密钥协商方法
JP5238045B2 (ja) * 2011-02-02 2013-07-17 トムソン ライセンシング セキュア認証チャネル
JP5306405B2 (ja) 2011-03-31 2013-10-02 株式会社東芝 情報処理装置およびプログラム
EP2819057B1 (en) * 2013-06-24 2017-08-09 Nxp B.V. Data processing system, method of initializing a data processing system, and computer program product
CN104243493A (zh) * 2014-10-11 2014-12-24 上海众人科技有限公司 一种网络身份认证方法及系统
US9509679B2 (en) 2014-11-21 2016-11-29 Dropbox, Inc. System and method for non-replayable communication sessions
WO2019025603A1 (en) * 2017-08-03 2019-02-07 Ipcom Gmbh & Co. Kg EU DESIGNED TO TRANSMIT SERVICE VALIDATION MESSAGES
CN111031365B (zh) * 2020-01-13 2022-01-21 深圳市网安信科技有限公司 一种适用于云端广播电视网的用户认证系统
CN112738038B (zh) * 2020-12-17 2024-05-28 北京握奇智能科技有限公司 一种基于非对称口令认证的密钥协商的方法和装置

Family Cites Families (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4200770A (en) 1977-09-06 1980-04-29 Stanford University Cryptographic apparatus and method
DE3915262A1 (de) 1988-05-18 1989-11-30 Asea Brown Boveri Verfahren zur erzeugung von authentifizierten geheimschluesseln
US4956863A (en) 1989-04-17 1990-09-11 Trw Inc. Cryptographic method and apparatus for public key exchange with authentication
EP0639907B1 (en) * 1993-08-17 1999-12-08 R3 Security Engineering AG Digital signature method and key agreement method
US5491749A (en) 1993-12-30 1996-02-13 International Business Machines Corporation Method and apparatus for entity authentication and key distribution secure against off-line adversarial attacks
US5586186A (en) 1994-07-15 1996-12-17 Microsoft Corporation Method and system for controlling unauthorized access to information distributed to users
US5761305A (en) 1995-04-21 1998-06-02 Certicom Corporation Key agreement and transport protocol with implicit signatures
US6487661B2 (en) 1995-04-21 2002-11-26 Certicom Corp. Key agreement and transport protocol
AU5266596A (en) 1995-04-21 1996-11-07 Certicom Corp. Method for signature and session key generation
CA2176972C (en) 1995-05-17 2008-11-25 Scott A. Vanstone Key agreement and transport protocol with implicit signatures
WO1999057844A1 (en) 1998-05-01 1999-11-11 Certicom Corp. Authenticated key agreement protocol
US6192474B1 (en) 1998-07-31 2001-02-20 Lucent Technologies Inc. Method for establishing a key using over-the-air communication and password protocol and password protocol
US7047408B1 (en) * 2000-03-17 2006-05-16 Lucent Technologies Inc. Secure mutual network authentication and key exchange protocol
US7076656B2 (en) * 2001-04-05 2006-07-11 Lucent Technologies Inc. Methods and apparatus for providing efficient password-authenticated key exchange
DE10137152A1 (de) 2001-07-30 2003-02-27 Scm Microsystems Gmbh Verfahren zur Übertragung vertraulicher Daten

Also Published As

Publication number Publication date
JP5171991B2 (ja) 2013-03-27
WO2004102918A2 (en) 2004-11-25
WO2004102918A3 (en) 2005-05-06
EP1642437B1 (en) 2011-08-31
JP2011182454A (ja) 2011-09-15
EP1642437A2 (en) 2006-04-05
US7334127B2 (en) 2008-02-19
CA2525894C (en) 2013-04-16
CA2525894A1 (en) 2004-11-25
US20040081321A1 (en) 2004-04-29
JP4781269B2 (ja) 2011-09-28
JP2006529064A (ja) 2006-12-28

Similar Documents

Publication Publication Date Title
ATE523017T1 (de) Schlüsselvereinbarungs- und transportprotokoll
CA2174260A1 (en) Key agreement and transport protocol
DE60326092D1 (de) Speichern und authentifizierung von datentransaktionen
NO20044028L (no) Bruk av isogenier for utvikling av kryptosystemer
BR0311994A (pt) geração de chave em um sistema de comunicação
GB2449617B (en) A cryptographic key sharing method
WO2005053209A3 (en) Tokens/keys for wireless communications
GB2453091B (en) Ad-hoc network key management
TW200633462A (en) Stateless hardware security module
ATE465572T1 (de) Sicherer datentransfer
TW200610349A (en) Key derivation functions to enhance security
EA201100887A1 (ru) Способ формирования шифровального/дешифровального ключа
ATE374478T1 (de) System und verfahren für das erneuern von schlüsseln, welche in public-key kryptographie genutzt werden
WO2007127576A3 (en) Method for elliptic curve public key cryptographic validation
ATE255787T1 (de) Ein fuzzy engagement schema
WO2006050152A3 (en) Secure collaborative terminal identity authentication between a wireless communication device and a wireless operator
WO2005101722A3 (en) Asynchronous enhanced shared secret provisioning protocol
SG143152A1 (en) System and method for secure record protocol using shared knowledge of mobile user credentials
GB0722899D0 (en) Method and apparatus for use in a communications network
ATE499787T1 (de) System und verfahren zur sicherung von daten
AR003051A1 (es) Un procedimiento de comunicacion criptografica asimetrica para tratar mensajes y asegurar comunicaciones entre interlocutores.
DE60123949D1 (de) Verfahren zur Validierung einer Verschlüsselten Nachricht
MY141019A (en) Challenge-based authentication without requiring knowledge of secret authentication
MX2021008680A (es) Tecnicas para autenticacion de llamadas.
BR0115573A (pt) Esquema de criptografia limite para sistemas de autenticação de mensagens

Legal Events

Date Code Title Description
RER Ceased as to paragraph 5 lit. 3 law introducing patent treaties