AU2003223022A1 - Method for protecting secret key cryptographic schemes - Google Patents
Method for protecting secret key cryptographic schemesInfo
- Publication number
- AU2003223022A1 AU2003223022A1 AU2003223022A AU2003223022A AU2003223022A1 AU 2003223022 A1 AU2003223022 A1 AU 2003223022A1 AU 2003223022 A AU2003223022 A AU 2003223022A AU 2003223022 A AU2003223022 A AU 2003223022A AU 2003223022 A1 AU2003223022 A1 AU 2003223022A1
- Authority
- AU
- Australia
- Prior art keywords
- secret key
- key cryptographic
- cryptographic schemes
- protecting secret
- protecting
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0877—Generation of secret information including derivation or calculation of cryptographic keys or passwords using additional device, e.g. trusted platform module [TPM], smartcard, USB or hardware security module [HSM]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/088—Usage controlling of secret information, e.g. techniques for restricting cryptographic keys to pre-authorized uses, different access levels, validity of crypto-period, different key- or password length, or different strong and weak cryptographic algorithms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3271—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/08—Randomization, e.g. dummy operations or using noise
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/80—Wireless
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Lock And Its Accessories (AREA)
- Storage Device Security (AREA)
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
ZA200201944 | 2002-04-30 | ||
ZA2002/1944 | 2002-04-30 | ||
PCT/IB2003/001653 WO2003094483A2 (en) | 2002-04-30 | 2003-04-29 | Method for protecting secret key cryptographic schemes |
Publications (2)
Publication Number | Publication Date |
---|---|
AU2003223022A1 true AU2003223022A1 (en) | 2003-11-17 |
AU2003223022A8 AU2003223022A8 (en) | 2003-11-17 |
Family
ID=29401960
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
AU2003223022A Abandoned AU2003223022A1 (en) | 2002-04-30 | 2003-04-29 | Method for protecting secret key cryptographic schemes |
Country Status (3)
Country | Link |
---|---|
EP (1) | EP1504560A4 (en) |
AU (1) | AU2003223022A1 (en) |
WO (1) | WO2003094483A2 (en) |
Family Cites Families (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4605820A (en) * | 1983-11-10 | 1986-08-12 | Visa U.S.A. Inc. | Key management system for on-line communication |
US5003596A (en) * | 1989-08-17 | 1991-03-26 | Cryptech, Inc. | Method of cryptographically transforming electronic digital data from one form to another |
US6075859A (en) * | 1997-03-11 | 2000-06-13 | Qualcomm Incorporated | Method and apparatus for encrypting data in a wireless communication system |
FR2766317B1 (en) * | 1997-07-15 | 1999-09-24 | Alsthom Cge Alcatel | DEVICE FOR CONNECTING A TELEPHONE SWITCH TO A FIXED TELEPHONE NETWORK VIA A PLURALITY OF FIXED RADIOTELEPHONIC TERMINALS OF A RADIOTELEPHONE NETWORK |
DE19820422A1 (en) * | 1998-05-07 | 1999-11-11 | Giesecke & Devrient Gmbh | Method for authenticating a chip card within a message transmission network |
US6338140B1 (en) * | 1998-07-27 | 2002-01-08 | Iridium Llc | Method and system for validating subscriber identities in a communications network |
EP1269783A2 (en) * | 2000-03-15 | 2003-01-02 | Nokia Corporation | Method, and associated apparatus, for generating security keys in a communication system |
-
2003
- 2003-04-29 AU AU2003223022A patent/AU2003223022A1/en not_active Abandoned
- 2003-04-29 EP EP03718989A patent/EP1504560A4/en not_active Withdrawn
- 2003-04-29 WO PCT/IB2003/001653 patent/WO2003094483A2/en not_active Application Discontinuation
Also Published As
Publication number | Publication date |
---|---|
WO2003094483A2 (en) | 2003-11-13 |
EP1504560A4 (en) | 2007-11-28 |
EP1504560A2 (en) | 2005-02-09 |
WO2003094483A3 (en) | 2004-01-29 |
AU2003223022A8 (en) | 2003-11-17 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
AU2003301719A1 (en) | Password encryption key | |
AU2002229972A1 (en) | Cryptographic key generation apparatus and method | |
AU2003241594A1 (en) | Advanced encryption standard (aes) hardware cryptographic engine | |
AU2003239730A1 (en) | Round key generation for aes rijndael block cipher | |
AU2003302094A1 (en) | Cryptographic methods and apparatus for secure authentication | |
AU2003216152A1 (en) | Secure electonic messqging system requiring key retrieval for deriving decryption keys | |
EP1548687A4 (en) | Tamper-resistant elliptical curve encryption using secret key | |
AU2001260970A1 (en) | Block encryption method and schemes for data confidentiality and integrity protection | |
AU2002321071A1 (en) | A method and system for generating and verifying a key protection certificate. | |
AU2001268071A1 (en) | Cryptographic communications using pseudo-randomly generated cryptography keys | |
AU2003265291A1 (en) | Cryptographic key distribution using key unfolding | |
AU2002365343A1 (en) | Time-based encryption key | |
AU2003202118A1 (en) | A hybrid network encrypt/decrypt scheme | |
AP2005003445A0 (en) | Device and method for encrypting and decrypting a block of data. | |
AU2003294572A1 (en) | System and method for the exchange of cryptographic keys | |
IL158183A0 (en) | Removable cryptographic ignition key system and method | |
AU2003208493A1 (en) | Encryption key hiding and recovering method and system | |
AU2003278588A1 (en) | Method of extraction of a secret key | |
EP1278329A3 (en) | Improved cryptographic security system | |
AU1031501A (en) | Countermeasure method in an electronic component which uses an rsa-type public key cryptographic algorithm | |
AU3057500A (en) | Method for countermeasure in an electronic component using secret key algorithm | |
AU2002360605A1 (en) | Time division partial encryption | |
AU2003277413A1 (en) | Method and system for data encryption and decryption | |
IL158647A0 (en) | Data encryption method | |
AU2003255923A1 (en) | Method and system for generating a common secret key |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
MK6 | Application lapsed section 142(2)(f)/reg. 8.3(3) - pct applic. not entering national phase |