CA2458819A1 - Protocole d'accord a cles base sur la dynamique du reseau - Google Patents

Protocole d'accord a cles base sur la dynamique du reseau Download PDF

Info

Publication number
CA2458819A1
CA2458819A1 CA002458819A CA2458819A CA2458819A1 CA 2458819 A1 CA2458819 A1 CA 2458819A1 CA 002458819 A CA002458819 A CA 002458819A CA 2458819 A CA2458819 A CA 2458819A CA 2458819 A1 CA2458819 A1 CA 2458819A1
Authority
CA
Canada
Prior art keywords
string
station
gamma
strings
length
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
CA002458819A
Other languages
English (en)
Inventor
Xiaomin Bao
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
NON-ELEPHANT ENCRYPTION SYSTEMS (BARBADOS) Inc
Original Assignee
NON-ELEPHANT ENCRYPTION SYSTEMS (BARBADOS), INC.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by NON-ELEPHANT ENCRYPTION SYSTEMS (BARBADOS), INC. filed Critical NON-ELEPHANT ENCRYPTION SYSTEMS (BARBADOS), INC.
Priority to CA002458819A priority Critical patent/CA2458819A1/fr
Publication of CA2458819A1 publication Critical patent/CA2458819A1/fr
Abandoned legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0838Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/321Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority
    • H04L9/3213Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority using tickets or tokens, e.g. Kerberos
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/40Network security protocols

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Detection And Prevention Of Errors In Transmission (AREA)
CA002458819A 2004-02-24 2004-02-24 Protocole d'accord a cles base sur la dynamique du reseau Abandoned CA2458819A1 (fr)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CA002458819A CA2458819A1 (fr) 2004-02-24 2004-02-24 Protocole d'accord a cles base sur la dynamique du reseau

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CA002458819A CA2458819A1 (fr) 2004-02-24 2004-02-24 Protocole d'accord a cles base sur la dynamique du reseau

Publications (1)

Publication Number Publication Date
CA2458819A1 true CA2458819A1 (fr) 2005-08-24

Family

ID=34865929

Family Applications (1)

Application Number Title Priority Date Filing Date
CA002458819A Abandoned CA2458819A1 (fr) 2004-02-24 2004-02-24 Protocole d'accord a cles base sur la dynamique du reseau

Country Status (1)

Country Link
CA (1) CA2458819A1 (fr)

Similar Documents

Publication Publication Date Title
US20030215088A1 (en) Key agreement protocol based on network dynamics
Catalano et al. Efficient network coding signatures in the standard model
Desmedt Some recent research aspects of threshold cryptography
Vilela et al. Lightweight security for network coding
Staddon et al. Self-healing key distribution with revocation
US7609839B2 (en) Quantum key distribution method and communication device
Zeng et al. A distributed fault/intrusion-tolerant sensor data storage scheme based on network coding and homomorphic fingerprinting
Yao et al. Network codes resilient to jamming and eavesdropping
D'Oliveira et al. Post-quantum security for ultra-reliable low-latency heterogeneous networks
Wu et al. Three improved algorithms for multipath key establishment in sensor networks using protocols for secure message transmission
Maurer The role of information theory in cryptography
Safaka et al. Exchanging pairwise secrets efficiently
CN114465733B (zh) 一种基于改进rsa的安全网络编码方法
CA2462384A1 (fr) Protocole d'echange de cle fonde sur la dynamique d'un reseau
CA2458819A1 (fr) Protocole d'accord a cles base sur la dynamique du reseau
IE20020742A1 (en) A Key Agreement Protocol Based on Network Dynamics
AU2002339702A1 (en) A key agreement protocol based on network dynamics
Ibrahim et al. Ciphertext-only attack on RSA using lattice basis reduction
AU2004201034A1 (en) A key agreement protocol based on network dynamics
Evgnosia-Alexandra A note on post quantum onion routing
RU2812343C1 (ru) Способ управления ресурсами аутентификации в сетях квантового распределения ключей, описываемых связными графами произвольных конфигураций
Noura et al. Edca: efficient diffusion cipher and authentication scheme for wireless sensor networks
Gui et al. A Threshold Authenticated Encryption Scheme for Secure Communications in Aging-in-Place Systems
Gabidulin et al. Information security in a random network coding network
Safaka et al. Exchanging secrets without using cryptography

Legal Events

Date Code Title Description
FZDE Discontinued