CA2596067C - Procede et systeme permettant de deriver une cle de chiffrement au moyen d'un caractere aleatoire combine non partage par d'autres - Google Patents

Procede et systeme permettant de deriver une cle de chiffrement au moyen d'un caractere aleatoire combine non partage par d'autres Download PDF

Info

Publication number
CA2596067C
CA2596067C CA2596067A CA2596067A CA2596067C CA 2596067 C CA2596067 C CA 2596067C CA 2596067 A CA2596067 A CA 2596067A CA 2596067 A CA2596067 A CA 2596067A CA 2596067 C CA2596067 C CA 2596067C
Authority
CA
Canada
Prior art keywords
key
wtru
pmk
secret
bits
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CA2596067A
Other languages
English (en)
Other versions
CA2596067A1 (fr
Inventor
Marian Rudolf
Rajat Pritam Mukherjee
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
InterDigital Technology Corp
Original Assignee
InterDigital Technology Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Family has litigation
First worldwide family litigation filed litigation Critical https://patents.darts-ip.com/?family=36740955&utm_source=google_patent&utm_medium=platform_link&utm_campaign=public_patent_search&patent=CA2596067(C) "Global patent litigation dataset” by Darts-ip is licensed under a Creative Commons Attribution 4.0 International License.
Priority claimed from US11/318,381 external-priority patent/US8280046B2/en
Application filed by InterDigital Technology Corp filed Critical InterDigital Technology Corp
Publication of CA2596067A1 publication Critical patent/CA2596067A1/fr
Application granted granted Critical
Publication of CA2596067C publication Critical patent/CA2596067C/fr
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0838Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
    • H04L9/0841Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0875Generation of secret information including derivation or calculation of cryptographic keys or passwords based on channel impulse response [CIR]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/321Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • H04W12/043Key management, e.g. using generic bootstrapping architecture [GBA] using a trusted network node as an anchor
    • H04W12/0431Key distribution or pre-distribution; Key agreement
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/34Encoding or coding, e.g. Huffman coding or error correction
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/80Wireless
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2463/00Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
    • H04L2463/061Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00 applying further key derivation, e.g. deriving traffic keys from a pair-wise master key
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/065Network architectures or network communication protocols for network security for supporting key management in a packet data network for group communications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0892Network architectures or network communication protocols for network security for authentication of entities by using authentication-authorization-accounting [AAA] servers or protocols
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general
    • H04L63/205Network architectures or network communication protocols for network security for managing network security; network security policies in general involving negotiation or determination of the one or more network security mechanisms to be used, e.g. by negotiation between the client and the server or between peers or by selection according to the capabilities of the entities involved

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Small-Scale Networks (AREA)
  • Storage Device Security (AREA)
CA2596067A 2005-01-27 2006-01-19 Procede et systeme permettant de deriver une cle de chiffrement au moyen d'un caractere aleatoire combine non partage par d'autres Expired - Fee Related CA2596067C (fr)

Applications Claiming Priority (8)

Application Number Priority Date Filing Date Title
US64748205P 2005-01-27 2005-01-27
US71617705P 2005-09-12 2005-09-12
US60/716,177 2005-09-12
US73433105P 2005-11-07 2005-11-07
US60/734,331 2005-11-07
US11/318,381 US8280046B2 (en) 2005-09-12 2005-12-23 Method and system for deriving an encryption key using joint randomness not shared by others
US11/318,381 2005-12-23
PCT/US2006/001839 WO2006081122A2 (fr) 2005-01-27 2006-01-19 Procede et systeme permettant de deriver une cle de chiffrement au moyen d'un caractere aleatoire combine non partage par d'autres

Publications (2)

Publication Number Publication Date
CA2596067A1 CA2596067A1 (fr) 2006-08-03
CA2596067C true CA2596067C (fr) 2013-09-17

Family

ID=36740955

Family Applications (1)

Application Number Title Priority Date Filing Date
CA2596067A Expired - Fee Related CA2596067C (fr) 2005-01-27 2006-01-19 Procede et systeme permettant de deriver une cle de chiffrement au moyen d'un caractere aleatoire combine non partage par d'autres

Country Status (9)

Country Link
EP (1) EP1847060A4 (fr)
JP (1) JP4734344B2 (fr)
KR (3) KR20110076992A (fr)
CN (1) CN101951383B (fr)
CA (1) CA2596067C (fr)
MX (1) MX2007009063A (fr)
NO (1) NO20074210L (fr)
TW (2) TWI404393B (fr)
WO (1) WO2006081122A2 (fr)

Families Citing this family (34)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR101123993B1 (ko) 2006-04-18 2012-04-16 인터디지탈 테크날러지 코포레이션 무선 통신 보호 방법 및 시스템
JP2010504695A (ja) * 2006-09-21 2010-02-12 インターデイジタル テクノロジー コーポレーション グループ用秘密鍵の発生
KR20090067209A (ko) * 2006-10-12 2009-06-24 인터디지탈 테크날러지 코포레이션 브로드캐스트된 무작위 잡음을 이용하여 무선 장치의 암호 능력을 향상시키는 방법 및 시스템
GB2447674B (en) * 2007-03-21 2011-08-03 Lancaster University Generation of a cryptographic key from device motion
US10091648B2 (en) 2007-04-26 2018-10-02 Qualcomm Incorporated Method and apparatus for new key derivation upon handoff in wireless networks
WO2009014063A1 (fr) * 2007-07-20 2009-01-29 Nec Corporation Procédé de communication chiffrée et système de communication chiffrée
US9198033B2 (en) * 2007-09-27 2015-11-24 Alcatel Lucent Method and apparatus for authenticating nodes in a wireless network
CN101933285B (zh) * 2007-11-06 2013-01-02 交互数字专利控股公司 用于实现物理层密钥生成的方法和装置
WO2009140228A1 (fr) * 2008-05-12 2009-11-19 Interdigital Patent Holdings, Inc. Génération de confidentialité d'informations théoriquement sécurisées
WO2010006035A2 (fr) * 2008-07-08 2010-01-14 Interdigital Patent Holdings, Inc. Support de sécurité de couche physique dans des réseaux locaux sans fil
FR2976431B1 (fr) * 2011-06-07 2014-01-24 Commissariat Energie Atomique Methode de generation de cle secrete pour systeme de communication sans fil
KR101269026B1 (ko) 2011-12-21 2013-05-29 한국전자통신연구원 무선 채널의 상태를 이용하여 그룹키를 생성하는 장치 및 그 방법
US10146850B2 (en) 2012-10-30 2018-12-04 FHOOSH, Inc. Systems and methods for collecting, classifying, organizing and populating information on electronic forms
US20140269362A1 (en) * 2013-03-15 2014-09-18 Shahrnaz Azizi Techniques to Update a Wireless Communication Channel Estimation
US9124580B1 (en) * 2014-02-07 2015-09-01 The Boeing Company Method and system for securely establishing cryptographic keys for aircraft-to-aircraft communications
DE102014208965A1 (de) 2014-05-13 2015-11-19 Robert Bosch Gmbh Verfahren zur Authentifizierung eines Netzwerkteilnehmers sowie Netzwerkteilnehmer, Netzwerk und Computerprogramm hierzu
DE102014208975A1 (de) 2014-05-13 2015-11-19 Robert Bosch Gmbh Verfahren zur Generierung eines Schlüssels in einem Netzwerk sowie Teilnehmer an einem Netzwerk und Netzwerk
DE102014208964A1 (de) 2014-05-13 2015-11-19 Robert Bosch Gmbh Verfahren zur Generierung eines Schlüssels in einem Netzwerk sowie dazu eingerichtete Teilnehmer des Netzwerkes
DE102014209046A1 (de) 2014-05-13 2015-11-19 Robert Bosch Gmbh Verfahren zur Generierung eines geheimen, kryptographischen Schlüssels in einem mobilen Endgerät
DE102014208974A1 (de) 2014-05-13 2015-11-19 Robert Bosch Gmbh Verfahren zur Ermittlung einer Information über die Entfernung zwischen zwei Geräten sowie hierzu eingerichtete Geräte und Computerprogramme
DE102014217330A1 (de) 2014-08-29 2016-03-03 Robert Bosch Gmbh Verfahren zum Informationsabgleich zwischen Geräten sowie hierzu eingerichtetes Gerät
DE102014217320A1 (de) 2014-08-29 2016-03-03 Robert Bosch Gmbh Verfahren zur Generierung eines kryptographischen Schlüssels in einem Gerät sowie hierzu eingerichtetes Gerät
SG11201808317XA (en) 2014-09-23 2018-10-30 Fhoosh Inc Secure high speed data storage, access, recovery, and transmission
US10579823B2 (en) 2014-09-23 2020-03-03 Ubiq Security, Inc. Systems and methods for secure high speed data generation and access
DE102015215569A1 (de) 2015-08-14 2017-02-16 Robert Bosch Gmbh Verfahren zur Generierung eines Geheimnisses zwischen Teilnehmern eines Netzwerkes sowie dazu eingerichtete Teilnehmer des Netzwerks
WO2017063716A1 (fr) * 2015-10-16 2017-04-20 Huawei Technologies Co., Ltd. Procédé d'appariement sécurisé pour des systèmes mimo
DE102015225220A1 (de) 2015-12-15 2017-06-22 Robert Bosch Gmbh Verfahren zur Erzeugung einer geheimen Wertefolge in einem Gerät abhängig von gemessenen physikalischen Eigenschaften eines Übertragungskanals
DE102015225222A1 (de) 2015-12-15 2017-06-22 Robert Bosch Gmbh Verfahren zur Erzeugung einer geheimen Wertefolge in einem Gerät abhängig von gemessenen physikalischen Eigenschaften eines Übertragungskanals
FR3046315B1 (fr) * 2015-12-29 2018-04-27 Thales Procede d'extraction univalente et univoque de cles a partir du canal de propagation
KR20180097903A (ko) 2017-02-24 2018-09-03 삼성전자주식회사 무선 통신 시스템에서 보안 키를 생성하기 위한 장치 및 방법
US11349656B2 (en) * 2018-03-08 2022-05-31 Ubiq Security, Inc. Systems and methods for secure storage and transmission of a data stream
GB201817117D0 (en) 2018-10-19 2018-12-05 Nat Univ Ireland Maynooth Encryption method
EP3697052A1 (fr) * 2019-02-14 2020-08-19 Siemens Aktiengesellschaft Procédé et système de transfert de données dans un réseau
EP4371267A1 (fr) * 2021-07-16 2024-05-22 Qualcomm Incorporated Vérification de clé secrète dans une communication sans fil

Family Cites Families (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0301282A1 (fr) * 1987-07-31 1989-02-01 BBC Brown Boveri AG Procédé de transmission de signaux
US5450456A (en) * 1993-11-12 1995-09-12 Daimler Benz Ag Method and arrangement for measuring the carrier frequency deviation in a multi-channel transmission system
EP0767543A3 (fr) * 1995-10-06 2000-07-26 Siemens Aktiengesellschaft Communication à multiplexage par répartition de code avec suppression d'interférence
US5745578A (en) * 1996-06-17 1998-04-28 Ericsson Inc. Apparatus and method for secure communication based on channel characteristics
JP2006180549A (ja) * 2002-02-28 2006-07-06 Matsushita Electric Ind Co Ltd 通信装置及び通信方法
JP2004032679A (ja) * 2002-02-28 2004-01-29 Matsushita Electric Ind Co Ltd 通信装置及び通信システム
JP2003273856A (ja) * 2002-03-14 2003-09-26 Communication Research Laboratory 通信装置および通信方法
JP4245972B2 (ja) * 2002-05-29 2009-04-02 Nttエレクトロニクス株式会社 無線通信方法、無線通信装置、通信制御プログラム、通信制御装置、鍵管理プログラム、無線lanシステム、および記録媒体
US7587598B2 (en) * 2002-11-19 2009-09-08 Toshiba America Research, Inc. Interlayer fast authentication or re-authentication for network communication
JP2004187197A (ja) * 2002-12-06 2004-07-02 Doshisha 無線通信システム、無線通信方法、および無線局
JP2004208073A (ja) * 2002-12-25 2004-07-22 Sony Corp 無線通信システム
JP2005130127A (ja) * 2003-10-22 2005-05-19 Sumitomo Electric Ind Ltd 秘話通信方法および通信端末装置
US7505596B2 (en) * 2003-12-05 2009-03-17 Microsoft Corporation Automatic detection of wireless network type
JPWO2006011345A1 (ja) * 2004-07-29 2008-05-01 松下電器産業株式会社 無線通信装置及び無線通信方法
WO2006013798A1 (fr) * 2004-08-04 2006-02-09 Matsushita Electric Industrial Co., Ltd. Méthode de radiocommunication, système de radiocommunication et dispositif de radiocommunication
JPWO2006013699A1 (ja) * 2004-08-04 2008-05-01 松下電器産業株式会社 無線通信装置、無線通信システム及び無線通信方法

Also Published As

Publication number Publication date
KR20070088821A (ko) 2007-08-29
KR101011470B1 (ko) 2011-01-28
TWI404393B (zh) 2013-08-01
NO20074210L (no) 2007-10-24
JP2008529413A (ja) 2008-07-31
TW200723818A (en) 2007-06-16
CN101951383A (zh) 2011-01-19
JP4734344B2 (ja) 2011-07-27
WO2006081122A2 (fr) 2006-08-03
CA2596067A1 (fr) 2006-08-03
TWI378701B (en) 2012-12-01
EP1847060A2 (fr) 2007-10-24
MX2007009063A (es) 2007-10-02
KR20070096008A (ko) 2007-10-01
KR101253370B1 (ko) 2013-04-11
EP1847060A4 (fr) 2011-09-14
WO2006081122A3 (fr) 2007-11-22
CN101951383B (zh) 2013-06-19
TW200633460A (en) 2006-09-16
KR20110076992A (ko) 2011-07-06

Similar Documents

Publication Publication Date Title
CA2596067C (fr) Procede et systeme permettant de deriver une cle de chiffrement au moyen d'un caractere aleatoire combine non partage par d'autres
US8280046B2 (en) Method and system for deriving an encryption key using joint randomness not shared by others
US9130693B2 (en) Generation of perfectly secret keys in wireless communication networks
Zhang et al. Design of an OFDM physical layer encryption scheme
US20070036353A1 (en) Authentication and encryption methods using shared secret randomness in a joint channel
Toorani et al. An elliptic curve-based signcryption scheme with forward secrecy
KR20110117169A (ko) Id 기반 인증 키 동의 프로토콜을 수행하기 위한 방법 및 장치
JP2014509094A (ja) 無線通信を安全にするシステム及び方法
Yao et al. Post Quantum KEM authentication in SPDM for secure session establishment
Hwang et al. A Key management for wireless communications
Xu et al. Anti-Quantum Certificateless Group Authentication for Massive Accessing IoT devices
Mulkey et al. Towards an efficient protocol for privacy and authentication in wireless networks
de Ree et al. Grain-128PLE: generic physical-layer encryption for IoT networks
Lavanya et al. Privacy Preserving Physical Layer Authentication Scheme for LBS based Wireless Networks
JARECKI Password Authenticated Key Exchange: Protocols and Security Models
Lim et al. Secure deniable authenticated key establishment for internet protocols
Patrick Wireless LAN Security

Legal Events

Date Code Title Description
EEER Examination request
MKLA Lapsed

Effective date: 20190121