CN1123590A - 通过空中再密钥控多个通信组的方法 - Google Patents

通过空中再密钥控多个通信组的方法 Download PDF

Info

Publication number
CN1123590A
CN1123590A CN95190117.6A CN95190117A CN1123590A CN 1123590 A CN1123590 A CN 1123590A CN 95190117 A CN95190117 A CN 95190117A CN 1123590 A CN1123590 A CN 1123590A
Authority
CN
China
Prior art keywords
key
unit
grouping
communication
cipher
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN95190117.6A
Other languages
English (en)
Inventor
凯文·加德克
戴维·A·格林
凯文·卡茨
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Motorola Solutions Inc
Original Assignee
Motorola Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Motorola Inc filed Critical Motorola Inc
Publication of CN1123590A publication Critical patent/CN1123590A/zh
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/0822Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using key encryption key
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/083Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP]
    • H04L9/0833Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP] involving conference or group key
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0891Revocation or update of secret information, e.g. encryption key update or rekeying

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Optical Radar Systems And Details Thereof (AREA)
  • Prostheses (AREA)
  • Cable Transmission Systems, Equalization Of Radio And Reduction Of Echo (AREA)

Abstract

在保密通信系统100中,在不同通信组中的通信单元可在空中通过管理密钥单元101产生一个密钥分组121同时进行再密钥控。这个密钥分组121包括一个单元密钥122,一个密钥别名123和一个密钥表示物,该密钥分组121被传送到至少一个快速密钥单元102。当收到该密钥分组121时,该快速密钥单元根据该密钥别名确定哪些通信组的哪些通信单元被再密钥控。一旦这个被确定了,代表该单元密钥(加密密钥)122的密钥表示物121被传送到这些通信单元,因此同时地密钥控多个通信组中的多个通信单元。

Description

通过空中再密钥控多个通信组的方法
本发明涉及保密无线电通信系统,特别涉及通过空中再密钥控(rekeying)通信单元。
信息加密的保密无线电通信系统在本领域中是公知的。在这种系统中,当指配给一个通信单元组一个密钥并向该组的每个通信单元提供该密钥时,该组通信单元可以安全地保密通信。在具有多组的保密通信系统中需要多个密钥。密钥通常是由密钥管理控制器(KMC)管理的。给一个通信单元提供一个密钥经常称为“再密钥控”,而且该密钥管理控制器KMC利用“通过空中再密钥控(OTAR)”给该通信单元指配密钥,亦即这些通信单元经过一个无线信道进行“再密钥控”。这些通信单元也可以与“密钥—变量—负载(KVL)”一起进行再密钥控,但是,这种方法要求通信单元和KVL在再密钥控之前由一条互连电缆连接起来。如有必要,利用O-TAR或KVL可使密钥改变。
一些组织(诸如联邦代理机构)业已在全国各地工作。为了管理由这些代理机构使用的保密通信系统中的密钥,在每个地点提供一个KMC。为此,一个通信单元从具有本地KMC的一个地点移动到一个具有目的地KMC的目的地时需要从该目的地KMC得到一个密钥,以便在目的地安全地进行通信。在这种情况下,对该通信单元再密钥控要求在本地KMC的操作员与目的地KMC的操作者之间进行大量的协作。例如,本地KMC必须给该通信单元提供一个独特的隐蔽的密钥,该通信单元必须进入目的地KMC的数据库,而通信单元一旦到达时,目的地KMC必须给该通信单元装入该密钥。如可看到的,这种方法相当复杂而且要求大量的人工输入和接口。虽然这种方法对于一、两个单元还能工作得很好,但多组通信单元需要在多个地点处再密钥控时,该方法变得很复杂且很费时,而且还会遭受人为的差错。
据此,现在需要一种能够迅速地、容易地和在保持保密通信的同时无潜在人为差错的再密钥控多组保密通信单元的方法。
图1示出根据本发明的宽域保密通信系统的功能性方框图。
图2示出根据本发明的操作细节的逻辑图。
总地说来,本发明提供一种用于多个通信组通过空中再密钥控的方法。这是在一个管理密钥控单元产生一个密钥控分组时实现的,该密钥分组包括一个密钥别名和一个单元密钥。管理密钥单元将密钥分组提供给至少一个快速的(fleet)密钥单元。该快速密钥单元一收到密钥分组就确定从该密钥别名再密钥控的通信单元。利用所识别的单元,该快速密钥单元把该单元密钥发送到可能来自多个组的这些单元。利用这种方法,多组通信单元可同时地得到再密钥控,而无现有技术再密钥控方法的限制。
可对照图1和2更充分地叙述本发明。图1示出宽域保密通信网络100,该网络包括一个管理密钥单元101,快速密钥单元102—105和通信单元106—115(诸如摩托罗拉公司SaberTM便携式无线电设备或者摩托罗拉公司SpectraTM移动无线电设备)。与每个快速密钥单元102—105相关的是被划分工作组的通信单元106—115。例如,快速密钥单元102具有工作在两个组A和B中的相关通信单元106—109。每个密钥单元101—105可以是一个KMC,它包括一个存储装置116—120,如RAM,ROM,可编程存储器或者存储数字信息的任何其它装置。密钥单元101—105之间的通信经过一条链路提供,诸如使用传输控制协议/网间协议(TCP/IP)之类协议的以太局域网。当遇到较大的距离时,可使用诸如Telebit NetBlazer STTM的网络桥从该以太局域网通过电话modem传送信息到第二桥路单元并且到另一个以太网。
在密钥分组120中再密钥控信息经过该链路从管理密钥单元101传送到快速密钥单元102—105。密钥分组120包括至少一个密钥表示物121,一个单元密钥122,一个密钥别名123和一个注释字段124。密钥表示式识别可能是一个或几个加密密钥的单元密钥122。密钥别名123识别接收该单元密钥122的一个预定组的通信单元,和该注释字段124允许附上有关该单元密钥122的注释。
密钥单元101—105包括具有可编程平台的一个已知硬件配置,它可被配置如根据本发明在下面叙述的那样工作。
参见图2,管理密钥单元产生(200)一个密钥分组,它具有一个密钥表示物,一个单元密钥,一个密钥别名和一个操作注释字段。注意,管理密钥单元是选择用于起该管理单元作用的密钥单元之一。这样做避免由该管理密钥单元和该快速密钥单元产生的密钥表示式之间的冲突。
典型地,管理密钥单元加密该密钥分组并且经过以太网使用TCP/IP消息传送加密的密钥分组到该快速密钥单元。另一方案,可配置该管理密钥单元在特定时间传送加密的密钥分组到该快速密钥单元。
当收到加密的密钥分组时,快速密钥单元解密该加密密钥分组恢复该密钥分组。然后该快速密钥单元确定哪些组的哪些通信单元以密钥别名被认识。这种确定可以各种方式进行。例如,该快速密钥单元操作者可进行该决定,或者这些组和组的通信单元可被预定确定并且存储在存储器中。因此,该快速密钥单元存取其存储器来检索该预定信息,然后自动地响应该密钥分组。不管如何进行确定,该快速密钥单元都经过OTAR发送该单元密钥和密钥表示式到所识别的单元。当收到再密钥控信息时,每个通信单元存储它并且在通信之前发送(203)该密钥表示物。接收该传输的这些组和组的通信单元使用该密钥表示物确定(204)该单元密钥并进行保密通信。
另外,接收该传输并且与该密钥别名相关的第二快速密钥单元的组和组的通信单元也可确定该单元密钥和安全地进行通信。为此,利用在与不同快速密钥单元相关的通信组之间提供内部可提操作性的这种无缝操作(seamless operation)便于通信。
在保密通信系统中,单元密钥可经常改变。为了改变单元密钥,管理密钥单元产生一个第二密钥分组,它具有第二密钥表示物,第二单元密钥,密钥别名和一个任选的注释字段。管理密钥单元传送该第二密钥分组到该快速密钥单元。当该快速密钥单元确定第二密钥分组的密钥别名与先前接收的密钥分组的密钥别名相符时,该快速密钥单元还确定第二密钥分组提供一个新型式的单元密钥。然后该快速密钥单元确定一个合适的时间把第二单元密钥和第二密钥表示物传送到与该密钥别名相关的组和组的通信单元。按照这种方式该单元密钥可被改变。
作为一个工作的例子,考虑这样的一个情况:一组要抓捕的恐怖分子试图通过从一州到另一州不断地移动来逃脱追踪的联邦代理机构。为了协调追踪,在追踪期间该联邦代理机构必须在追踪机构与在每一州的本地机构之间提供保密通信。使用可能设定在该机构总部的管理密钥单元,密钥分组可被发送到恐怖分子可能逃到的任何特定州中的快速密钥单元,命令该快速密钥单元提供一个密钥给该追踪机构和本地机构的保密通信单元,允许这些机构在每个州安全地通信。这个能力大大地增强了该机构协调该追踪和成功地逮捕恐怖分子的能力。
本发明提供一种再密钥控多组保密通信单元的方法,可在保持保密通信的同时可快速、容易而无人为差错地进行。

Claims (10)

1.一种通过空中再密钥控多个通信组的方法,其特征在于,该方法包括以下步骤:
(a)由管理密钥单元产生一个密钥分组,它包括一个密钥表示物和密钥信息;
(b)由该管理密钥单元把密钥分组传送到至少一个快速密钥单元;
(c)当收到该密钥分组时,由该至少一个快速密钥单元根据该密钥信息确定接收该密钥表示物的多个通信组的通信单元;和
(d)由该至少一个快速密钥单元把该密钥表示物发送到多个通信组的通信单元。
2.根据权利要求1的方法,其特征在于,步骤(b)进一步包括:在传送之前,由该管理密钥单元加密该密钥单元产生一个加密的密钥分组。
3.根据权利要求2的方法,其特征在于,步骤(b)进一步包括解密该加密的密钥分组以便恢复该密钥分组。
4.根据权利要求1的方法,其特征在于,步骤(a)进一步包括产生包括至少一个单元密钥和一个密钥别名的密钥信息,其中该密钥别名识别多个通信组的通信单元,而该单元密钥识别加密密钥。
5.根据权利要求4的方法,其特征在于,还包括:由该管理密钥单元通过把第二密钥分组传送到至少一个快速密钥单元来改变该单元密钥,第二密钥分组具有第二单元密钥,第二密钥表示物和密钥别名。
6.根据权利要求1的方法,其特征在于,还包括由多个通信组的第一通信单元通过发送该密钥表示物开始保密通信。
7.根据权利要求6的方法,其特征在于,还包括由多个通信组的第二通信单元从该密钥表示物确该单元密钥参与保密通信。
8.一种密钥单元经过空中再密钥控管理多个通信组的方法,其特征在于,该方法包括以下步骤:
(a)产生一个密钥分组,它包括一个密钥表示物和密钥信息;
(b)把该密钥分组传送到至少一个快速密钥单元。
9.根据权利要求8的方法,其特征在于,步骤(b)还包括:在传送之前,加密该密钥分组产生加密的密钥分组。
10.根据权利要求8的方法,其特征在于,步骤(a)还包括:产生包括一个单元密钥和一个密钥别名的密钥分组,其中密钥别名识别多个通信组的通信单元,而单元密钥识别加密密钥。
CN95190117.6A 1994-02-28 1995-01-09 通过空中再密钥控多个通信组的方法 Pending CN1123590A (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US08/203,468 1994-02-28
US08/203,468 US5381479A (en) 1994-02-28 1994-02-28 Method for over the air rekeying of multiple communication groups

Publications (1)

Publication Number Publication Date
CN1123590A true CN1123590A (zh) 1996-05-29

Family

ID=22754143

Family Applications (1)

Application Number Title Priority Date Filing Date
CN95190117.6A Pending CN1123590A (zh) 1994-02-28 1995-01-09 通过空中再密钥控多个通信组的方法

Country Status (11)

Country Link
US (1) US5381479A (zh)
EP (1) EP0697154B1 (zh)
CN (1) CN1123590A (zh)
AT (1) ATE257631T1 (zh)
AU (1) AU673972B2 (zh)
DE (1) DE69532397T2 (zh)
DK (1) DK0697154T3 (zh)
ES (1) ES2214497T3 (zh)
PT (1) PT697154E (zh)
RU (1) RU2115249C1 (zh)
WO (1) WO1995023466A1 (zh)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1901446B (zh) * 2000-06-15 2010-05-12 索尼公司 使用了加密密钥组的信息处理系统及方法

Families Citing this family (31)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5651066A (en) * 1994-04-28 1997-07-22 Nippon Telegraph And Telephone Corporation Cipher key distribution system effectively preventing illegitimate use and charging of enciphered information
JP2581440B2 (ja) * 1994-05-11 1997-02-12 日本電気株式会社 スクランブル通信方式
US5619572A (en) * 1994-06-16 1997-04-08 Motorola, Inc. Method and apparatus for providing secure communications for a requested call
US5832086A (en) * 1995-09-27 1998-11-03 Motorola, Inc. Method for updating a communication unit parameter in a wireless communication system
DE19538385A1 (de) * 1995-10-14 1997-04-17 Deutsche Telekom Ag Verfahren zur Etablierung eines gemeinsamen Schlüssels für autorisierte Personen durch eine Zentrale
US5745576A (en) * 1996-05-17 1998-04-28 Visa International Service Association Method and apparatus for initialization of cryptographic terminal
US6055307A (en) * 1996-06-28 2000-04-25 At&T Corp. System and method for selecting agent destinations and monitoring calls made to network customers
US6128483A (en) * 1996-11-19 2000-10-03 Ericsson, Inc. Simultaneous over the air data download to multiple radios
US5940508A (en) * 1997-04-07 1999-08-17 Motorola, Inc. Method and apparatus for seamless crypto rekey system
US6738907B1 (en) 1998-01-20 2004-05-18 Novell, Inc. Maintaining a soft-token private key store in a distributed environment
US9100457B2 (en) 2001-03-28 2015-08-04 Qualcomm Incorporated Method and apparatus for transmission framing in a wireless communication system
US8121296B2 (en) 2001-03-28 2012-02-21 Qualcomm Incorporated Method and apparatus for security in a data processing system
US8077679B2 (en) 2001-03-28 2011-12-13 Qualcomm Incorporated Method and apparatus for providing protocol options in a wireless communication system
US7693508B2 (en) 2001-03-28 2010-04-06 Qualcomm Incorporated Method and apparatus for broadcast signaling in a wireless communication system
US7500104B2 (en) * 2001-06-15 2009-03-03 Microsoft Corporation Networked device branding for secure interaction in trust webs on open networks
US7082200B2 (en) * 2001-09-06 2006-07-25 Microsoft Corporation Establishing secure peer networking in trust webs on open networks using shared secret device key
US7352868B2 (en) 2001-10-09 2008-04-01 Philip Hawkes Method and apparatus for security in a data processing system
US7649829B2 (en) 2001-10-12 2010-01-19 Qualcomm Incorporated Method and system for reduction of decoding complexity in a communication system
US7599655B2 (en) 2003-01-02 2009-10-06 Qualcomm Incorporated Method and apparatus for broadcast services in a communication system
US8098818B2 (en) 2003-07-07 2012-01-17 Qualcomm Incorporated Secure registration for a multicast-broadcast-multimedia system (MBMS)
US8718279B2 (en) 2003-07-08 2014-05-06 Qualcomm Incorporated Apparatus and method for a secure broadcast system
US8724803B2 (en) 2003-09-02 2014-05-13 Qualcomm Incorporated Method and apparatus for providing authenticated challenges for broadcast-multicast communications in a communication system
US7643636B2 (en) * 2003-09-03 2010-01-05 Motorola, Inc. Managing multiple cryptographic periods in a single cryptographic group
EP1549010B1 (en) * 2003-12-23 2008-08-13 Motorola Inc. Rekeying in secure mobile multicast communications
US8583809B2 (en) 2006-09-07 2013-11-12 Blackberry Limited Destroying a secure session maintained by a server on behalf of a connection owner
US20100064350A1 (en) * 2008-09-08 2010-03-11 Qualcomm Incorporated Apparatus and Method for Secure Affinity Group Management
US8401195B2 (en) * 2008-09-22 2013-03-19 Motorola Solutions, Inc. Method of automatically populating a list of managed secure communications group members
US9660970B1 (en) 2015-12-03 2017-05-23 Amazon Technologies, Inc. Cryptographic key distribution
US10778429B1 (en) 2015-12-03 2020-09-15 Amazon Technologies, Inc. Storage of cryptographic information
US11184312B1 (en) 2019-09-26 2021-11-23 Joinesty, Inc. Email alias generation
US11924169B1 (en) 2021-01-29 2024-03-05 Joinesty, Inc. Configuring a system for selectively obfuscating data transmitted between servers and end-user devices

Family Cites Families (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
NL8501211A (nl) * 1985-04-29 1986-11-17 Philips Nv Systeem voor opslag en distributie van sleutels ten behoeve van cryptografisch beveiligde communicatie.
US5146498A (en) * 1991-01-10 1992-09-08 Motorola, Inc. Remote key manipulations for over-the-air re-keying
US5185795A (en) * 1991-02-27 1993-02-09 Motorola, Inc. Authentication of rekey messages in a communication system
US5146497A (en) * 1991-02-27 1992-09-08 Motorola, Inc. Group rekey in a communication system
US5208859A (en) * 1991-03-15 1993-05-04 Motorola, Inc. Method for rekeying secure communication units by group
US5222137A (en) * 1991-04-03 1993-06-22 Motorola, Inc. Dynamic encryption key selection for encrypted radio transmissions
US5329573A (en) * 1991-11-27 1994-07-12 At&T Bell Laboratories Arrangement for obtaining authentication key parameters in a cellular mobile telecommunications switching network
US5301232A (en) * 1992-11-05 1994-04-05 Motorola, Inc. Method and apparatus for over-the-air programming of communication devices
US5325432A (en) * 1993-02-04 1994-06-28 Motorola, Inc. Method for updating encryption key information in communication units

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1901446B (zh) * 2000-06-15 2010-05-12 索尼公司 使用了加密密钥组的信息处理系统及方法

Also Published As

Publication number Publication date
DE69532397D1 (de) 2004-02-12
EP0697154B1 (en) 2004-01-07
AU1600095A (en) 1995-09-11
AU673972B2 (en) 1996-11-28
EP0697154A1 (en) 1996-02-21
ES2214497T3 (es) 2004-09-16
ATE257631T1 (de) 2004-01-15
DK0697154T3 (da) 2004-04-26
US5381479A (en) 1995-01-10
DE69532397T2 (de) 2004-09-16
EP0697154A4 (en) 2002-06-05
RU2115249C1 (ru) 1998-07-10
WO1995023466A1 (en) 1995-08-31
PT697154E (pt) 2004-04-30

Similar Documents

Publication Publication Date Title
CN1123590A (zh) 通过空中再密钥控多个通信组的方法
CN1717697B (zh) 压缩安全电子邮件用于与移动通信设备交换的系统和方法
EP0788688B1 (en) Method and apparatus for secure identification of a mobile user in a communication network
CN1496063B (zh) 网络、IPsec设置服务器设备、IPsec处理设备和相关方法
US6393127B2 (en) Method for transferring an encryption key
CN1197023C (zh) 在数据通信系统中安全传送数据组的方法和系统
RU2121231C1 (ru) Способ обеспечения двухпунктовой связи в системах, предназначенных для скрытой связи
EP0740871B1 (en) A method for automatically assigning encryption information to a group of radios
KR950703236A (ko) 통신 시스템의 효율적인 실시간 사용자 확인 및 암호화 방법 및 그 장치(Mtehod and Apparatus for Efficient Real-Time Authentication and Encryption in a Communication System)
EP0882340A1 (en) Use of an encryption server for encrypting messages
KR20050004154A (ko) 디지털 무선 데이터 통신 네트워크에서 데이터 암호화 및상응하는 서버를 배치하기 위한 방법 및 시스템
CN100584056C (zh) 虚拟无线局域网络
EP0759241A1 (en) A method for providing blind access to an encryption key
US5208859A (en) Method for rekeying secure communication units by group
US20060233371A1 (en) Roaming encryption key rekeying apparatus and method
US5471532A (en) Method of rekeying roaming communication units
CN106060073A (zh) 信道密钥协商方法
US20040158706A1 (en) System, method, and device for facilitating multi-path cryptographic communication
EP1376924B1 (en) End-to-end encryption key management in a mobile communications system
EP1292166B1 (en) Mobile communication system
JPH06237249A (ja) ネットワーク管理のセキュリティシステム
CA2446364C (en) Secure group secret distribution
US7116786B2 (en) Interception of secure data in a mobile network
US20020069357A1 (en) Method and system for identification in a telecommunication system
EP1498004A1 (de) Verfahren und kommunikationsvorrichtung zum elektronischen signieren einer nachricht in einem mobilfunktelefon

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
AD01 Patent right deemed abandoned
C20 Patent right or utility model deemed to be abandoned or is abandoned