EP1738555A1 - Schnelle und sichere konnektivität für einen mobilen knoten - Google Patents

Schnelle und sichere konnektivität für einen mobilen knoten

Info

Publication number
EP1738555A1
EP1738555A1 EP05732863A EP05732863A EP1738555A1 EP 1738555 A1 EP1738555 A1 EP 1738555A1 EP 05732863 A EP05732863 A EP 05732863A EP 05732863 A EP05732863 A EP 05732863A EP 1738555 A1 EP1738555 A1 EP 1738555A1
Authority
EP
European Patent Office
Prior art keywords
node
certificate
encrypted
message
pki
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
EP05732863A
Other languages
English (en)
French (fr)
Inventor
Seyed Tabatabaian
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Panasonic Holdings Corp
Original Assignee
Matsushita Electric Industrial Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Matsushita Electric Industrial Co Ltd filed Critical Matsushita Electric Industrial Co Ltd
Publication of EP1738555A1 publication Critical patent/EP1738555A1/de
Withdrawn legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/12Transmitting and receiving encryption devices synchronised or initially set up in a particular manner
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/045Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply hybrid encryption, i.e. combination of symmetric and asymmetric encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0464Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload using hop-by-hop encryption, i.e. wherein an intermediate entity decrypts the information and re-encrypts it before forwarding it
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0823Network architectures or network communication protocols for network security for authentication of entities using certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3263Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3297Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving time stamps, e.g. generation of time stamps
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2463/00Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
    • H04L2463/102Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00 applying security measure for e-commerce

Definitions

  • This invention relates to mobile wireless terminals communicating one with another via radio access networks through a secure communication channel in which only one node is in charge of obtaining and exchanging all parameters for a secure communication.
  • IPsec IP Security
  • ESP Encapsulating Security Payload
  • AH Authentication Header
  • ESP provides proof of data origin on received packets, data integrity, and anti-replay protection.
  • ESP provides all that AH provides in addition to optional data confidentiality.
  • IPsec The security services that IPsec provides require shared keys to perform authentication and or confidentiality. A mechanism to manually add keys for these services is mandatory to implement. This ensures interoperability of the base IPsec protocols.
  • a standard method of dynamically authenticating IPsec peers, negotiating security services, and generating shared keys is also defined. This key management protocol is called IKE - the Internet Key Exchange.
  • IPsec The shared keys used with IPsec are for either a symmetric cipher when confidentiality is needed or for data integrity, or for both. IPsec must be fast and existing public key technologies are too slow to operate on a packet-by- packet basis.
  • public key technology is limited to initial authentication during key exchange.
  • IPsec protocol that in turn may deploy other protocols e.g. IKE or Public Key Infrastructure (PKI).
  • PKI public key infrastructure
  • each communications node has two keys, namely a private key known only to the node itself and a public key known to the node but also available from the PKI.
  • a node does not already know the node with which it plans to communicate, it can obtain the public key of that node from the PKI.
  • node A can encrypt messages with its private key for decryption by node B using node A's public key, or node A can encrypt message for node B with node B's public key to be decrypted with node B's private key.
  • Figure 1 shows a secure channel being established between two parties, node A and node B, where each of them has to contact a third party - PKI.
  • the party who wishes to set up such a channel here node A, sends a request message to PKI, msg(l).
  • PKI responds by sending the session key, additional information which includes type of encryption algorithm, and node B's certificate back to node A, msg(2).
  • node A sends a message to node B requesting the establishment of a secure communication channel, msg(3).
  • node B Upon receipt of such request node B sends a message to PKI requesting node A's certificate, msg(4).
  • PKI responds by sending node A's certificate, session key and additional information back to node B, msg(5).
  • Node B uses the certificate to verify node A's request, (msg3), and the session key to share the secure channel with node A. Finally, node B sends an acknowledgement back to node A in order to inform and to allow node A to start the secure communication, msg(6).
  • a dormant node may be a mobile terminal not currently connected to the network for which a secure communication needs to be available at the next connection to the network. It means that when the dormant node becomes active it needs to contact PKI to obtain required information in order to reveal the encrypted message.
  • Kerberos protocol is based on symmetric system.
  • security of IPsec based on Kerberos is vulnerable to logon attacks.
  • This invention allows a smaller number of signalling messages to be used in order to establish a secure communication channel between two parties compared to IPsec based on IKE.
  • the invention also allows only one node (party) to be responsible for the negotiation of all security parameters required to set up a secure communication channel hence when a dormant node becomes active it does not need to contact any party to decrypt the stored/received message.
  • the invention allows mobile equipments with limited processing power to benefit from high level of security when it is needed as a trusted third party (PKI) can generate stronger keys.
  • PKI trusted third party
  • the present invention provides a method of establishing a communication channel between two nodes in a communications network using an asymmetric key system in which each node has a unique certificate used to authenticate communications from that node, and the certificates are registered with a trusted third party (T), characterised in that: the initiating node (A) sends a request for communication with a receiving node (B) to the trusted third party (T), and T responds with a message for A to forward to B including the certificate of A encrypted such that only B can decrypt the part of the message containing the certificate of A.
  • T trusted third party
  • this method avoids the need for the receiving node to obtain A's certificate directly from the trusted third party, and hence the number of signals required is reduced. Having decrypted A's certificate which has been sent via A by T, B can then authenticate subsequent messages sent by A to which it A has attached its certificate.
  • the response from T would usually include a session key which is decrypted by A before being passed on to B. At this point A can begin sending packets to B without waiting for B to respond, which is particularly useful if B is dormant.
  • the response from T would include the certificate of B, encrypted such that only A could open it after B has decrypted the certificate of A. B would then return this part of the message to A after extracting the certificate of A.
  • Figure 1 schematically illustrates, a secure communication between two nodes when they both contact the PKI to obtain all required parameters for such a channel.
  • Figure 2 schematically illustrates, a secure communication between two nodes when only one node contacts the PKI to obtain all required parameters for such a channel.
  • Figure 3 illustrates steps 1 to 4 of the signal flow diagram for a single node, node A, to obtain all required parameters needed for a secure communication link.
  • Figure 4 presents a flowchart that the flow of messages between nodes and the PKI as well as the recipient node are given for setting up a secure communication link.
  • Figure 2 shows an establishment of a secure channel according to this invention whereby node A, the initiator node, sends a request message for communication with node B to PKI, msg(l).
  • the reply message from PKI contains a session key, information which includes the encryption algorithm and node A and B certificates, msg(2).
  • the two certificates are cryptographically compound which means these two certificates can be opened first by node B to extract A's certificate although node A receives it first.
  • node A receives the response message from PKI, first it extracts and stores the session key, KA B , and any other required information for a secure data communication.
  • node A forwards the shared key, information and the certificates that all are encrypted and signed using node B public key and node A private key respectively.
  • node B On receiving the encrypted message by node B, it first extracts the shared session key, KA B> and type of the encryption algorithm. Then pulls out the certificate of node A and verifies it by using its own private key and PKI's public key respectively.
  • Node B which has all the information for a secure communication sends its own certificate to node A. The certificate is encrypted and signed by public key of node A and private key of node B. It should be noted that node B's certificate that was sent by node A to node B could not be opened by node B. Node B uses it as proof of its authenticity and certifies itself to node A.
  • node A accepts the authenticity and certificate of node B by opening node B's message using node B public key, node A private key and PKI public key.
  • the message must have been sent by node B because it is decrypted using node B public key.
  • the message can only be decrypted by node A because node A's private key is required.
  • the certificate must have been issued by PKI as PKI's public key is used to open it.
  • Step 1 request message for secure communication with another node, node B, is initially being transferred from node A to PKI
  • Step 2 - the PKI sends the session key, info that includes type of encryption algorithm and encrypted compound certificates of A and B nodes to the node A requesting information for the set up of a secure channel
  • Step 3 - node A passes on all the information as well as encrypted compound certificates of A and B nodes to node B which in turn extracts the session key and type of encryption algorithm and verifies node A's certificate as node B is the first one that can decrypt this compound part of the message
  • Step 4 node B's acknowledge message (reply) is provided within the signed and encrypted node A's certificate message. This acknowledge message sent from node B is verified by node A as A is the only node that can decrypt node B's certificate This completes the distribution of key, type of encryption algorithm and certificates steps. The same steps are illustrated in the flowchart of figure 4.
  • This invention minimizes the number of messages used to complete the initial agreement of setting up a secure channel.
  • the invention also seeks to use only one node to set up a secure link as the verification of nodes is obtained by using encrypted compound certificates of the two nodes.
  • node A can begin sending packets to node B after step 3. After step 4, nodes A and B can commence symmetric communication using K AB thereby benefiting from the increased speed which this allows.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computing Systems (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Communication Control (AREA)
  • Small-Scale Networks (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
EP05732863A 2004-04-19 2005-04-12 Schnelle und sichere konnektivität für einen mobilen knoten Withdrawn EP1738555A1 (de)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
GB0408687A GB2414144B (en) 2004-04-19 2004-04-19 Fast and secure connectivity for a mobile node
PCT/GB2005/001394 WO2005101787A1 (en) 2004-04-19 2005-04-12 Fast and secure connectivity for a mobile node

Publications (1)

Publication Number Publication Date
EP1738555A1 true EP1738555A1 (de) 2007-01-03

Family

ID=32321075

Family Applications (1)

Application Number Title Priority Date Filing Date
EP05732863A Withdrawn EP1738555A1 (de) 2004-04-19 2005-04-12 Schnelle und sichere konnektivität für einen mobilen knoten

Country Status (8)

Country Link
EP (1) EP1738555A1 (de)
JP (1) JP2007533278A (de)
KR (1) KR20070006913A (de)
CN (1) CN1943207A (de)
BR (1) BRPI0509969A (de)
GB (1) GB2414144B (de)
RU (1) RU2006140776A (de)
WO (1) WO2005101787A1 (de)

Families Citing this family (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP5123209B2 (ja) * 2006-01-24 2013-01-23 ▲ホア▼▲ウェイ▼技術有限公司 モバイルネットワークに基づくエンドツーエンド通信での認証の方法、システム、および認証センタ
JP4983165B2 (ja) 2006-09-05 2012-07-25 ソニー株式会社 通信システムおよび通信方法、情報処理装置および方法、デバイス、プログラム、並びに記録媒体
US8116243B2 (en) 2006-10-05 2012-02-14 Electronics And Telecommunications Research Institute Wireless sensor network and adaptive method for monitoring the security thereof
KR100879982B1 (ko) 2006-12-21 2009-01-23 삼성전자주식회사 모바일 와이맥스 네트워크 시스템에서의 보안 시스템 및방법
US8341410B2 (en) * 2007-10-08 2012-12-25 Microsoft Corporation Efficient certified email protocol
JP6058514B2 (ja) * 2013-10-04 2017-01-11 株式会社日立製作所 暗号処理方法、暗号システム、およびサーバ
JP6977635B2 (ja) * 2018-03-15 2021-12-08 大日本印刷株式会社 車両鍵配信システムおよび汎用スキャンツール

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5999711A (en) * 1994-07-18 1999-12-07 Microsoft Corporation Method and system for providing certificates holding authentication and authorization information for users/machines
JP3542895B2 (ja) * 1997-08-22 2004-07-14 インターナショナル・ビジネス・マシーンズ・コーポレーション 時間制約暗号システム
US20020150253A1 (en) * 2001-04-12 2002-10-17 Brezak John E. Methods and arrangements for protecting information in forwarded authentication messages
GB2384403B (en) * 2002-01-17 2004-04-28 Toshiba Res Europ Ltd Data transmission links

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
See references of WO2005101787A1 *

Also Published As

Publication number Publication date
KR20070006913A (ko) 2007-01-11
GB0408687D0 (en) 2004-05-19
GB2414144B (en) 2006-07-26
GB2414144A (en) 2005-11-16
WO2005101787A1 (en) 2005-10-27
RU2006140776A (ru) 2008-05-27
JP2007533278A (ja) 2007-11-15
CN1943207A (zh) 2007-04-04
BRPI0509969A (pt) 2007-10-02

Similar Documents

Publication Publication Date Title
EP2561663B1 (de) Server und verfahren zur bereitstellung von sicheren dienstezugriff
US9094206B2 (en) Method and system for secure session establishment using identity-based encryption (VDTLS)
JP4002035B2 (ja) 機密を要する情報を最初は機密化されてない通信を用いて伝送するための方法
EP1540878B1 (de) Verknöpfte authentifikationsprotokolle
US8285990B2 (en) Method and system for authentication confirmation using extensible authentication protocol
EP2062189B1 (de) Verfahren und system zur sicheren verarbeitung von authentifizierungsschlüsseln in einem drahtlosen ad-hoc-netzwerk
EP1490995B1 (de) End-zu-End-Schutz von Medienstromverschlüsselungsschlüsseln für Sprache-über-IP-Systeme
RU2554532C2 (ru) Способ и устройство для безопасной передачи данных
EP1374533B1 (de) Ermöglichen legales abfangen von ip-verbindungen
US7222234B2 (en) Method for key agreement for a cryptographic secure point—to—multipoint connection
WO2000062507A1 (en) Key management between a cable telephony adapter and associated signaling controller
US20110246770A1 (en) Authentication method, authentication system, server terminal, client terminal and computer programs therefor
CN113364811B (zh) 基于ike协议的网络层安全防护系统及方法
CN114422205B (zh) 一种电力专用cpu芯片网络层数据隧道建立方法
WO2005101787A1 (en) Fast and secure connectivity for a mobile node
CN113747434B (zh) 一种基于IPSec的移动通信安全通信方法及装置
Manulis et al. Authenticated wireless roaming via tunnels: Making mobile guests feel at home
Sithirasenan et al. EAP-CRA for WiMAX, WLAN and 4G LTE Interoperability
He et al. An asymmetric authentication protocol for M-Commerce applications
Badra et al. Flexible and fast security solution for wireless LAN
CN117280651A (zh) 用于决策的设备和方法
Schwiderski-Grosche et al. Public key based network access
Argyroudis et al. Towards flexible authorization management
Paraskevaidis Services Architecture on top of the Peer-to-Peer Wireless Network Confederation
la Tour et al. SECURE AUTHENTICATION FOR MOBILE COMMUNICATION OVER THE INTERNET

Legal Events

Date Code Title Description
PUAI Public reference made under article 153(3) epc to a published international application that has entered the european phase

Free format text: ORIGINAL CODE: 0009012

17P Request for examination filed

Effective date: 20061024

AK Designated contracting states

Kind code of ref document: A1

Designated state(s): AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IS IT LI LT LU MC NL PL PT RO SE SI SK TR

17Q First examination report despatched

Effective date: 20070319

DAX Request for extension of the european patent (deleted)
STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: THE APPLICATION IS DEEMED TO BE WITHDRAWN

18D Application deemed to be withdrawn

Effective date: 20070731