ES2566160T3 - Método para generar una clave de cifrado/descifrado - Google Patents
Método para generar una clave de cifrado/descifrado Download PDFInfo
- Publication number
- ES2566160T3 ES2566160T3 ES10794465.4T ES10794465T ES2566160T3 ES 2566160 T3 ES2566160 T3 ES 2566160T3 ES 10794465 T ES10794465 T ES 10794465T ES 2566160 T3 ES2566160 T3 ES 2566160T3
- Authority
- ES
- Spain
- Prior art keywords
- data set
- intermediate data
- node
- bit
- bits
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title abstract 3
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0838—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
- H04L9/0841—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/085—Secret sharing or secret splitting, e.g. threshold schemes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Storage Device Security (AREA)
- Computer And Data Communications (AREA)
- Facsimile Transmission Control (AREA)
Abstract
Método para generar una clave de cifrado/descifrado, que puede usarse para una comunicación segura entre un primer nodo (A) y un segundo nodo (B), en el que la clave generada sólo es válida para una sesión de comunicación entre el primer nodo (A) y el segundo nodo (B) y mientras esté activa la sesión de comunicación, comprendiendo dicho método las etapas de: enviar una petición desde el primer nodo (A) a un servidor (T) central para configurar una comunicación segura con el segundo nodo (B), enviar desde el servidor (2) central un primer archivo de generación de clave al primer nodo (A) y un segundo archivo de generación de clave al segundo nodo (B) en respuesta a la petición del primer nodo (A), comenzar a procesar el primer archivo de generación de clave en el primer nodo (A) y el segundo archivo de generación de clave en el segundo nodo (B), generar un primer conjunto de datos intermedio en el primer nodo (A) y un segundo conjunto de datos intermedio at el segundo nodo (B), enviar el primer conjunto de datos intermedio del primer nodo (A) al segundo nodo (B), comparar bits del primer conjunto de datos intermedio con bits correspondientes del segundo conjunto de datos intermedio, crear un tercer conjunto de datos intermedio nuevo basándose en la comparación bit a bit entre el primer y el segundo conjunto de datos intermedio estableciendo un primer valor si los bits comparados son iguales y un segundo valor si los bits comparados no son iguales, enviar el tercer conjunto de datos intermedio del segundo nodo (B) al primer nodo (A), comparar bits del tercer conjunto de datos intermedio con los bits correspondientes del primer conjunto de datos intermedio, generar una primera clave criptográfica basándose en la comparación bit a bit entre el tercer y el primer conjunto de datos intermedio manteniendo el valor del bit del primer conjunto de datos intermedio si el bit correspondiente del tercer conjunto de datos intermedio se establece al primer valor e ignorando el bit del primer conjunto de datos intermedio si el bit correspondiente del tercer conjunto de datos intermedio se establece al segundo valor, generar una segunda clave criptográfica basándose en la comparación bit a bit entre el primer y el segundo conjunto de datos intermedio manteniendo el valor del bit del segundo conjunto de datos intermedio si el bit correspondiente del primer conjunto de datos intermedio es igual e ignorando el bit del segundo conjunto de datos intermedio si los bits comparados no son iguales, siendo dicha primera y segunda clave criptográfica la misma.
Description
Claims (1)
-
imagen1 imagen2 imagen3
Applications Claiming Priority (5)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US22294909P | 2009-07-03 | 2009-07-03 | |
US222949P | 2009-07-03 | ||
SE0900918 | 2009-07-03 | ||
SE0900918A SE534384C2 (sv) | 2009-07-03 | 2009-07-03 | Förfarande för att alstra en krypterings-/dekrypteringsnyckel |
PCT/SE2010/050780 WO2011002412A1 (en) | 2009-07-03 | 2010-07-05 | Method for generating an encryption/decryption key |
Publications (1)
Publication Number | Publication Date |
---|---|
ES2566160T3 true ES2566160T3 (es) | 2016-04-11 |
Family
ID=43411294
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
ES10794465.4T Active ES2566160T3 (es) | 2009-07-03 | 2010-07-05 | Método para generar una clave de cifrado/descifrado |
Country Status (21)
Country | Link |
---|---|
US (1) | US8433066B2 (es) |
EP (1) | EP2361462B1 (es) |
JP (3) | JP2012532486A (es) |
KR (1) | KR101747888B1 (es) |
CN (1) | CN102227887B (es) |
AU (1) | AU2010266760B2 (es) |
BR (1) | BRPI1014192A2 (es) |
CA (1) | CA2747891C (es) |
DK (1) | DK2361462T3 (es) |
EA (1) | EA019411B1 (es) |
EG (1) | EG26868A (es) |
ES (1) | ES2566160T3 (es) |
HK (1) | HK1157972A1 (es) |
IL (1) | IL216897A (es) |
MX (1) | MX2012000104A (es) |
NZ (1) | NZ596935A (es) |
PL (1) | PL2361462T3 (es) |
SE (1) | SE534384C2 (es) |
SG (1) | SG176707A1 (es) |
WO (1) | WO2011002412A1 (es) |
ZA (1) | ZA201103163B (es) |
Families Citing this family (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103679495B (zh) * | 2012-09-18 | 2018-08-10 | 星贝瑞有限公司 | 一种印花发放方法及系统 |
US10277559B2 (en) * | 2014-05-21 | 2019-04-30 | Excalibur Ip, Llc | Methods and systems for data traffic control and encryption |
SE538279C2 (sv) * | 2014-09-23 | 2016-04-19 | Kelisec Ab | Förfarande och system för att fastställa förekomst av |
SE542460C2 (en) * | 2014-10-09 | 2020-05-12 | Kelisec Ab | Improved security through authenticaton tokens |
SE539271C2 (en) | 2014-10-09 | 2017-06-07 | Kelisec Ab | Mutual authentication |
SE538304C2 (sv) | 2014-10-09 | 2016-05-03 | Kelisec Ab | Improved installation of a terminal in a secure system |
SE540133C2 (en) * | 2014-10-09 | 2018-04-10 | Kelisec Ab | Improved system for establishing a secure communication channel |
SE539602C2 (en) | 2014-10-09 | 2017-10-17 | Kelisec Ab | Generating a symmetric encryption key |
CN106161402B (zh) * | 2015-04-22 | 2019-07-16 | 阿里巴巴集团控股有限公司 | 基于云环境的加密机密钥注入系统、方法及装置 |
US10397195B2 (en) | 2015-07-17 | 2019-08-27 | Robert Bosch Gmbh | Method and system for shared key and message authentication over an insecure shared communication medium |
DE102015219991A1 (de) * | 2015-10-15 | 2017-04-20 | Robert Bosch Gmbh | Verfahren und Vorrichtung zum Etablieren eines gemeinsamen Geheimnisses |
EP3373505A1 (en) * | 2017-03-06 | 2018-09-12 | Koninklijke Philips N.V. | Device and method for sharing a matrix for use in a cryptographic protocol |
US20200106787A1 (en) * | 2018-10-01 | 2020-04-02 | Global Data Sentinel, Inc. | Data management operating system (dmos) analysis server for detecting and remediating cybersecurity threats |
JP2023514736A (ja) * | 2020-02-21 | 2023-04-07 | エスディーエスイー ネットワークス インコーポレイテッド | 安全な通信のための方法及びシステム |
US20230315875A1 (en) * | 2020-07-28 | 2023-10-05 | Geneial Llc | Secure data exchange |
Family Cites Families (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5960086A (en) * | 1995-11-02 | 1999-09-28 | Tri-Strata Security, Inc. | Unified end-to-end security methods and systems for operating on insecure networks |
US20020159598A1 (en) * | 1997-10-31 | 2002-10-31 | Keygen Corporation | System and method of dynamic key generation for digital communications |
US7043633B1 (en) | 2000-08-28 | 2006-05-09 | Verizon Corporation Services Group Inc. | Method and apparatus for providing adaptive self-synchronized dynamic address translation |
IL144369A (en) | 2001-07-17 | 2009-06-15 | Eli Yanovsky | Secure communication system and method using shared random source for key changing |
CN101288260A (zh) | 2005-01-27 | 2008-10-15 | 美商内数位科技公司 | 使用未由他人分享联合随机衍生秘钥方法及系统 |
JP5424008B2 (ja) | 2006-12-19 | 2014-02-26 | 日本電気株式会社 | 共有情報の管理方法およびシステム |
GB2447674B (en) * | 2007-03-21 | 2011-08-03 | Lancaster University | Generation of a cryptographic key from device motion |
-
2009
- 2009-07-03 SE SE0900918A patent/SE534384C2/sv not_active IP Right Cessation
-
2010
- 2010-07-05 CN CN201080003360.7A patent/CN102227887B/zh not_active Expired - Fee Related
- 2010-07-05 SG SG2011090362A patent/SG176707A1/en unknown
- 2010-07-05 NZ NZ596935A patent/NZ596935A/xx not_active IP Right Cessation
- 2010-07-05 JP JP2012517459A patent/JP2012532486A/ja active Pending
- 2010-07-05 EG EG2012010007A patent/EG26868A/xx active
- 2010-07-05 WO PCT/SE2010/050780 patent/WO2011002412A1/en active Application Filing
- 2010-07-05 CA CA2747891A patent/CA2747891C/en not_active Expired - Fee Related
- 2010-07-05 AU AU2010266760A patent/AU2010266760B2/en not_active Ceased
- 2010-07-05 BR BRPI1014192A patent/BRPI1014192A2/pt not_active IP Right Cessation
- 2010-07-05 KR KR1020117015215A patent/KR101747888B1/ko active IP Right Grant
- 2010-07-05 US US13/129,682 patent/US8433066B2/en active Active
- 2010-07-05 ES ES10794465.4T patent/ES2566160T3/es active Active
- 2010-07-05 DK DK10794465.4T patent/DK2361462T3/en active
- 2010-07-05 MX MX2012000104A patent/MX2012000104A/es active IP Right Grant
- 2010-07-05 PL PL10794465T patent/PL2361462T3/pl unknown
- 2010-07-05 EP EP10794465.4A patent/EP2361462B1/en active Active
- 2010-07-05 EA EA201100887A patent/EA019411B1/ru not_active IP Right Cessation
-
2011
- 2011-04-29 ZA ZA2011/03163A patent/ZA201103163B/en unknown
- 2011-11-15 HK HK11112317.8A patent/HK1157972A1/xx not_active IP Right Cessation
- 2011-12-11 IL IL216897A patent/IL216897A/en active IP Right Grant
-
2015
- 2015-01-08 JP JP2015001958A patent/JP2015092745A/ja active Pending
-
2016
- 2016-09-29 JP JP2016191229A patent/JP2017022773A/ja active Pending
Also Published As
Publication number | Publication date |
---|---|
SG176707A1 (en) | 2012-01-30 |
SE0900918A1 (sv) | 2011-01-04 |
SE534384C2 (sv) | 2011-08-02 |
WO2011002412A1 (en) | 2011-01-06 |
KR20120040127A (ko) | 2012-04-26 |
EP2361462B1 (en) | 2016-01-27 |
CA2747891A1 (en) | 2011-01-06 |
CA2747891C (en) | 2014-09-02 |
EA201100887A1 (ru) | 2011-10-31 |
HK1157972A1 (en) | 2012-07-06 |
EP2361462A4 (en) | 2011-11-23 |
US8433066B2 (en) | 2013-04-30 |
CN102227887A (zh) | 2011-10-26 |
EG26868A (en) | 2014-11-10 |
EA019411B1 (ru) | 2014-03-31 |
IL216897A0 (en) | 2012-02-29 |
JP2015092745A (ja) | 2015-05-14 |
EP2361462A1 (en) | 2011-08-31 |
ZA201103163B (en) | 2012-08-29 |
KR101747888B1 (ko) | 2017-06-15 |
US20120087495A1 (en) | 2012-04-12 |
CN102227887B (zh) | 2014-07-09 |
MX2012000104A (es) | 2012-06-25 |
NZ596935A (en) | 2013-02-22 |
JP2012532486A (ja) | 2012-12-13 |
AU2010266760A1 (en) | 2011-01-06 |
IL216897A (en) | 2015-07-30 |
DK2361462T3 (en) | 2016-02-15 |
JP2017022773A (ja) | 2017-01-26 |
AU2010266760B2 (en) | 2014-04-10 |
BRPI1014192A2 (pt) | 2016-10-25 |
PL2361462T3 (pl) | 2016-06-30 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
ES2566160T3 (es) | Método para generar una clave de cifrado/descifrado | |
US20200169398A1 (en) | System, method, and apparatus for quantum key output, storage, and consistency verification | |
US10425234B2 (en) | Systems and methods for perfect forward secrecy (PFS) traffic monitoring via a hardware security module | |
ES2509345T3 (es) | Cálculo de protocolo de descifrado de umbral de seguridad | |
RU2018125626A (ru) | Системы и способы защищенной многосторонней связи с использованием посредника | |
JP2019502211A5 (es) | ||
AU2017358604A1 (en) | Systems and methods for secure communication using Random Cipher Pad cryptography | |
US20150172043A1 (en) | Method for conducting data encryption and decryption using symmetric cryptography algorithm and table look-up device | |
GB2544672A (en) | PUF and address dependent data encryption | |
EP2544400A3 (en) | PUF based Cryptographic communication system and cryptographic communication method | |
JP2013243667A5 (es) | ||
CA2553024A1 (en) | System and method for associating message addresses with certificates | |
JP2017538353A5 (es) | ||
WO2019127265A1 (zh) | 基于区块链智能合约的数据写入方法、装置及存储介质 | |
CN110138795B (zh) | 一种通信过程中的多步混合加解密方法 | |
JP2012010052A5 (es) | ||
JP2015500585A5 (es) | ||
RU2014126582A (ru) | Упрощенное управление секретными ключами группы участниками группы | |
JP2015045674A (ja) | 暗号化システム、暗号化方法及びコンピュータプログラム | |
JP2014529261A5 (es) | ||
JP6468567B2 (ja) | 鍵交換方法、鍵交換システム | |
JP2014085674A5 (es) | ||
JP2014530554A (ja) | グループメンバによるグループ秘密の管理 | |
JP2009303188A5 (es) | ||
JP2016525836A5 (es) |