GB2270446B - Improvements in cryptography - Google Patents

Improvements in cryptography

Info

Publication number
GB2270446B
GB2270446B GB9218816A GB9218816A GB2270446B GB 2270446 B GB2270446 B GB 2270446B GB 9218816 A GB9218816 A GB 9218816A GB 9218816 A GB9218816 A GB 9218816A GB 2270446 B GB2270446 B GB 2270446B
Authority
GB
United Kingdom
Prior art keywords
cryptography
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
GB9218816A
Other versions
GB9218816D0 (en
GB2270446A (en
Inventor
Christopher J Holloway
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
IBM United Kingdom Ltd
Original Assignee
IBM United Kingdom Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by IBM United Kingdom Ltd filed Critical IBM United Kingdom Ltd
Priority to GB9218816A priority Critical patent/GB2270446B/en
Publication of GB9218816D0 publication Critical patent/GB9218816D0/en
Publication of GB2270446A publication Critical patent/GB2270446A/en
Application granted granted Critical
Publication of GB2270446B publication Critical patent/GB2270446B/en
Anticipated expiration legal-status Critical
Expired - Fee Related legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0838Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
    • H04L9/0841Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols
    • H04L9/0844Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols with user authentication or key authentication, e.g. ElGamal, MTI, MQV-Menezes-Qu-Vanstone protocol or Diffie-Hellman protocols using implicitly-certified keys
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3234Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving additional secure or trusted devices, e.g. TPM, smartcard, USB or software token
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/26Testing cryptographic entity, e.g. testing integrity of encryption key or encryption algorithm
GB9218816A 1992-09-04 1992-09-04 Improvements in cryptography Expired - Fee Related GB2270446B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
GB9218816A GB2270446B (en) 1992-09-04 1992-09-04 Improvements in cryptography

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
GB9218816A GB2270446B (en) 1992-09-04 1992-09-04 Improvements in cryptography

Publications (3)

Publication Number Publication Date
GB9218816D0 GB9218816D0 (en) 1992-10-21
GB2270446A GB2270446A (en) 1994-03-09
GB2270446B true GB2270446B (en) 1996-01-24

Family

ID=10721449

Family Applications (1)

Application Number Title Priority Date Filing Date
GB9218816A Expired - Fee Related GB2270446B (en) 1992-09-04 1992-09-04 Improvements in cryptography

Country Status (1)

Country Link
GB (1) GB2270446B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6128391A (en) * 1997-09-22 2000-10-03 Visa International Service Association Method and apparatus for asymetric key management in a cryptographic system

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB9624559D0 (en) * 1996-11-26 1997-01-15 Polymeters Response Internatio Improvement of security of cryptographic system
US6826689B1 (en) * 1999-10-01 2004-11-30 Geneticware Co., Ltd. Method and system for emulating a secret code between two hardware modules
DE10250810A1 (en) * 2002-09-11 2004-03-25 Giesecke & Devrient Gmbh Cryptographic computation method for running protected computation in smart cards produces a code with two or more code parameters
CN1682484B (en) 2002-09-11 2012-03-21 德国捷德有限公司 Protected cryptographic calculation
DE10258323A1 (en) * 2002-12-13 2004-06-24 Giesecke & Devrient Gmbh Increasing security against determination of encryption key, by evaluating input data based on check of predetermined criteria and calculating cipher text accordingly
GB2408181B (en) * 2003-11-13 2005-10-19 Toshiba Res Europ Ltd Wireless network

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0254812A2 (en) * 1986-06-27 1988-02-03 International Business Machines Corporation Cryptovariable initialisation in a public key network
EP0277247A1 (en) * 1986-07-31 1988-08-10 Kabushiki Kaisya Advance System for generating a shared cryptographic key and a communication system using the shared cryptographic key
EP0393806A2 (en) * 1989-04-17 1990-10-24 Trw Inc. Cryptographic method and apparatus for public key exchange with authentication

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0254812A2 (en) * 1986-06-27 1988-02-03 International Business Machines Corporation Cryptovariable initialisation in a public key network
EP0277247A1 (en) * 1986-07-31 1988-08-10 Kabushiki Kaisya Advance System for generating a shared cryptographic key and a communication system using the shared cryptographic key
EP0393806A2 (en) * 1989-04-17 1990-10-24 Trw Inc. Cryptographic method and apparatus for public key exchange with authentication

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6128391A (en) * 1997-09-22 2000-10-03 Visa International Service Association Method and apparatus for asymetric key management in a cryptographic system

Also Published As

Publication number Publication date
GB9218816D0 (en) 1992-10-21
GB2270446A (en) 1994-03-09

Similar Documents

Publication Publication Date Title
GB9226511D0 (en) Cryptography system
GB2279201B (en) Improvements in earphones
GB2270446B (en) Improvements in cryptography
GB9225120D0 (en) Improvements in packaging
GB2260216B (en) Improvements in cables
GB9325314D0 (en) Improvements in alternators
GB9224477D0 (en) Improvements in bodyforms
GB9308522D0 (en) Improvements in carciac implantology
GB9209352D0 (en) Improvements in cooking devices
GB9211036D0 (en) Improvements in locking devices
GB9409941D0 (en) Improvements in connecting means
GB9219126D0 (en) Improvements in orreries
GB9504832D0 (en) Improvements in lockig means
GB9111044D0 (en) Improvements in cables
GB2268712B (en) Improvements in life-jackets
GB2267654B (en) Improvements in aerating devices
GB9010657D0 (en) Improvements in reflecters
GB2255871B (en) Improvements in telecines
GB9217019D0 (en) Improvements in shopping-trolleys
GB2262646B (en) Improvements in cables
GB9203488D0 (en) Improvements in structural members
GB9101326D0 (en) Improvements in hoisery
HU913041D0 (en) Pushdoor in curves
IL105906A0 (en) Improvements in rucksacks
GB9113464D0 (en) Improvements in card-laminating processes

Legal Events

Date Code Title Description
PCNP Patent ceased through non-payment of renewal fee

Effective date: 19990904