GB2381700A - Verifying the authenticity and integrity of information transmitted over the air to a receiving station at the receiver using hash functions - Google Patents

Verifying the authenticity and integrity of information transmitted over the air to a receiving station at the receiver using hash functions Download PDF

Info

Publication number
GB2381700A
GB2381700A GB0126299A GB0126299A GB2381700A GB 2381700 A GB2381700 A GB 2381700A GB 0126299 A GB0126299 A GB 0126299A GB 0126299 A GB0126299 A GB 0126299A GB 2381700 A GB2381700 A GB 2381700A
Authority
GB
United Kingdom
Prior art keywords
hash
unit
presented
user
public key
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
GB0126299A
Other versions
GB0126299D0 (en
GB2381700B (en
Inventor
Timothy James Wright
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Vodafone Group PLC
Original Assignee
Vodafone Group PLC
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Vodafone Group PLC filed Critical Vodafone Group PLC
Priority to GB0126299A priority Critical patent/GB2381700B/en
Publication of GB0126299D0 publication Critical patent/GB0126299D0/en
Publication of GB2381700A publication Critical patent/GB2381700A/en
Application granted granted Critical
Publication of GB2381700B publication Critical patent/GB2381700B/en
Anticipated expiration legal-status Critical
Expired - Fee Related legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/606Protecting data by securing the transmission between two devices or processes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/10Integrity
    • H04W12/106Packet or message integrity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/80Wireless
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W92/00Interfaces specially adapted for wireless communication networks
    • H04W92/04Interfaces between hierarchically different network devices
    • H04W92/10Interfaces between hierarchically different network devices between terminal device and access point, i.e. wireless air interface

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Computing Systems (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

An arrangement and method are disclosed for authenticating and establishing the integrity of information to be transmitted wirelessly between two units A,B particularly useful where one of the units eg. B is of simple type with small data processing capabilities (e.g. an earpiece for receiving transmissions from a mobile telephone). One unit A transmits its public key wirelessly where it is received TV by the other unit B. In addition and according to a known predetermined algorithm, the first unit A subjects the public key to a hash function II to produce a hash III which is then presented to a user in any suitable form IV, such as on a visual screen. The other unit B subjects the received public key VI to the same hash function VIII to produce an output hash IX which is then displayed non-visually to the user X. Preferably, the non-visual presentation X is an audible presentation. The user can then compare the visual presentation TV by the first unit A with the audible presentation X by the second unit B and thereby check the authenticity and integrity of the received public key. The need for a visual display screen on the other unit B is therefore avoided.

Description

<Desc/Clms Page number 1>
TELECOMMUNICATION SECURITY ARRANGEMENTS AND METHODS The invention relates to telecommunication security arrangements and methods. In embodiments of the invention to be described in more detail below, by way of example only, the authenticity and integrity of information transmitted over the air to a receiving station from a transmitting station can be verified at the receiving station.
It is known to use a public/private key system for authenticating information transmitted by a transmitting station. Thus, for example, the transmitting station may encrypt information using its private key (part of a public/private key pair) and then transmit the encrypted information. If (but only if) the receiving station knows the transmitting station's public key, it can decrypt the message. This will serve to show that the message can only have been encrypted by that transmitting station, and thus serve to authenticate the message. In order for such a system to be satisfactory, though, it is of course necessary for the receiving station to be sure that the public key which it has is indeed the public key of the particular transmitting station. It is known in such an arrangement for the public key to be transmitted in association with a certificate from a trusted Certification Authority. In such a case, the receiving station must have relatively complex certificate verification software and a root certificate corresponding to the private key which has been used to issue the transmitting station's certificate. Circumstances may arise where this is impractical. Increasingly, electronic units which need to be interconnected to produce a functioning system are being interconnected wirelessly. For
<Desc/Clms Page number 2>
example, units may be interconnected wirelessly using the BLUETOOTH (TM) protocol.
In a case where one or both of two units to be wirelessly interconnected is a relatively simple device, it may be impractical to be able to contain and/or use the complex certificate verification software mentioned above; to do so may require a relatively large amount of memory space. Furthermore, transmission of the certificate, which will be longer than the public key itself, uses up substantial bandwidth.
According to the invention, there is provided an arrangement for enabling a user-check of the authenticity and integrity of data transmitted wirelessly from a transmitting station to a receiving station, comprising means in the transmitting station for transmitting the data to the receiving station, means in the transmitting station for producing a hash ("originating hash") of the data according to a predetermined algorithm, presentation means in the transmitting station for presenting that hash to the user, means in the receiving station for receiving the transmitted data, means in the receiving station for producing a hash ("secondary hash") of the received data according to the predetermined algorithm, and presentation means in the receiving station for presenting the secondary hash to the user whereby to enable the user to compare the hashes respectively presented by the presentation means and thereby to check the authenticity and integrity of the received data, at least one of the presentation means presenting the respective hash nonvisually.
According to the invention, there is further provided a method for enabling a user-check
<Desc/Clms Page number 3>
of the authenticity and integrity of data transmitted wirelessly from a transmitting station to a receiving station, comprising the steps of transmitting the data from the transmitting station to the receiving station, producing a hash ("originating hash") of the transmitted data according to a predetermined algorithm, presenting that hash to the user, receiving the transmitted data at the receiving station, producing a hash ("secondary hash") of the received data according to the predetermined algorithm, and presenting the secondary hash to the user whereby to enable the user to compare the hashes respectively presented by the presentation means and thereby to check the authenticity and integrity of the received data at least one of the hashes being presented non-visually.
Telecommunications security arrangements and methods according to the invention will now be described, by way of example only, with reference to the accompanying diagrammatic drawings in which: Figure 1 is a block diagram of two units between which a secure wireless interconnection is to be set up; and Figure 2 is a block diagram for explaining the operation of the arrangements and methods.
Figure 1 shows two units A and B between which a secure wireless interconnection is to be set up. In a particular example, units A and B are to communicate with each other wirelessly using a BLUETOOTH (TM) protocol. Units A and B can be of any particular
<Desc/Clms Page number 4>
type. The arrangements and methods to be described in more detail are particularly suitable, though, where one of the units (unit B for example) is relatively simple compared with the other unit (unit A).
It is envisaged that the security of transmission between unit A and unit B will be ensured by authentication using a public/private key arrangement. Thus, unit A will use its own private key (not in principle known outside unit A) to encrypt messages intended for unit B. Unit B will decrypt the received messages using unit's A's public key. If the received message can be decrypted, then this establishes that the message did indeed originate from unit A. Equally, Unit B can encrypt messages using A's public key. As these can only be decrypted using A's private key, messages encrypted using A's public key can only be decrypted by A.
In order for either of these processes to operate, it is clearly necessary that unit B is in possession of unit A's public key and is satisfied as to the authenticity and integrity of that key. As shown in Fig. 1, unit A's public key is transmitted wirelessly to unit B by a transmitter T where it is received by a receiver R and must then be authenticated by an authentication unit AU. Authentication of unit A's public key, when transmitted to unit B, could be achieved by means of a Certificate issued by a trusted Certification Authority and transmitted with the public key to unit B. However, unit A would have to obtain such a certificate from the Certificate Authority which is a relatively complex and expensive process. The certificate is be longer than the public key itself and would use up
<Desc/Clms Page number 5>
substantial memory space in unit A, substantial bandwidth during its transmission to unit B, and substantial memory space in unit B. Unit B would also need complex certificate verification software and also a root certificate corresponding to the private key used to issue the unit A's certificate. In the case where unit B is a relatively simple appliance, the implementation of such complexity may be impossible. For example, unit A could be a mobile terminal in a cellular telecommunication system such as a mobile telephone handset, and unit B could be a simple earpiece to be worn by a user and for receiving voice calls to the handset, in which case it would be impractical for the ear piece to contain all the necessary software and memory for processing a verifying certificate transmitted with unit A's public key. As shown in Figure 1, the public key is received in unit B by a receiver R and then subjected to authentication which will now be described with reference to Figure 2.
Figure 2 shows, diagrammatically, the operations which take place within the units A and B to overcome the problems discussed above. More particularly, Figure 2 shows how unit A transmits its public key to unit B and how unit B can confirm the authenticity and integrity of the public key.
As shown at I in Figure 2, unit A is in possession of its public key. This public key is now subjected to a hash function (II) according to a simple algorithm which is agreed between unit A and unit B, so as to produce a hash of the public key as shown at III. The hash is then presented by unit A, as shown at IV, in a suitable way, as will be described
<Desc/Clms Page number 6>
in more detail below. As an example, though, the hash can be simply displayed on a screen such as in suitable alphanumeric form.
In addition, unit A transmits its public key to unit B as shown at V.
As shown at VI, the unit B receives the transmitted public key which may be passed to memory as shown at VII.
In addition, though, the unit B subjects the received public key to the hash function, as shown at VIII, in accordance with the agreed algorithm, so as to produce a corresponding hash (IX). The resultant hash is then output at X.
It is now necessary for a comparison to be made by the user between the hash which is output by unit A at IV and the hash which is output by unit B at X. If both hash outputs agree, then unit B will accept the public key stored in memory at VII. If the two hash outputs do not agree, the public key will be rejected.
As indicated above, the unit A could output the hash at IV by displaying it on a visual screen. If unit B also has a screen, then it can output the hash at X by displaying it on its screen. The user can then make a simple visual comparison to check agreement between the two displayed hashes, thus confirming the authenticity and integrity of the received public key. However, if unit B is a simple unit, such as the earpiece suggested above, it
<Desc/Clms Page number 7>
will not be possible or practicable for it to incorporate a visual screen. In accordance with a feature of the invention, therefore, the hash output of unit B, at X, is presented in some other suitable way not involving the use of a visual screen. For example, the hash output at X can be an audible output in which the alphanumeric characters of the hash are presented audibly to the user of unit B who can then compare the hash so presented and received by unit B with the visual hash presented by unit A at IV and shown visually on unit A's screen.
In this way, therefore, the problems presented by the simple nature of unit B are overcome.
Various modifications may be made.
For example, unit A may itself present the hash audibly instead of (or in addition to) its visual presentation, the audible presentations of the hashes by the units A and B being presented sequentially, and in association with suitable identification, to enable their comparison by the user.
The audible presentation need not be a direct alphanumeric audible presentation of the actual hash. Instead, for example, the hash audibly presented at IV by unit A could be presented after conversion, by means of an agreed converting algorithm, into an audible pitch (or sequence of pitches). Using the same conversion algorithm, unit B would
<Desc/Clms Page number 8>
convert its received hash into a pitch or sequence of pitches presented audibly. Again, therefore, the user could check the authenticity and integrity of the received public key by comparing the pitches audibly emitted by units A and B.
In a further modification, each unit could convert the respective hash into a word, using the same conversion algorithm. Unit A could then display this word at IV, or present it audibly. Unit B would audibly present the word which it converts from the received hash at VII. The user can then compare the two words to check the authenticity and integrity of the received public key.
Although the foregoing description has concerned the authentication of a public key, the features described could be used to authenticate data in other forms.

Claims (16)

1. An arrangement for enabling a user-check of the authenticity and integrity of data transmitted wirelessly from a transmitting station to a receiving station, comprising means in the transmitting station for transmitting the data to the receiving station, means in the transmitting station for producing a hash ("originating hash") of the data according to a predetermined algorithm, presentation means in the transmitting station for presenting that hash to the user, means in the receiving station for receiving the transmitted data, means in the receiving station for producing a hash ("secondary hash") of the received data according to the predetermined algorithm, and presentation means in the receiving station for presenting the secondary hash to the user whereby to enable the user to compare the hashes respectively presented by the presentation means and thereby to check the authenticity and integrity of the received data, at least one of the presentation means presenting the respective hash non-visually.
2. An arrangement according to claim 1, in which the other presentation means presents the respective hash visually.
3. An arrangement according to claim 1, in which the other presentation means presents the respective hash audibly.
4. An arrangement according to any preceding claim, in which the or each
<Desc/Clms Page number 10>
presentation means which presents the respective hash non-visually presents it audibly in alphanumeric form.
5. An arrangement according to claim 4, in which the or each presentation means which presents the hash audibly in alphanumeric form presents it after conversion into, and as, a pronounceable word.
6. An arrangement according to any one of claims 1 to 3, in which the or each presentation means which presents the hash audibly presents it in the form of an audible pitch or sequence of different audible pitches.
7. An arrangement according to any preceding claim, in which the data is a public key of a private/public key pair.
8. A method for enabling a user-check of the authenticity and integrity of data transmitted wirelessly from a transmitting station to a receiving station, comprising the steps of transmitting the data from the transmitting station to the receiving station, producing a hash ("originating hash") of the transmitted data according to a predetermined algorithm, presenting that hash to the user, receiving the transmitted data at the receiving station, producing a hash ("secondary hash") of the received data according to the predetermined algorithm, and presenting the secondary hash to the user whereby to enable the user to compare the hashes respectively presented by the
<Desc/Clms Page number 11>
presentation means and thereby to check the authenticity and integrity of the received data at least one of the hashes being presented non-visually.
9. A method according to claim 8, in which the other hash is presented visually.
10. A method according to claim 8, in which the other hash is presented audibly.
11. A method according to any one of claims 8 to 10, in which the or each hash which is presented non-visually is presented in alphanumeric form.
12. A method according to claim 11, in which the or each hash which is presented audibly in alphanumeric form is presented after conversion into, and as, a pronounceable word.
13. A method according to any one of claims 8 to 10, in which the or each hash which is presented audibly is presented in the form of an audible pitch or sequence of different audible pitches.
14. A method according to any one of claims 8 to 13, in which the data is a public key of a private/public key pair.
15. An arrangement for checking the authenticity and integrity of data transmitted
<Desc/Clms Page number 12>
- from a transmitting station to a receiving station, substantially as described with reference to the accompanying drawings.
16. A method for checking the authenticity and integrity of data transmitted from a transmitting station to a receiving station, substantially as described with reference to the accompanying drawings.
GB0126299A 2001-11-01 2001-11-01 Telecommunication security arrangements and methods Expired - Fee Related GB2381700B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
GB0126299A GB2381700B (en) 2001-11-01 2001-11-01 Telecommunication security arrangements and methods

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
GB0126299A GB2381700B (en) 2001-11-01 2001-11-01 Telecommunication security arrangements and methods

Publications (3)

Publication Number Publication Date
GB0126299D0 GB0126299D0 (en) 2002-01-02
GB2381700A true GB2381700A (en) 2003-05-07
GB2381700B GB2381700B (en) 2005-08-24

Family

ID=9924995

Family Applications (1)

Application Number Title Priority Date Filing Date
GB0126299A Expired - Fee Related GB2381700B (en) 2001-11-01 2001-11-01 Telecommunication security arrangements and methods

Country Status (1)

Country Link
GB (1) GB2381700B (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1650894A1 (en) * 2004-10-22 2006-04-26 Nec Corporation Authentication method and method, device, system, and program for delivering secret information between proximity terminals
EP2813964A1 (en) * 2013-06-13 2014-12-17 Gemalto SA Method and system for converting cryptographic data into a familiar form
EP2732577A4 (en) * 2011-07-14 2015-06-24 Commw Scient Ind Res Org Cryptographic processes

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2342817A (en) * 1998-10-16 2000-04-19 Nokia Mobile Phones Ltd Secure session setup based on wireless application protocol
WO2000035141A1 (en) * 1998-12-08 2000-06-15 Telstra R & D Management Pty. Ltd. A certification method
WO2000042492A2 (en) * 1999-01-13 2000-07-20 Microsoft Corporation Security enforcement for electronic data
WO2000051284A1 (en) * 1999-02-24 2000-08-31 Interface Logic Systems, Inc. System for protecting weight verification device private key
EP1041767A2 (en) * 1999-03-30 2000-10-04 Fujitsu Limited Authentication of electronic data
US20020025045A1 (en) * 2000-07-26 2002-02-28 Raike William Michael Encryption processing for streaming media

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2342817A (en) * 1998-10-16 2000-04-19 Nokia Mobile Phones Ltd Secure session setup based on wireless application protocol
WO2000035141A1 (en) * 1998-12-08 2000-06-15 Telstra R & D Management Pty. Ltd. A certification method
WO2000042492A2 (en) * 1999-01-13 2000-07-20 Microsoft Corporation Security enforcement for electronic data
WO2000051284A1 (en) * 1999-02-24 2000-08-31 Interface Logic Systems, Inc. System for protecting weight verification device private key
EP1041767A2 (en) * 1999-03-30 2000-10-04 Fujitsu Limited Authentication of electronic data
US20020025045A1 (en) * 2000-07-26 2002-02-28 Raike William Michael Encryption processing for streaming media

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1650894A1 (en) * 2004-10-22 2006-04-26 Nec Corporation Authentication method and method, device, system, and program for delivering secret information between proximity terminals
EP2732577A4 (en) * 2011-07-14 2015-06-24 Commw Scient Ind Res Org Cryptographic processes
EP2813964A1 (en) * 2013-06-13 2014-12-17 Gemalto SA Method and system for converting cryptographic data into a familiar form

Also Published As

Publication number Publication date
GB0126299D0 (en) 2002-01-02
GB2381700B (en) 2005-08-24

Similar Documents

Publication Publication Date Title
JP5138858B2 (en) Method, communication system and communication device for ensuring security of data transmission
CN101015173B (en) Secure pairing for wired or wireless communications devices
CN106656510B (en) A kind of encryption key acquisition methods and system
EP1932274B1 (en) System, method and computer program product for authenticating a data agreement between network entities
US8429405B2 (en) System and method for human assisted secure information exchange
CN100409612C (en) Method for checking integrity of data, system and mobile terminal
US5216715A (en) Key distribution in public communication networks taking account of security gradations
US20100227549A1 (en) Apparatus and Method for Pairing Bluetooth Devices by Acoustic Pin Transfer
CN102868531B (en) Networked transaction certification system and method
KR930009291A (en) Method and apparatus for establishing a secure communication link
CN112055019B (en) Method for establishing communication channel and user terminal
CN100441023C (en) Method to authenticate mobile station, communications system and mobile station
CN106792700A (en) The method for building up and system of a kind of secure communication environment of wearable device
US20070136587A1 (en) Method for device authentication
CN1650595B (en) System and method for providing secure message signature status and trust status indication
CN114650173A (en) Encryption communication method and system
JPH05347617A (en) Communication method for radio communication system
CN114826659A (en) Encryption communication method and system
US8316236B2 (en) Determining security states using binary output sequences
US20040255121A1 (en) Method and communication terminal device for secure establishment of a communication connection
CN108768958B (en) Verification method for data integrity and source based on no leakage of verified information by third party
GB2381700A (en) Verifying the authenticity and integrity of information transmitted over the air to a receiving station at the receiver using hash functions
EP1343342B1 (en) Security protection for data communication
KR100419986B1 (en) A secure piconet organization and maintenance method with using Elliptic Curve Cryptography
CA2474144A1 (en) Method for securing data traffic in a mobile network environment

Legal Events

Date Code Title Description
PCNP Patent ceased through non-payment of renewal fee

Effective date: 20161101