JP7635073B2 - データを暗号化又は復号化するための暗号処理イベント - Google Patents

データを暗号化又は復号化するための暗号処理イベント Download PDF

Info

Publication number
JP7635073B2
JP7635073B2 JP2021088757A JP2021088757A JP7635073B2 JP 7635073 B2 JP7635073 B2 JP 7635073B2 JP 2021088757 A JP2021088757 A JP 2021088757A JP 2021088757 A JP2021088757 A JP 2021088757A JP 7635073 B2 JP7635073 B2 JP 7635073B2
Authority
JP
Japan
Prior art keywords
key
provisional
encryption
point
initialization
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
JP2021088757A
Other languages
English (en)
Japanese (ja)
Other versions
JP2021193793A (ja
JP2021193793A5 (https=
Inventor
ジロー,クリストフ
ドタ,エマニュエル
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Idemia France SAS
Original Assignee
Idemia France SAS
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Idemia France SAS filed Critical Idemia France SAS
Publication of JP2021193793A publication Critical patent/JP2021193793A/ja
Publication of JP2021193793A5 publication Critical patent/JP2021193793A5/ja
Application granted granted Critical
Publication of JP7635073B2 publication Critical patent/JP7635073B2/ja
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0838Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
    • H04L9/0841Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0866Generation of secret information including derivation or calculation of cryptographic keys or passwords involving user or device identifiers, e.g. serial number, physical or biometrical information, DNA, hand-signature or measurable physical characteristics
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0869Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0877Generation of secret information including derivation or calculation of cryptographic keys or passwords using additional device, e.g. trusted platform module [TPM], smartcard, USB or hardware security module [HSM]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/14Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • H04L9/3006Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters
    • H04L9/3013Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters involving the discrete logarithm problem, e.g. ElGamal or Diffie-Hellman systems
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • H04L9/3066Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • H04L9/3242Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving keyed hash functions, e.g. message authentication codes [MACs], CBC-MAC or HMAC
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • H04W12/043Key management, e.g. using generic bootstrapping architecture [GBA] using a trusted network node as an anchor
    • H04W12/0431Key distribution or pre-distribution; Key agreement
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/80Wireless

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Theoretical Computer Science (AREA)
  • Computing Systems (AREA)
  • Physics & Mathematics (AREA)
  • Mathematical Analysis (AREA)
  • Mathematical Optimization (AREA)
  • Mathematical Physics (AREA)
  • Pure & Applied Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Algebra (AREA)
  • Power Engineering (AREA)
  • Storage Device Security (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Telephonic Communication Services (AREA)
JP2021088757A 2020-05-27 2021-05-26 データを暗号化又は復号化するための暗号処理イベント Active JP7635073B2 (ja)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
FR2005595 2020-05-27
FR2005595A FR3111038B1 (fr) 2020-05-27 2020-05-27 Traitements cryptographiques pour chiffrer ou déchiffrer des données

Publications (3)

Publication Number Publication Date
JP2021193793A JP2021193793A (ja) 2021-12-23
JP2021193793A5 JP2021193793A5 (https=) 2024-03-18
JP7635073B2 true JP7635073B2 (ja) 2025-02-25

Family

ID=72885635

Family Applications (1)

Application Number Title Priority Date Filing Date
JP2021088757A Active JP7635073B2 (ja) 2020-05-27 2021-05-26 データを暗号化又は復号化するための暗号処理イベント

Country Status (5)

Country Link
US (1) US11552796B2 (https=)
EP (1) EP3917073A1 (https=)
JP (1) JP7635073B2 (https=)
KR (1) KR20210146829A (https=)
FR (1) FR3111038B1 (https=)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US12089035B2 (en) * 2021-08-23 2024-09-10 Qualcomm Incorporated Physical channel encryption using secret keys
US20250016552A1 (en) * 2021-10-04 2025-01-09 Telefonaktiebolaget Lm Ericsson (Publ) Conveying Data to a Communication Network
US20240195635A1 (en) * 2022-12-12 2024-06-13 Intel Corporation Roots of trust in intellectual property (ip) blocks in a system on a chip (soc)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2019020439A1 (en) 2017-07-25 2019-01-31 Telefonaktiebolaget Lm Ericsson (Publ) HIDDEN SUBSCRIPTION IDENTIFIER
JP2019509648A (ja) 2016-02-23 2019-04-04 エヌチェーン ホールディングス リミテッドNchain Holdings Limited ウォレット管理システムと併せたブロックチェーンベースのシステムのための暗号鍵のセキュアなマルチパーティ損失耐性のある記憶及び転送
JP2019201398A (ja) 2018-05-11 2019-11-21 株式会社bitFlyer Blockchain 公開鍵の信頼性を証明するための装置、方法及びそのためのプログラム

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
MY155814A (en) * 2009-07-10 2015-11-30 Certicom Corp System and method for performing serialization of devices
CN112119609B (zh) * 2018-05-14 2024-12-24 区块链控股有限公司 用于传达秘密的方法和系统

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2019509648A (ja) 2016-02-23 2019-04-04 エヌチェーン ホールディングス リミテッドNchain Holdings Limited ウォレット管理システムと併せたブロックチェーンベースのシステムのための暗号鍵のセキュアなマルチパーティ損失耐性のある記憶及び転送
WO2019020439A1 (en) 2017-07-25 2019-01-31 Telefonaktiebolaget Lm Ericsson (Publ) HIDDEN SUBSCRIPTION IDENTIFIER
JP2019201398A (ja) 2018-05-11 2019-11-21 株式会社bitFlyer Blockchain 公開鍵の信頼性を証明するための装置、方法及びそのためのプログラム

Also Published As

Publication number Publication date
FR3111038A1 (fr) 2021-12-03
US20210377025A1 (en) 2021-12-02
FR3111038B1 (fr) 2023-05-12
KR20210146829A (ko) 2021-12-06
US11552796B2 (en) 2023-01-10
EP3917073A1 (fr) 2021-12-01
JP2021193793A (ja) 2021-12-23

Similar Documents

Publication Publication Date Title
RU2722508C1 (ru) Скрытый идентификатор подписки абонента
JP6492115B2 (ja) 暗号鍵の生成
US10187202B2 (en) Key agreement for wireless communication
EP1757148B1 (en) Security in a mobile communications system
EP3952241B1 (en) Parameter sending method and apparatus
US9088408B2 (en) Key agreement using a key derivation key
EP3146741B1 (en) Cellular network authentication control
KR20190139203A (ko) 서버와 사용자 장비 사이의 통신을 관리하기 위한 방법
JP2012110009A (ja) エンティティの認証と暗号化キー生成の機密保護されたリンクのための方法と構成
JP7635073B2 (ja) データを暗号化又は復号化するための暗号処理イベント
US11228428B2 (en) Mitigation of problems arising from SIM key leakage
US10484187B2 (en) Cellular network authentication
JP2021193793A5 (https=)
EP3972307A1 (en) Access request transmission and processing methods, and device
CN112887979A (zh) 一种网络接入方法及相关设备
CN114079924B (zh) 消息的处理方法、装置、相关设备及存储介质
CN119485283A (zh) 通信方法、系统、装置、电子设备、存储介质和程序产品
HK40023059B (en) Key agreement for wireless communication
HK40023059A (en) Key agreement for wireless communication
HK1247477B (en) Key agreement for wireless communication

Legal Events

Date Code Title Description
A521 Request for written amendment filed

Free format text: JAPANESE INTERMEDIATE CODE: A523

Effective date: 20210922

AA79 Non-delivery of priority document

Free format text: JAPANESE INTERMEDIATE CODE: A24379

Effective date: 20211005

A521 Request for written amendment filed

Free format text: JAPANESE INTERMEDIATE CODE: A523

Effective date: 20240308

A621 Written request for application examination

Free format text: JAPANESE INTERMEDIATE CODE: A621

Effective date: 20240308

A977 Report on retrieval

Free format text: JAPANESE INTERMEDIATE CODE: A971007

Effective date: 20241022

A131 Notification of reasons for refusal

Free format text: JAPANESE INTERMEDIATE CODE: A131

Effective date: 20241105

A521 Request for written amendment filed

Free format text: JAPANESE INTERMEDIATE CODE: A523

Effective date: 20250115

RD02 Notification of acceptance of power of attorney

Free format text: JAPANESE INTERMEDIATE CODE: A7422

Effective date: 20250115

TRDD Decision of grant or rejection written
A01 Written decision to grant a patent or to grant a registration (utility model)

Free format text: JAPANESE INTERMEDIATE CODE: A01

Effective date: 20250204

A61 First payment of annual fees (during grant procedure)

Free format text: JAPANESE INTERMEDIATE CODE: A61

Effective date: 20250212

R150 Certificate of patent or registration of utility model

Ref document number: 7635073

Country of ref document: JP

Free format text: JAPANESE INTERMEDIATE CODE: R150