KR20210146829A - 데이터 암호화 또는 복호화를위한 암호화 처리 이벤트 - Google Patents

데이터 암호화 또는 복호화를위한 암호화 처리 이벤트 Download PDF

Info

Publication number
KR20210146829A
KR20210146829A KR1020210068253A KR20210068253A KR20210146829A KR 20210146829 A KR20210146829 A KR 20210146829A KR 1020210068253 A KR1020210068253 A KR 1020210068253A KR 20210068253 A KR20210068253 A KR 20210068253A KR 20210146829 A KR20210146829 A KR 20210146829A
Authority
KR
South Korea
Prior art keywords
key
equal
encryption
temporary
point
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
KR1020210068253A
Other languages
English (en)
Korean (ko)
Inventor
크리스토프 기라우드
엠마뉴엘 도탁스
Original Assignee
아이데미아 프랑스
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 아이데미아 프랑스 filed Critical 아이데미아 프랑스
Publication of KR20210146829A publication Critical patent/KR20210146829A/ko
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0838Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
    • H04L9/0841Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0866Generation of secret information including derivation or calculation of cryptographic keys or passwords involving user or device identifiers, e.g. serial number, physical or biometrical information, DNA, hand-signature or measurable physical characteristics
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0869Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0877Generation of secret information including derivation or calculation of cryptographic keys or passwords using additional device, e.g. trusted platform module [TPM], smartcard, USB or hardware security module [HSM]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/14Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • H04L9/3006Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters
    • H04L9/3013Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters involving the discrete logarithm problem, e.g. ElGamal or Diffie-Hellman systems
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • H04L9/3066Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • H04L9/3242Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving keyed hash functions, e.g. message authentication codes [MACs], CBC-MAC or HMAC
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • H04W12/043Key management, e.g. using generic bootstrapping architecture [GBA] using a trusted network node as an anchor
    • H04W12/0431Key distribution or pre-distribution; Key agreement
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/80Wireless

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Theoretical Computer Science (AREA)
  • Computing Systems (AREA)
  • Physics & Mathematics (AREA)
  • Mathematical Analysis (AREA)
  • Mathematical Optimization (AREA)
  • Mathematical Physics (AREA)
  • Pure & Applied Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Algebra (AREA)
  • Power Engineering (AREA)
  • Storage Device Security (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Telephonic Communication Services (AREA)
KR1020210068253A 2020-05-27 2021-05-27 데이터 암호화 또는 복호화를위한 암호화 처리 이벤트 Pending KR20210146829A (ko)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
FR2005595 2020-05-27
FR2005595A FR3111038B1 (fr) 2020-05-27 2020-05-27 Traitements cryptographiques pour chiffrer ou déchiffrer des données

Publications (1)

Publication Number Publication Date
KR20210146829A true KR20210146829A (ko) 2021-12-06

Family

ID=72885635

Family Applications (1)

Application Number Title Priority Date Filing Date
KR1020210068253A Pending KR20210146829A (ko) 2020-05-27 2021-05-27 데이터 암호화 또는 복호화를위한 암호화 처리 이벤트

Country Status (5)

Country Link
US (1) US11552796B2 (https=)
EP (1) EP3917073A1 (https=)
JP (1) JP7635073B2 (https=)
KR (1) KR20210146829A (https=)
FR (1) FR3111038B1 (https=)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US12089035B2 (en) * 2021-08-23 2024-09-10 Qualcomm Incorporated Physical channel encryption using secret keys
US20250016552A1 (en) * 2021-10-04 2025-01-09 Telefonaktiebolaget Lm Ericsson (Publ) Conveying Data to a Communication Network
US20240195635A1 (en) * 2022-12-12 2024-06-13 Intel Corporation Roots of trust in intellectual property (ip) blocks in a system on a chip (soc)

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
MY155814A (en) * 2009-07-10 2015-11-30 Certicom Corp System and method for performing serialization of devices
CN114282928B (zh) 2016-02-23 2026-02-17 恩链控股有限公司 基于区块链系统结合钱包管理系统的加密密钥存储和转移
AU2018305843B2 (en) 2017-07-25 2020-07-02 Telefonaktiebolaget Lm Ericsson (Publ) Subscription concealed identifier
JP6634171B2 (ja) 2018-05-11 2020-01-22 株式会社bitFlyer Blockchain 公開鍵の信頼性を証明するための装置、方法及びそのためのプログラム
CN112119609B (zh) * 2018-05-14 2024-12-24 区块链控股有限公司 用于传达秘密的方法和系统

Also Published As

Publication number Publication date
FR3111038A1 (fr) 2021-12-03
US20210377025A1 (en) 2021-12-02
FR3111038B1 (fr) 2023-05-12
JP7635073B2 (ja) 2025-02-25
US11552796B2 (en) 2023-01-10
EP3917073A1 (fr) 2021-12-01
JP2021193793A (ja) 2021-12-23

Similar Documents

Publication Publication Date Title
JP6803481B2 (ja) サーバ及びユーザ装置間の通信を管理する方法
US10187202B2 (en) Key agreement for wireless communication
CN111641498B (zh) 密钥的确定方法及装置
US9088408B2 (en) Key agreement using a key derivation key
CN105162772A (zh) 一种物联网设备认证与密钥协商方法和装置
CN113497778A (zh) 一种数据的传输方法和装置
US11228428B2 (en) Mitigation of problems arising from SIM key leakage
KR20210146829A (ko) 데이터 암호화 또는 복호화를위한 암호화 처리 이벤트
CN103404076B (zh) 在第三实体上认证第一和第二实体的方法
JP2021193793A5 (https=)
CN112839329B (zh) 一种验证方法、装置、设备及计算机可读存储介质
US8855604B2 (en) Roaming authentication method for a GSM system
CN109391938A (zh) 密钥协商方法、装置及系统
WO2024162915A1 (en) Method for updating and revoking security keys and sensitive data over remote secure channels
CN118057759A (zh) 消息传输方法、装置、终端、服务器及介质
EP3847836B1 (en) Method for updating a secret data in a credential container
US20240340164A1 (en) Establishment of forward secrecy during digest authentication
KR20220137557A (ko) 암호 처리에 의한 디바이스의 인증
CN111404669B (zh) 一种密钥生成方法、终端设备及网络设备
CN120091305A (zh) 物联网设备的认证凭证更新方法、装置及系统
HK40023059A (en) Key agreement for wireless communication
HK40023059B (en) Key agreement for wireless communication
HK1247477B (en) Key agreement for wireless communication

Legal Events

Date Code Title Description
E13-X000 Pre-grant limitation requested

St.27 status event code: A-2-3-E10-E13-lim-X000

PA0109 Patent application

St.27 status event code: A-0-1-A10-A12-nap-PA0109

P11-X000 Amendment of application requested

St.27 status event code: A-2-2-P10-P11-nap-X000

P18-X000 Priority claim added or amended

St.27 status event code: A-2-2-P10-P18-nap-X000

PG1501 Laying open of application

St.27 status event code: A-1-1-Q10-Q12-nap-PG1501

P11-X000 Amendment of application requested

St.27 status event code: A-2-2-P10-P11-nap-X000

P13-X000 Application amended

St.27 status event code: A-2-2-P10-P13-nap-X000

A201 Request for examination
PA0201 Request for examination

St.27 status event code: A-1-2-D10-D11-exm-PA0201

D21 Rejection of application intended

Free format text: ST27 STATUS EVENT CODE: A-1-2-D10-D21-EXM-PE0902 (AS PROVIDED BY THE NATIONAL OFFICE)

PE0902 Notice of grounds for rejection

St.27 status event code: A-1-2-D10-D21-exm-PE0902