MX2014014004A - Determinacion de codigos criptograficos. - Google Patents
Determinacion de codigos criptograficos.Info
- Publication number
- MX2014014004A MX2014014004A MX2014014004A MX2014014004A MX2014014004A MX 2014014004 A MX2014014004 A MX 2014014004A MX 2014014004 A MX2014014004 A MX 2014014004A MX 2014014004 A MX2014014004 A MX 2014014004A MX 2014014004 A MX2014014004 A MX 2014014004A
- Authority
- MX
- Mexico
- Prior art keywords
- key
- communication unit
- cryptographic
- perturbation value
- identity
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0838—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
- H04L9/0847—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving identity based encryption [IBE] schemes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/14—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
- H04L9/16—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms the keys or algorithms being changed during operation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
- H04L9/3093—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving Lattices or polynomial equations, e.g. NTRU scheme
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/24—Key scheduling, i.e. generating round keys or sub-keys for block encryption
Landscapes
- Engineering & Computer Science (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Computer Security & Cryptography (AREA)
- Mathematical Optimization (AREA)
- Mathematical Physics (AREA)
- Pure & Applied Mathematics (AREA)
- Physics & Mathematics (AREA)
- Computing Systems (AREA)
- Theoretical Computer Science (AREA)
- Mathematical Analysis (AREA)
- General Physics & Mathematics (AREA)
- Algebra (AREA)
- Mobile Radio Communication Systems (AREA)
- Telephonic Communication Services (AREA)
- Storage Device Security (AREA)
- Lock And Its Accessories (AREA)
Abstract
Una primera unidad de comunicación (101) comprende: un procesador (203) que obtiene el material de código local que define una primera función de generación de código de una Tercera Parte Confiable (TTP). Un procesador de identidad (205) que obtiene una identidad para una segunda unidad de comunicación (103 y un generador de código (207) determina un primer código criptográfico de la primera función de generación de código en función de la identidad. Un generador (209) genera, en forma local, un valor de perturbación que no es únicamente determinado por los datos que se originan a partir de la TTP. Un modificador de código (211) determina un código compartido criptográfico aplicando el valor de perturbación al primer código criptográfico. La segunda unidad de comunicación (103) también obtiene datos de modificación de código y los utiliza para determinar un código criptográfico para la primera unidad de comunicación (101). Entonces, esta genera los posibles valores del valor de perturbación, y de manera subsiguiente, los posibles códigos criptográficos compartidos. Entonces, selecciona uno que coincida con los datos criptográficos de la primera unidad de comunicación (101). El valor de perturbación podría proporcionar un aumento en la resistencia contra los ataques de colusión.
Applications Claiming Priority (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US201261649464P | 2012-05-21 | 2012-05-21 | |
US201261732997P | 2012-12-04 | 2012-12-04 | |
EP12196092 | 2012-12-07 | ||
PCT/IB2013/053224 WO2013175324A1 (en) | 2012-05-21 | 2013-04-24 | Determination of cryptographic keys |
Publications (2)
Publication Number | Publication Date |
---|---|
MX2014014004A true MX2014014004A (es) | 2015-02-10 |
MX340269B MX340269B (es) | 2016-07-04 |
Family
ID=47435744
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
MX2014014004A MX340269B (es) | 2012-05-21 | 2013-04-24 | Determinacion de codigos criptograficos. |
Country Status (9)
Country | Link |
---|---|
US (1) | US20150134960A1 (es) |
EP (1) | EP2853058A1 (es) |
JP (1) | JP2015521003A (es) |
CN (1) | CN104303450A (es) |
BR (1) | BR112014028757A2 (es) |
MX (1) | MX340269B (es) |
RU (1) | RU2014151791A (es) |
WO (1) | WO2013175324A1 (es) |
ZA (1) | ZA201409419B (es) |
Families Citing this family (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP2962185B1 (en) * | 2013-02-28 | 2016-11-16 | Koninklijke Philips N.V. | Random number generator and stream cipher |
SE538279C2 (sv) | 2014-09-23 | 2016-04-19 | Kelisec Ab | Förfarande och system för att fastställa förekomst av |
SE542460C2 (en) | 2014-10-09 | 2020-05-12 | Kelisec Ab | Improved security through authenticaton tokens |
SE540133C2 (en) | 2014-10-09 | 2018-04-10 | Kelisec Ab | Improved system for establishing a secure communication channel |
SE539271C2 (en) | 2014-10-09 | 2017-06-07 | Kelisec Ab | Mutual authentication |
SE538304C2 (sv) | 2014-10-09 | 2016-05-03 | Kelisec Ab | Improved installation of a terminal in a secure system |
US11088834B2 (en) * | 2015-04-28 | 2021-08-10 | Palo Alto Research Center Incorporated | System for privacy-preserving monetization of big data and method for using the same |
JP2022091498A (ja) * | 2020-12-09 | 2022-06-21 | セイコーエプソン株式会社 | 暗号通信システム、暗号通信方法および暗号通信装置 |
CN113965325B (zh) * | 2021-10-20 | 2023-07-25 | 成都卫士通信息产业股份有限公司 | 数据传输认证方法、装置、电子设备及计算机存储介质 |
Family Cites Families (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPH10164047A (ja) * | 1996-11-29 | 1998-06-19 | Oki Electric Ind Co Ltd | 暗号通信システム |
US6754820B1 (en) * | 2001-01-30 | 2004-06-22 | Tecsec, Inc. | Multiple level access system |
JP3464153B2 (ja) * | 1998-09-16 | 2003-11-05 | 村田機械株式会社 | 暗号通信方法及び暗号通信システム |
AU2003252817A1 (en) * | 2002-03-13 | 2003-09-22 | Koninklijke Philips Electronics N.V. | Polynomial-based multi-user key generation and authentication method and system |
US8379867B2 (en) * | 2007-09-24 | 2013-02-19 | Mymail Technology, Llc | Secure email communication system |
CN102171969B (zh) * | 2008-10-06 | 2014-12-03 | 皇家飞利浦电子股份有限公司 | 用于操作网络的方法,用于其的系统管理设备、网络和计算机程序 |
CN101977198B (zh) * | 2010-10-29 | 2013-09-25 | 西安电子科技大学 | 域间认证及密钥协商方法 |
FR3015080B1 (fr) * | 2013-12-17 | 2016-01-22 | Oberthur Technologies | Verification d'integrite de paire de cles cryptographiques |
-
2013
- 2013-04-24 EP EP13727992.3A patent/EP2853058A1/en not_active Withdrawn
- 2013-04-24 RU RU2014151791A patent/RU2014151791A/ru not_active Application Discontinuation
- 2013-04-24 US US14/400,572 patent/US20150134960A1/en not_active Abandoned
- 2013-04-24 BR BR112014028757A patent/BR112014028757A2/pt not_active IP Right Cessation
- 2013-04-24 CN CN201380026604.7A patent/CN104303450A/zh active Pending
- 2013-04-24 WO PCT/IB2013/053224 patent/WO2013175324A1/en active Application Filing
- 2013-04-24 MX MX2014014004A patent/MX340269B/es active IP Right Grant
- 2013-04-24 JP JP2015513298A patent/JP2015521003A/ja active Pending
-
2014
- 2014-12-19 ZA ZA2014/09419A patent/ZA201409419B/en unknown
Also Published As
Publication number | Publication date |
---|---|
MX340269B (es) | 2016-07-04 |
BR112014028757A2 (pt) | 2017-06-27 |
JP2015521003A (ja) | 2015-07-23 |
ZA201409419B (en) | 2016-09-28 |
CN104303450A (zh) | 2015-01-21 |
EP2853058A1 (en) | 2015-04-01 |
WO2013175324A1 (en) | 2013-11-28 |
RU2014151791A (ru) | 2016-07-20 |
US20150134960A1 (en) | 2015-05-14 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
MX2014014004A (es) | Determinacion de codigos criptograficos. | |
PH12016501640A1 (en) | Techniques to operate a service with machine generated authentication tokens | |
MX2021014176A (es) | Metodo y sistema para una variante de cadena de bloques utilizando firmas digitales. | |
MX2017014141A (es) | Dispositivos y metodos para autenticacion de dispositivos de cliente. | |
GB201213279D0 (en) | Identity generation mechanism | |
SG10201901366WA (en) | Key exchange through partially trusted third party | |
EA201790385A1 (ru) | Способ цифровой подписи электронного файла и способ аутентификации | |
PH12020550006A1 (en) | Key attestation statement generation providing device anonymity | |
WO2014151730A3 (en) | Identity escrow management for minimal disclosure credentials | |
AU2018256568A1 (en) | Systems and methods for software based encryption | |
WO2015030903A3 (en) | Image based key derivation function | |
TN2015000274A1 (en) | Method and apparatus for marking manufactured items using physical characteristic | |
WO2016057086A3 (en) | Common modulus rsa key pairs for signature generation and encryption/decryption | |
IN2012DN00473A (es) | ||
WO2016118205A3 (en) | Secure creation of encrypted virtual machines from encrypted templates | |
MY146687A (en) | Cryptographic key generation | |
IN2013MU01234A (es) | ||
WO2016126052A3 (ko) | 인증 방법 및 시스템 | |
MX358557B (es) | Privacidad de datos inalambrica mantenida a traves de una red social. | |
WO2010060704A3 (en) | Method and system for token-based authentication | |
GB201105765D0 (en) | Payment system | |
NZ701459A (en) | Systems and methods for secure processing with embedded cryptographic unit | |
GB2512249A (en) | Secure peer discovery and authentication using a shared secret | |
JP2015521003A5 (es) | ||
IN2014MU00771A (es) |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
FG | Grant or registration |