MX2023001010A - Sistema para el cifrado y autenticacion de comunicaciones con autenticacion mutua de los comunicantes. - Google Patents

Sistema para el cifrado y autenticacion de comunicaciones con autenticacion mutua de los comunicantes.

Info

Publication number
MX2023001010A
MX2023001010A MX2023001010A MX2023001010A MX2023001010A MX 2023001010 A MX2023001010 A MX 2023001010A MX 2023001010 A MX2023001010 A MX 2023001010A MX 2023001010 A MX2023001010 A MX 2023001010A MX 2023001010 A MX2023001010 A MX 2023001010A
Authority
MX
Mexico
Prior art keywords
encrypting
communicators
parties
mutual authentication
authenticating
Prior art date
Application number
MX2023001010A
Other languages
English (en)
Inventor
Crespo José Agustín Francisco Javier Vega
Verdún José Domingo Carrillo
Original Assignee
Jose Agustin Francisco Javier Vega Crespo
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Jose Agustin Francisco Javier Vega Crespo filed Critical Jose Agustin Francisco Javier Vega Crespo
Publication of MX2023001010A publication Critical patent/MX2023001010A/es

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/0825Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using asymmetric-key encryption or public key infrastructure [PKI], e.g. key signature or public key certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3271Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
    • H04L9/3273Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response for mutual authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0435Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/067Network architectures or network communication protocols for network security for supporting key management in a packet data network using one-time keys
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • H04L63/0838Network architectures or network communication protocols for network security for authentication of entities using passwords using one-time-passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0869Network architectures or network communication protocols for network security for authentication of entities for achieving mutual authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0869Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0894Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/14Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • H04L9/3242Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving keyed hash functions, e.g. message authentication codes [MACs], CBC-MAC or HMAC
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2463/00Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
    • H04L2463/121Timestamp

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Power Engineering (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Telephonic Communication Services (AREA)

Abstract

Sistema para el cifrado y autenticación de comunicaciones con autenticación mutua de los comunicantes que, aplicable entre dos Partes que intercambian mensajes soportados por una red de comunicaciones donde están identificadas de forma inequívoca, comprende procesos soportados por respectivas Aplicaciones de Autenticación de que dispone cada Parte en un dispositivo hardware/software, las cuales, al menos, comprenden: un Identificador (Id) de la Aplicación de Autenticación (AA); una Clave de Cifrado (CC) de cada una de las Partes; un generador de Valores Aleatorios para cifrar y autenticar mensajes Mx; un algoritmo de cifrado, que comparte con el resto de las Partes del Sistema, que les permite cifrar y descifrar los mensajes que se envían/reciben.
MX2023001010A 2020-07-24 2021-06-21 Sistema para el cifrado y autenticacion de comunicaciones con autenticacion mutua de los comunicantes. MX2023001010A (es)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
ES202030772A ES2788976B2 (es) 2020-07-24 2020-07-24 Sistema para el cifrado y autenticacion de comunicaciones con autenticacion mutua de los comunicantes
PCT/ES2021/070461 WO2022018310A1 (es) 2020-07-24 2021-06-21 Sistema para el cifrado y autenticación de comunicaciones con autenticación mutua de los comunicantes

Publications (1)

Publication Number Publication Date
MX2023001010A true MX2023001010A (es) 2023-03-01

Family

ID=72885298

Family Applications (1)

Application Number Title Priority Date Filing Date
MX2023001010A MX2023001010A (es) 2020-07-24 2021-06-21 Sistema para el cifrado y autenticacion de comunicaciones con autenticacion mutua de los comunicantes.

Country Status (5)

Country Link
US (1) US20230275748A1 (es)
EP (1) EP4187843A1 (es)
ES (1) ES2788976B2 (es)
MX (1) MX2023001010A (es)
WO (1) WO2022018310A1 (es)

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR101014849B1 (ko) * 2005-12-02 2011-02-15 고려대학교 산학협력단 제 3의 신뢰기관의 도움 없이 공개키에 대한 상호 인증 및키 교환 방법 및 그 장치
US20080034216A1 (en) * 2006-08-03 2008-02-07 Eric Chun Wah Law Mutual authentication and secure channel establishment between two parties using consecutive one-time passwords
KR100860573B1 (ko) * 2006-12-01 2008-09-26 (재)대구경북과학기술연구원 사용자 인증 방법
US8438617B2 (en) * 2007-10-29 2013-05-07 Emc Corporation User authentication based on voucher codes
US8255688B2 (en) * 2008-01-23 2012-08-28 Mastercard International Incorporated Systems and methods for mutual authentication using one time codes
ES2581477T3 (es) * 2011-09-27 2016-09-06 3Otp Autenticación, S.L. Sistema de autenticación mutua antipiratería en los identificadores de software tipo smartphone y en sus SMS

Also Published As

Publication number Publication date
ES2788976A1 (es) 2020-10-23
WO2022018310A1 (es) 2022-01-27
EP4187843A1 (en) 2023-05-31
ES2788976B2 (es) 2022-03-16
US20230275748A1 (en) 2023-08-31

Similar Documents

Publication Publication Date Title
CN108599925B (zh) 一种基于量子通信网络的改进型aka身份认证系统和方法
EP2984782B1 (en) Method and system for accessing device by a user
Yoon Efficiency and security problems of anonymous key agreement protocol based on chaotic maps
EP2416524A2 (en) System and method for secure transaction of data between wireless communication device and server
CN108540436B (zh) 基于量子网络实现信息加解密传输的通信系统和通信方法
CA2546553A1 (en) System and method for provisioning and authenticating via a network
CN110880972A (zh) 一种基于安全多方计算的区块链密钥管理系统
CN108847928B (zh) 基于群组型量子密钥卡实现信息加解密传输的通信系统和通信方法
US9130744B1 (en) Sending an encrypted key pair and a secret shared by two devices to a trusted intermediary
CN102111411A (zh) P2p网络中对等用户结点间的加密安全数据交换方法
WO2012024906A1 (zh) 一种移动通信系统及其语音通话加密的方法
CN100350816C (zh) 基于gsm网络实现无线身份认证和数据安全传输的方法
Modiri et al. GSL-AKA: Group-based secure lightweight authentication and key agreement protocol for M2M communication
CN111416712B (zh) 基于多个移动设备的量子保密通信身份认证系统及方法
CN107682152B (zh) 一种基于对称密码的群组密钥协商方法
CN103167494B (zh) 信息发送方法和系统
CN106850584B (zh) 一种面向客户/服务器网络的匿名认证方法
CN105610847A (zh) 一种支持多交换节点电子公文安全传输交换的方法
KR101704540B1 (ko) M2m 환경의 다중 디바이스 데이터 공유를 위한 그룹키 관리 방법
CN113676448B (zh) 一种基于对称秘钥的离线设备双向认证方法和系统
CN113300842B (zh) 一种提高对称加密算法安全性的方法
US11088835B1 (en) Cryptographic module to generate cryptographic keys from cryptographic key parts
Modiri et al. A novel group-based secure lightweight authentication and key agreement protocol for machine-type communication
CN114268441B (zh) 一种量子安全应用方法、客户端装置、服务器装置与系统
Wang et al. Authentication of quantum key distribution with post-quantum cryptography and replay attacks