MX2023004925A - Seguridad basada en certificados utilizando criptografia postcuantica. - Google Patents
Seguridad basada en certificados utilizando criptografia postcuantica.Info
- Publication number
- MX2023004925A MX2023004925A MX2023004925A MX2023004925A MX2023004925A MX 2023004925 A MX2023004925 A MX 2023004925A MX 2023004925 A MX2023004925 A MX 2023004925A MX 2023004925 A MX2023004925 A MX 2023004925A MX 2023004925 A MX2023004925 A MX 2023004925A
- Authority
- MX
- Mexico
- Prior art keywords
- certificate
- message
- server
- private key
- based security
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3263—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/16—Implementing security features at a particular protocol layer
- H04L63/166—Implementing security features at a particular protocol layer at the transport layer
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0823—Network architectures or network communication protocols for network security for authentication of entities using certificates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/14—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
- H04L9/3093—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving Lattices or polynomial equations, e.g. NTRU scheme
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3263—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
- H04L9/3265—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements using certificate chains, trees or paths; Hierarchical trust model
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3263—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
- H04L9/3268—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements using certificate validation, registration, distribution or revocation, e.g. certificate revocation list [CRL]
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computing Systems (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Mathematical Analysis (AREA)
- Algebra (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Mathematical Optimization (AREA)
- Mathematical Physics (AREA)
- Pure & Applied Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
- Mobile Radio Communication Systems (AREA)
- Light Receiving Elements (AREA)
- Optical Communication System (AREA)
- Computer And Data Communications (AREA)
Abstract
Establecimiento de comunicaciones seguras enviando un mensaje de certificado de servidor, incluyendo el mensaje de certificado un primer certificado asociado con un primer logaritmo de encriptación y un segundo certificado asociado con un segundo algoritmo de encriptación, el primer certificado y el segundo certificado unidos entre sí, firmando un primer mensaje asociado con comunicaciones cliente-servidor utilizando una primera clave privada, la primera clave privada asociada con el primer certificado, firmando un segundo mensaje asociado con las comunicaciones cliente-servidor utilizando una segunda clave privada, la segunda clave privada asociada al segundo certificado, la segunda clave privada asociada con el segundo certificado, incluyendo el segundo mensaje el primer mensaje firmado y enviando mensaje de verificación de certificado de servidor, comprendiendo el mensaje de verificación de certificado de servidor el primer mensaje firmado y el segundo mensaje firmado.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US17/086,510 US11716206B2 (en) | 2020-11-02 | 2020-11-02 | Certificate based security using post quantum cryptography |
PCT/EP2021/080014 WO2022090405A1 (en) | 2020-11-02 | 2021-10-28 | Certificate based security using post quantum cryptography |
Publications (1)
Publication Number | Publication Date |
---|---|
MX2023004925A true MX2023004925A (es) | 2023-05-17 |
Family
ID=78516819
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
MX2023004925A MX2023004925A (es) | 2020-11-02 | 2021-10-28 | Seguridad basada en certificados utilizando criptografia postcuantica. |
Country Status (10)
Country | Link |
---|---|
US (1) | US11716206B2 (es) |
EP (1) | EP4238272A1 (es) |
JP (1) | JP2023547630A (es) |
KR (1) | KR20230078706A (es) |
CN (1) | CN116491098A (es) |
AU (1) | AU2021370924A1 (es) |
CA (1) | CA3192541A1 (es) |
IL (1) | IL301267A (es) |
MX (1) | MX2023004925A (es) |
WO (1) | WO2022090405A1 (es) |
Families Citing this family (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US11716206B2 (en) | 2020-11-02 | 2023-08-01 | International Business Machines Corporation | Certificate based security using post quantum cryptography |
US11757659B2 (en) | 2020-12-01 | 2023-09-12 | International Business Machines Corporation | Post-quantum certificate binding |
US11909893B2 (en) * | 2021-06-25 | 2024-02-20 | Entrust Corporation | Composite encryption across cryptographic algorithms |
CN114826593B (zh) * | 2022-06-28 | 2022-09-16 | 济南量子技术研究院 | 量子安全的数据传输方法及数字证书认证系统 |
CN115412241B (zh) * | 2022-07-25 | 2024-02-06 | 华中科技大学 | 实现后量子密码算法Kyber和Saber的融合密码安全处理器 |
CN115150184B (zh) * | 2022-07-25 | 2023-07-21 | 中国互联网络信息中心 | 一种元数据在fabric区块链证书中应用的方法及其系统 |
WO2024080091A1 (ja) * | 2022-10-14 | 2024-04-18 | パナソニックIpマネジメント株式会社 | 通信方法、第1機器、第2機器、及び、プログラム |
Family Cites Families (28)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP2068264A3 (en) * | 2007-11-27 | 2010-12-29 | FeliCa Networks, Inc. | Service providing system, service providing server and information terminal device |
US20120011566A1 (en) * | 2010-07-07 | 2012-01-12 | The Industry & Academic Cooperation In Chungnam National University(Iac) | System and method for sensor network authentication based on xor chain |
US20120173874A1 (en) * | 2011-01-04 | 2012-07-05 | Qualcomm Incorporated | Method And Apparatus For Protecting Against A Rogue Certificate |
EP2850557A4 (en) | 2012-05-18 | 2016-01-06 | Sri Internat Inc | SYSTEM AND METHOD FOR AUTHENTICATING A MANUFACTURED PRODUCT USING A MOBILE DEVICE |
US9565180B2 (en) * | 2012-09-28 | 2017-02-07 | Symantec Corporation | Exchange of digital certificates in a client-proxy-server network configuration |
US10298404B1 (en) * | 2014-12-12 | 2019-05-21 | Amazon Technologies, Inc. | Certificate echoing for session security |
CN104639534B (zh) * | 2014-12-30 | 2019-02-12 | 北京奇虎科技有限公司 | 网站安全信息的加载方法和浏览器装置 |
US10063591B1 (en) * | 2015-02-14 | 2018-08-28 | A10 Networks, Inc. | Implementing and optimizing secure socket layer intercept |
US10454689B1 (en) * | 2015-08-27 | 2019-10-22 | Amazon Technologies, Inc. | Digital certificate management |
US9660978B1 (en) | 2016-08-08 | 2017-05-23 | ISARA Corporation | Using a digital certificate with multiple cryptosystems |
US9667619B1 (en) * | 2016-10-14 | 2017-05-30 | Akamai Technologies, Inc. | Systems and methods for utilizing client side authentication to select services available at a given port number |
US10469453B2 (en) * | 2017-02-10 | 2019-11-05 | Juniper Networks, Inc. | Granular offloading of a proxied secure session |
US10511591B2 (en) | 2017-05-08 | 2019-12-17 | Amazon Technologies, Inc. | Generation of shared secrets using pairwise implicit certificates |
US10630655B2 (en) | 2017-05-18 | 2020-04-21 | Robert Bosch Gmbh | Post-quantum secure private stream aggregation |
EP3432509B1 (en) | 2017-07-21 | 2021-06-09 | ID Quantique S.A. | Quantum enhanced application security |
US10742420B1 (en) | 2018-03-09 | 2020-08-11 | Wells Fargo Bank, N.A. | Quantum-resistant double signature system |
DE102018122278A1 (de) * | 2018-09-12 | 2020-03-12 | Infineon Technologies Ag | Ausführen einer kryptographischen Operation |
US10425401B1 (en) | 2018-10-31 | 2019-09-24 | ISARA Corporation | Extensions for using a digital certificate with multiple cryptosystems |
US11979508B2 (en) | 2018-12-14 | 2024-05-07 | Iot And M2M Technologies, Llc | Secure IDS certificate verification for a primary platform |
US11533598B2 (en) * | 2018-12-18 | 2022-12-20 | Fisher Controls International, Llc | Methods and apparatus to establish secure low energy wireless communications in a process control system |
US11431498B2 (en) | 2019-02-12 | 2022-08-30 | Nxm Labs, Inc. | Quantum-augmentable hybrid encryption system and method |
WO2020223319A1 (en) * | 2019-05-01 | 2020-11-05 | Nix John A | Distributed eap-tls authentication for wireless networks with concealed subscriber identities |
US11456877B2 (en) | 2019-06-28 | 2022-09-27 | Intel Corporation | Unified accelerator for classical and post-quantum digital signature schemes in computing environments |
US11582045B2 (en) * | 2020-06-02 | 2023-02-14 | John A. Nix | Combined digital signature algorithms for security against quantum computers |
US11558204B2 (en) * | 2020-08-17 | 2023-01-17 | International Business Machines Corporation | Attesting control over network devices |
US20220075877A1 (en) * | 2020-09-09 | 2022-03-10 | Self Financial, Inc. | Interface and system for updating isolated repositories |
US11716206B2 (en) | 2020-11-02 | 2023-08-01 | International Business Machines Corporation | Certificate based security using post quantum cryptography |
US11757659B2 (en) | 2020-12-01 | 2023-09-12 | International Business Machines Corporation | Post-quantum certificate binding |
-
2020
- 2020-11-02 US US17/086,510 patent/US11716206B2/en active Active
-
2021
- 2021-10-28 KR KR1020237012927A patent/KR20230078706A/ko active Search and Examination
- 2021-10-28 AU AU2021370924A patent/AU2021370924A1/en active Pending
- 2021-10-28 CN CN202180072932.5A patent/CN116491098A/zh active Pending
- 2021-10-28 EP EP21802289.5A patent/EP4238272A1/en active Pending
- 2021-10-28 WO PCT/EP2021/080014 patent/WO2022090405A1/en active Application Filing
- 2021-10-28 CA CA3192541A patent/CA3192541A1/en active Pending
- 2021-10-28 MX MX2023004925A patent/MX2023004925A/es unknown
- 2021-10-28 JP JP2023525111A patent/JP2023547630A/ja active Pending
- 2021-10-28 IL IL301267A patent/IL301267A/en unknown
Also Published As
Publication number | Publication date |
---|---|
EP4238272A1 (en) | 2023-09-06 |
US11716206B2 (en) | 2023-08-01 |
KR20230078706A (ko) | 2023-06-02 |
IL301267A (en) | 2023-05-01 |
US20220141039A1 (en) | 2022-05-05 |
CN116491098A (zh) | 2023-07-25 |
JP2023547630A (ja) | 2023-11-13 |
CA3192541A1 (en) | 2022-05-05 |
WO2022090405A1 (en) | 2022-05-05 |
AU2021370924A1 (en) | 2023-05-25 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
MX2023004925A (es) | Seguridad basada en certificados utilizando criptografia postcuantica. | |
CN107017993B (zh) | 一种多方联合密钥产生和数字签名方法及系统 | |
CN108667626B (zh) | 安全的两方协作sm2签名方法 | |
CN103475464A (zh) | 一种电力专用量子加密网关系统 | |
CN104811302B (zh) | 基于无证书的椭圆曲线混合签密方法 | |
CN108173639A (zh) | 一种基于sm9签名算法的两方合作签名方法 | |
CN106878016A (zh) | 数据发送、接收方法及装置 | |
WO2011017099A3 (en) | Secure communication using asymmetric cryptography and light-weight certificates | |
CN108882238B (zh) | 一种用于移动自组织网中基于共识算法的轻量级轮转ca认证方法 | |
WO2013032671A2 (en) | Methods and apparatus for source authentication of messages that are secured with a group key | |
EP2120389A4 (en) | METHOD, SYSTEM, AND COMMUNICATION DEVICE CAPABLE OF GENERATING A CRYPTOGRAPHIC SESSION | |
CN102387152A (zh) | 一种基于预设密钥的对称加密通信方法 | |
CN110048849A (zh) | 一种多层保护的会话密钥协商方法 | |
CN106453431B (zh) | 基于pki实现互联网系统间认证的方法 | |
CN113037499B (zh) | 一种区块链加密通讯方法及系统 | |
CN104901935A (zh) | 一种基于cpk的双向认证及数据交互安全保护方法 | |
CN110278088A (zh) | 一种sm2协同签名方法 | |
CN103796199A (zh) | 移动非平衡网络中可认证非对称群组秘钥协商方法 | |
CN104734857A (zh) | 一种无双线性对的多接收者混合签密算法 | |
CN107360567B (zh) | 基于身份无对的无线网跨域切换认证的密钥协商方法 | |
CN108234129A (zh) | 一种基于格密码的双向认证密钥协商方法与系统 | |
MY171259A (en) | System and method for identity-based entity authentication for client-server communications | |
GB2600498A9 (en) | Device provisioning and authentication | |
CN114650173A (zh) | 一种加密通讯方法及系统 | |
GB2543359A (en) | Methods and apparatus for secure communication |