MX340269B - Determinacion de codigos criptograficos. - Google Patents

Determinacion de codigos criptograficos.

Info

Publication number
MX340269B
MX340269B MX2014014004A MX2014014004A MX340269B MX 340269 B MX340269 B MX 340269B MX 2014014004 A MX2014014004 A MX 2014014004A MX 2014014004 A MX2014014004 A MX 2014014004A MX 340269 B MX340269 B MX 340269B
Authority
MX
Mexico
Prior art keywords
key
communication unit
cryptographic
perturbation value
identity
Prior art date
Application number
MX2014014004A
Other languages
English (en)
Other versions
MX2014014004A (es
Inventor
Garcia Morchon Oscar
Marinus Gerardus Maria Tolhuizen Ludovicus
Original Assignee
Koninklijke Philips Nv
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Koninklijke Philips Nv filed Critical Koninklijke Philips Nv
Publication of MX2014014004A publication Critical patent/MX2014014004A/es
Publication of MX340269B publication Critical patent/MX340269B/es

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0838Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
    • H04L9/0847Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving identity based encryption [IBE] schemes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/14Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
    • H04L9/16Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms the keys or algorithms being changed during operation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • H04L9/3093Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving Lattices or polynomial equations, e.g. NTRU scheme
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/24Key scheduling, i.e. generating round keys or sub-keys for block encryption

Landscapes

  • Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computer Security & Cryptography (AREA)
  • Mathematical Optimization (AREA)
  • Mathematical Physics (AREA)
  • Pure & Applied Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Computing Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Mathematical Analysis (AREA)
  • General Physics & Mathematics (AREA)
  • Algebra (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Telephonic Communication Services (AREA)
  • Storage Device Security (AREA)
  • Lock And Its Accessories (AREA)

Abstract

Una primera unidad de comunicación (101) comprende: un procesador (203) que obtiene el material de código local que define una primera función de generación de código de una Tercera Parte Confiable (TTP). Un procesador de identidad (205) que obtiene una identidad para una segunda unidad de comunicación (103 y un generador de código (207) determina un primer código criptográfico de la primera función de generación de código en función de la identidad. Un generador (209) genera, en forma local, un valor de perturbación que no es únicamente determinado por los datos que se originan a partir de la TTP. Un modificador de código (211) determina un código compartido criptográfico aplicando el valor de perturbación al primer código criptográfico. La segunda unidad de comunicación (103) también obtiene datos de modificación de código y los utiliza para determinar un código criptográfico para la primera unidad de comunicación (101). Entonces, esta genera los posibles valores del valor de perturbación, y de manera subsiguiente, los posibles códigos criptográficos compartidos. Entonces, selecciona uno que coincida con los datos criptográficos de la primera unidad de comunicación (101). El valor de perturbación podría proporcionar un aumento en la resistencia contra los ataques de colusión.
MX2014014004A 2012-05-21 2013-04-24 Determinacion de codigos criptograficos. MX340269B (es)

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
US201261649464P 2012-05-21 2012-05-21
US201261732997P 2012-12-04 2012-12-04
EP12196092 2012-12-07
PCT/IB2013/053224 WO2013175324A1 (en) 2012-05-21 2013-04-24 Determination of cryptographic keys

Publications (2)

Publication Number Publication Date
MX2014014004A MX2014014004A (es) 2015-02-10
MX340269B true MX340269B (es) 2016-07-04

Family

ID=47435744

Family Applications (1)

Application Number Title Priority Date Filing Date
MX2014014004A MX340269B (es) 2012-05-21 2013-04-24 Determinacion de codigos criptograficos.

Country Status (9)

Country Link
US (1) US20150134960A1 (es)
EP (1) EP2853058A1 (es)
JP (1) JP2015521003A (es)
CN (1) CN104303450A (es)
BR (1) BR112014028757A2 (es)
MX (1) MX340269B (es)
RU (1) RU2014151791A (es)
WO (1) WO2013175324A1 (es)
ZA (1) ZA201409419B (es)

Families Citing this family (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2014131677A1 (en) * 2013-02-28 2014-09-04 Koninklijke Philips N.V. Random number generator and stream cipher
SE538279C2 (sv) 2014-09-23 2016-04-19 Kelisec Ab Förfarande och system för att fastställa förekomst av
SE542460C2 (en) 2014-10-09 2020-05-12 Kelisec Ab Improved security through authenticaton tokens
SE538304C2 (sv) 2014-10-09 2016-05-03 Kelisec Ab Improved installation of a terminal in a secure system
SE540133C2 (en) 2014-10-09 2018-04-10 Kelisec Ab Improved system for establishing a secure communication channel
SE539271C2 (en) 2014-10-09 2017-06-07 Kelisec Ab Mutual authentication
US11088834B2 (en) * 2015-04-28 2021-08-10 Palo Alto Research Center Incorporated System for privacy-preserving monetization of big data and method for using the same
JP2022091498A (ja) * 2020-12-09 2022-06-21 セイコーエプソン株式会社 暗号通信システム、暗号通信方法および暗号通信装置
CN113965325B (zh) * 2021-10-20 2023-07-25 成都卫士通信息产业股份有限公司 数据传输认证方法、装置、电子设备及计算机存储介质

Family Cites Families (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH10164047A (ja) * 1996-11-29 1998-06-19 Oki Electric Ind Co Ltd 暗号通信システム
US6754820B1 (en) * 2001-01-30 2004-06-22 Tecsec, Inc. Multiple level access system
JP3464153B2 (ja) * 1998-09-16 2003-11-05 村田機械株式会社 暗号通信方法及び暗号通信システム
KR20040093128A (ko) * 2002-03-13 2004-11-04 코닌클리케 필립스 일렉트로닉스 엔.브이. 다항식을 기반으로 한 다수-사용자 키 생성 및 인증 방법및 시스템
US8379867B2 (en) * 2007-09-24 2013-02-19 Mymail Technology, Llc Secure email communication system
KR101657705B1 (ko) * 2008-10-06 2016-09-19 코닌클리케 필립스 엔.브이. 네트워크를 운영하기 위한 방법, 시스템 관리 디바이스, 네트워크 및 이를 위한 컴퓨터 프로그램
CN101977198B (zh) * 2010-10-29 2013-09-25 西安电子科技大学 域间认证及密钥协商方法
FR3015080B1 (fr) * 2013-12-17 2016-01-22 Oberthur Technologies Verification d'integrite de paire de cles cryptographiques

Also Published As

Publication number Publication date
MX2014014004A (es) 2015-02-10
ZA201409419B (en) 2016-09-28
JP2015521003A (ja) 2015-07-23
BR112014028757A2 (pt) 2017-06-27
WO2013175324A1 (en) 2013-11-28
EP2853058A1 (en) 2015-04-01
US20150134960A1 (en) 2015-05-14
CN104303450A (zh) 2015-01-21
RU2014151791A (ru) 2016-07-20

Similar Documents

Publication Publication Date Title
MX2014014004A (es) Determinacion de codigos criptograficos.
PH12016501640A1 (en) Techniques to operate a service with machine generated authentication tokens
MX2021014176A (es) Metodo y sistema para una variante de cadena de bloques utilizando firmas digitales.
GB201213279D0 (en) Identity generation mechanism
SG10201901366WA (en) Key exchange through partially trusted third party
MX2017014141A (es) Dispositivos y metodos para autenticacion de dispositivos de cliente.
EA201790385A1 (ru) Способ цифровой подписи электронного файла и способ аутентификации
PH12020550006A1 (en) Key attestation statement generation providing device anonymity
EA201591160A1 (ru) Способ и устройство для маркирования промышленных изделий с помощью физического свойства
WO2014151730A3 (en) Identity escrow management for minimal disclosure credentials
AU2018256568A1 (en) Systems and methods for software based encryption
WO2015030903A3 (en) Image based key derivation function
WO2016057086A3 (en) Common modulus rsa key pairs for signature generation and encryption/decryption
WO2014191768A3 (en) Multi-factor zero-knowledge authentication using pairings
WO2016118205A3 (en) Secure creation of encrypted virtual machines from encrypted templates
MA32613B1 (fr) Creation de cle cryptographique
WO2015134533A3 (en) Authentication of virtual machine images using digital certificates
MX2015012581A (es) Privacidad de datos inalambrica mantenida a traves de una red social.
WO2010060704A3 (en) Method and system for token-based authentication
IN2013MU01234A (es)
GB201105765D0 (en) Payment system
NZ701459A (en) Systems and methods for secure processing with embedded cryptographic unit
WO2016126052A3 (ko) 인증 방법 및 시스템
JP2015521003A5 (es)
EP3694143A3 (en) Enabling access to data

Legal Events

Date Code Title Description
FG Grant or registration