RU2344559C2 - Система робастного управления ключами и способ ее функционирования - Google Patents
Система робастного управления ключами и способ ее функционирования Download PDFInfo
- Publication number
- RU2344559C2 RU2344559C2 RU2007106614/09A RU2007106614A RU2344559C2 RU 2344559 C2 RU2344559 C2 RU 2344559C2 RU 2007106614/09 A RU2007106614/09 A RU 2007106614/09A RU 2007106614 A RU2007106614 A RU 2007106614A RU 2344559 C2 RU2344559 C2 RU 2344559C2
- Authority
- RU
- Russia
- Prior art keywords
- nodes
- key
- processor
- eksyd
- circuit
- Prior art date
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/04—Key management, e.g. using generic bootstrapping architecture [GBA]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0891—Revocation or update of secret information, e.g. encryption key update or rekeying
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/14—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
- H04L9/16—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms the keys or algorithms being changed during operation
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Storage Device Security (AREA)
- Mobile Radio Communication Systems (AREA)
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
RU2007106614/09A RU2344559C2 (ru) | 2007-02-22 | 2007-02-22 | Система робастного управления ключами и способ ее функционирования |
KR1020070084953A KR20080078511A (ko) | 2007-02-22 | 2007-08-23 | 무선네트워크에서 키 재구성방법 |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
RU2007106614/09A RU2344559C2 (ru) | 2007-02-22 | 2007-02-22 | Система робастного управления ключами и способ ее функционирования |
Publications (2)
Publication Number | Publication Date |
---|---|
RU2007106614A RU2007106614A (ru) | 2008-08-27 |
RU2344559C2 true RU2344559C2 (ru) | 2009-01-20 |
Family
ID=39880684
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
RU2007106614/09A RU2344559C2 (ru) | 2007-02-22 | 2007-02-22 | Система робастного управления ключами и способ ее функционирования |
Country Status (2)
Country | Link |
---|---|
KR (1) | KR20080078511A (ko) |
RU (1) | RU2344559C2 (ko) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
RU2452111C1 (ru) * | 2010-11-17 | 2012-05-27 | ЗАО Институт инфокоммуникационных технологий | Способ пороговой генерации ключей для системы защиты информации на основе идентификационных данных |
RU2591015C1 (ru) * | 2015-12-28 | 2016-07-10 | федеральное государственное автономное образовательное учреждение высшего профессионального образования "Национальный исследовательский ядерный университет МИФИ" (НИЯУ МИФИ) | Способ нелинейного трехмерного многораундового преобразования данных rdozen |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102387014B (zh) * | 2011-10-24 | 2014-01-01 | 北京工业大学 | 一种Mesh网络的密钥管理方法 |
-
2007
- 2007-02-22 RU RU2007106614/09A patent/RU2344559C2/ru not_active IP Right Cessation
- 2007-08-23 KR KR1020070084953A patent/KR20080078511A/ko active IP Right Grant
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
RU2452111C1 (ru) * | 2010-11-17 | 2012-05-27 | ЗАО Институт инфокоммуникационных технологий | Способ пороговой генерации ключей для системы защиты информации на основе идентификационных данных |
RU2591015C1 (ru) * | 2015-12-28 | 2016-07-10 | федеральное государственное автономное образовательное учреждение высшего профессионального образования "Национальный исследовательский ядерный университет МИФИ" (НИЯУ МИФИ) | Способ нелинейного трехмерного многораундового преобразования данных rdozen |
Also Published As
Publication number | Publication date |
---|---|
RU2007106614A (ru) | 2008-08-27 |
KR20080078511A (ko) | 2008-08-27 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN101651539A (zh) | 更新及分配加密密钥 | |
Zhang et al. | AC-PKI: Anonymous and certificateless public-key infrastructure for mobile ad hoc networks | |
Ruan et al. | After-the-fact leakage-resilient identity-based authenticated key exchange | |
JP5234307B2 (ja) | 暗号鍵更新方法、暗号鍵更新装置、及び暗号鍵更新プログラム | |
Ramkumar et al. | Pre-loaded key based multicast and broadcast authentication in mobile ad-hoc networks | |
Das et al. | An effective group-based key establishment scheme for large-scale wireless sensor networks using bivariate polynomials | |
RU2344559C2 (ru) | Система робастного управления ключами и способ ее функционирования | |
Saraswathi et al. | Dynamic and probabilistic key management for distributed wireless sensor networks | |
Chen et al. | Using bivariate polynomial to design a dynamic key management scheme for wireless sensor networks | |
WO2000019652A1 (en) | Distributed shared key generation and management using fractional keys | |
Wu et al. | A survey of key management in mobile ad hoc networks | |
Luo et al. | Self-organised group key management for ad hoc networks | |
De Ree et al. | DECENT: decentralized and efficient key management to secure communication in dense and dynamic environments | |
Salma et al. | Improved group key management region based cluster protocol in cloud | |
RU2330382C1 (ru) | Схема предварительного распределения ключей для кластерных сетей и способ ее функционирования | |
Zhou et al. | Scalable and deterministic key agreement for large scale networks | |
Saravanan et al. | DYCRASEN: A dynamic cryptographic asymmetric key management for sensor network using hash function | |
RU2329605C2 (ru) | Система распределения ключей и способ ее функционирования | |
Kaliaperumal | Securing authentication and privacy in ad hoc partitioned networks | |
Lakshmanarao et al. | IbPaKdE: identity-based pairing free authenticated key and data exchange protocol for wireless sensor networks | |
Vimala et al. | An efficient rekeying function protocol with multicast key distribution for group key management in MANETs | |
Yuan et al. | A matrix-based random key pre-distribution scheme for wireless sensor networks | |
Yavuz et al. | HIMUTSIS: Hierarchical multi-tier adaptive ad-hoc network security protocol based on signcryption type key exchange schemes | |
Ramkumar et al. | On the security of random key pre-distribution schemes | |
de Ree | Decentralized key management for Beyond 5G network coding-enabled mobile small cells |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
MM4A | The patent is invalid due to non-payment of fees |
Effective date: 20150223 |