WO2006117806A3 - Bilaterally generated encryption key system - Google Patents

Bilaterally generated encryption key system Download PDF

Info

Publication number
WO2006117806A3
WO2006117806A3 PCT/IN2006/000157 IN2006000157W WO2006117806A3 WO 2006117806 A3 WO2006117806 A3 WO 2006117806A3 IN 2006000157 W IN2006000157 W IN 2006000157W WO 2006117806 A3 WO2006117806 A3 WO 2006117806A3
Authority
WO
WIPO (PCT)
Prior art keywords
encryption key
password
encryption keys
keys
users
Prior art date
Application number
PCT/IN2006/000157
Other languages
French (fr)
Other versions
WO2006117806A2 (en
WO2006117806B1 (en
Inventor
Rahman Syed Ibrahim Abdu Abdul
Original Assignee
Rahman Syed Ibrahim Abdu Abdul
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from PCT/IN2005/000141 external-priority patent/WO2006006182A2/en
Application filed by Rahman Syed Ibrahim Abdu Abdul filed Critical Rahman Syed Ibrahim Abdu Abdul
Priority to US11/913,555 priority Critical patent/US20090217035A1/en
Publication of WO2006117806A2 publication Critical patent/WO2006117806A2/en
Publication of WO2006117806A3 publication Critical patent/WO2006117806A3/en
Publication of WO2006117806B1 publication Critical patent/WO2006117806B1/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0869Network architectures or network communication protocols for network security for authentication of entities for achieving mutual authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0863Generation of secret information including derivation or calculation of cryptographic keys or passwords involving passwords or one-time passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/14Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
    • H04L9/16Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms the keys or algorithms being changed during operation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3271Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
    • H04L9/3273Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response for mutual authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/20Manipulating the length of blocks of bits, e.g. padding or block truncation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/56Financial cryptography, e.g. electronic payment or e-cash

Abstract

Bilaterally Generated Encryption Key System is a variable password based computationally non intensive symmetric encryption key system dispensing with memorization and exchange of keys, capable of providing one encryption key for each object exchanged between two parties, two different encryption keys per transaction and a plurality of encryption keys for a session, integrating authentication and securing transactions preventing breaking attempts. The Password/Encryption Key is a random permutation of Character Units of Variable Character Set System of authentication devices { Fig. 3}, generated by a Call of random numbers from SERVICE PROVIDER and corresponding Response of USER. Bilaterally Generated Encryption Keys and Non Repeating Bilaterally Generated Encryption Keys are two types of Password/Encryption Keys. Secures every Internet/network transactions of USERs {Fig. 6} including Previously Unknown USERs, by generating many Password/ Encryption Keys of required length using a padding method, from single Password/encryption key input of users and previously unknown users at the instant of transaction.
PCT/IN2006/000157 2004-07-12 2006-05-04 Bilaterally generated encryption key system WO2006117806A2 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US11/913,555 US20090217035A1 (en) 2004-07-12 2006-05-04 Bilaterally Generated Encryption Key System

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
INPCT/IN2005/000141 2005-05-04
PCT/IN2005/000141 WO2006006182A2 (en) 2004-07-12 2005-05-04 System, method of generation and use of bilaterally generated variable instant passwords

Publications (3)

Publication Number Publication Date
WO2006117806A2 WO2006117806A2 (en) 2006-11-09
WO2006117806A3 true WO2006117806A3 (en) 2007-04-12
WO2006117806B1 WO2006117806B1 (en) 2007-05-24

Family

ID=37057229

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/IN2006/000157 WO2006117806A2 (en) 2004-07-12 2006-05-04 Bilaterally generated encryption key system

Country Status (1)

Country Link
WO (1) WO2006117806A2 (en)

Families Citing this family (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8295480B1 (en) * 2007-07-10 2012-10-23 Avaya Inc. Uncertainty-based key agreement protocol
US20090044284A1 (en) * 2007-08-09 2009-02-12 Technology Properties Limited System and Method of Generating and Providing a Set of Randomly Selected Substitute Characters in Place of a User Entered Key Phrase
US9607158B2 (en) 2010-10-26 2017-03-28 Nippon Telegraph And Telephone Corporation Proxy computing system, computing apparatus, capability providing apparatus, proxy computing method, capability providing method, program, and recording medium
US20150256336A1 (en) * 2012-11-22 2015-09-10 Passwordbox Inc. End-To-End Encryption Method for Digital Data Sharing Through a Third Party
AU2013205125B1 (en) * 2013-04-13 2014-07-31 Hasq Technology Pty Ltd Method and system for the secure transfer and verification of ownership of digital sequences
US20210398127A1 (en) * 2020-06-18 2021-12-23 XPress Processing, LLC Payment gateway security management
CN112073410B (en) * 2020-09-07 2022-08-30 中国人民解放军63880部队 Cloud data secure transmission control method based on aging
CN112153046B (en) * 2020-09-24 2023-04-07 施耐德电气(中国)有限公司 Data encryption and data decryption method, related equipment and storage medium
CN117202181A (en) * 2023-05-11 2023-12-08 长江量子(武汉)科技有限公司 Method for synchronizing keys of two-ear earphone and two-ear encryption earphone

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2002073377A2 (en) * 2001-03-14 2002-09-19 Jaloveczki Laszlo Authorisation method for a user of a limited access system having an authorisation centre
US20040123151A1 (en) * 2002-12-23 2004-06-24 Authenture, Inc. Operation modes for user authentication system based on random partial pattern recognition
US20050050328A1 (en) * 2003-09-02 2005-03-03 Authenture, Inc. Key generation method for communication session encryption and authentication system

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2002073377A2 (en) * 2001-03-14 2002-09-19 Jaloveczki Laszlo Authorisation method for a user of a limited access system having an authorisation centre
US20040123151A1 (en) * 2002-12-23 2004-06-24 Authenture, Inc. Operation modes for user authentication system based on random partial pattern recognition
US20050050328A1 (en) * 2003-09-02 2005-03-03 Authenture, Inc. Key generation method for communication session encryption and authentication system

Also Published As

Publication number Publication date
WO2006117806A2 (en) 2006-11-09
WO2006117806B1 (en) 2007-05-24

Similar Documents

Publication Publication Date Title
WO2006117806A3 (en) Bilaterally generated encryption key system
Wu et al. A new provably secure authentication and key agreement protocol for SIP using ECC
WO2004034213A3 (en) Localized network authentication and security using tamper-resistant keys
Lu et al. Simple three-party key exchange protocol
Xie A new authenticated key agreement for session initiation protocol
He et al. A secure mutual authentication scheme for session initiation protocol using elliptic curve cryptography
CA2614596C (en) Systems and methods of ambiguity envelope encryption scheme and applications
Yoon et al. Cryptanalysis of a simple three‐party password‐based key exchange protocol
US20060034456A1 (en) Method and system for performing perfectly secure key exchange and authenticated messaging
US20040073795A1 (en) Systems and methods for password-based connection
WO2002093824A3 (en) Authentication method
WO2007038896A3 (en) Method and devices for user authentication
WO2006133413A3 (en) Method and apparatus for establishing a key agreement protocol
WO2007063420A3 (en) Authentication in communications networks
CN104301115B (en) Mobile phone and Bluetooth key signature verification ciphertext communication method
JP2012530996A (en) Authentication method and system
WO2005006629A3 (en) Terminal authentication in a wireless network
CN110247881A (en) Identity identifying method and system based on wearable device
CN104901935A (en) Bilateral authentication and data interaction security protection method based on CPK (Combined Public Key Cryptosystem)
Kumar et al. An improved and secure multiserver authentication scheme based on biometrics and smartcard
WO2004070506A3 (en) A method and system for identifying an authorized individual by means of unpredictable single-use passwords
Di Pietro et al. A two-factor mobile authentication scheme for secure financial transactions
CN100431297C (en) Method for preventing user's pin from illegal use by double verification protocol
JP2005529525A5 (en)
CN110445751A (en) A kind of distributed information sharing method and system based on re-encryption

Legal Events

Date Code Title Description
NENP Non-entry into the national phase

Ref country code: DE

WWW Wipo information: withdrawn in national office

Ref document number: DE

WWE Wipo information: entry into national phase

Ref document number: 5493/CHENP/2007

Country of ref document: IN

NENP Non-entry into the national phase

Ref country code: RU

WWW Wipo information: withdrawn in national office

Ref document number: RU

WPC Withdrawal of priority claims after completion of the technical preparations for international publication

Ref document number: PCT/IN2005/000141

Country of ref document: IN

Free format text: WITHDRAWN AFTER TECHNICAL PREPARATION FINISHED

WWE Wipo information: entry into national phase

Ref document number: 11913555

Country of ref document: US

122 Ep: pct application non-entry in european phase

Ref document number: 06756260

Country of ref document: EP

Kind code of ref document: A2