WO2017064129A1 - Procédé permettant de générer un élément secret pour un chiffrement à usage unique dans un réseau - Google Patents
Procédé permettant de générer un élément secret pour un chiffrement à usage unique dans un réseau Download PDFInfo
- Publication number
- WO2017064129A1 WO2017064129A1 PCT/EP2016/074489 EP2016074489W WO2017064129A1 WO 2017064129 A1 WO2017064129 A1 WO 2017064129A1 EP 2016074489 W EP2016074489 W EP 2016074489W WO 2017064129 A1 WO2017064129 A1 WO 2017064129A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- key
- secret
- subscriber
- bit
- sequence
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/0822—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using key encryption key
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
Definitions
- the present invention relates to a method for generating a secret in a network, in particular for generating a common, secret key in two users of the network.
- point-to-point connections are usually counted as networks and should also be addressed here with this term.
- the two participants communicate via a shared transmission medium.
- logical bit sequences (or, more generally, value sequences) are transmitted physically by means of corresponding transmission methods as signals or signal sequences.
- the underlying communication system may e.g. be a CAN bus. This provides for transmission of dominant and recessive bits or correspondingly dominant and recessive signals, whereby a dominant signal or bit of a participant of the network intersperses against recessive signals or bits.
- a state corresponding to the recessive signal adjusts itself to the transmission medium only if all participants involved provide a recessive signal for transmission or if all participants transmitting at the same time transmit a recessive signal level.
- suitable cryptographic methods are usually used, which can generally be subdivided into two different categories: first, symmetric methods, in which the sender and receiver have the same cryptographic key, and, on the other hand, asymmetrical methods in which the sender uses the data to be transmitted is encrypted with the public (ie possibly also known to a potential attacker) key of the recipient, but the decryption can be done only with the associated private key, which is ideally known only to the recipient.
- asymmetric methods usually have a very high computational complexity.
- resource constrained nodes such as e.g. Sensors, actuators, or similar, suitable, which usually have only a relatively low computing power and low memory and energy-efficient work, for example due to battery operation or the use of energy harvesting.
- bandwidth available for data transmission making the replacement of asymmetric keys with lengths of 2048 bits or even more unattractive.
- the keys are generated centrally.
- the Assignment to individual control units takes place in a secure environment z. B. in the factory of the vehicle manufacturer. There, the keys are also activated.
- the non-prepublished DE 10 2015 207220 AI discloses a method for generating a shared secret or a secret symmetric key by means of public discussion between two communication participants.
- the presented methods for generating a secret or a cryptographic key do not require any manual intervention and thus enable the automated establishment of secure communication relationships between two nodes.
- the methods have a very low complexity, in particular with regard to the required hardware design, such. As the required memory resources and computing power, and they go with a low energy and time requirements.
- the methods offer very high key generation rates with a very low probability of error.
- the methods assume that participants in a network communicate with each other via a communication channel.
- they transfer logical sequences of values (in the case of binary logic, bit sequences) with the aid of physical signals on the transmission channel.
- logical sequences of values in the case of binary logic, bit sequences
- the transferred, logical value sequences as well as their logical overlay are considered.
- Subscribers of the network can thus give first signals (for example associated with logical bit "1") and second signals (associated, for example, with logical bit "0") to the communication channel and detect resulting signals on the communication channel. Now transmit two participants (largely) at the same time each one signal sequence, the participants can detect the resulting overlay on the communication channel.
- the effective signal resulting from the (largely) simultaneous transmission of two (independent) signals on the communication channel can then in turn be assigned to one (or more) specific logical values (or values).
- the transmission should be largely synchronous insofar as a superimposition of the individual signals of a signal sequence on the transmission medium takes place, in particular, that the signal corresponding to the n-th logical Value or bit of the first subscriber with the signal corresponding to the n-th logical value or bit of the second subscriber at least partially superimposed.
- This overlay should be sufficiently long for the participants to be able to record the overlay or determine the corresponding overlay value.
- the superimposition can be determined by arbitration mechanisms or by physical signal superposition.
- arbitration mechanism is meant, for example, the case that a node wants to apply a recessive level, but detects a dominant level on the bus and thus omits the transmission. In this case, there is no physical interference between two signals, but only the dominant signal is seen on the transmission channel.
- the participants can then generate a key that is secret to an outside attacker.
- the reason for this is that the outside attacker, who can listen to the effective overall signals applied to the shared transmission medium, sees only the superimposition of the value sequences, but does not have the information about the individual value sequences of the participants. Thus, the participants have more information that they can use against the attacker to generate a secret key.
- a new key in the sense of a one-time pad based on a new secret can be used for each message to be encrypted (or in general: every communication to be secured) and the encryption in particular by logical association (eg XOR linking) of the key with the to be encrypted message.
- logical association eg XOR linking
- Such a link can be implemented simply in terms of circuitry or in software, and the encryption or security does not require any complex, cryptographic calculations.
- this procedure also allows greater security than conventional block or stream ciphers, since each key is used only once.
- the described methods can be implemented particularly well in a CAN, TTCAN or CAN FD bus system.
- a recessive bus level is replaced by a dominant bus level.
- the superimposition of values or signals of the subscribers thus follows defined rules which the subscribers can use to derive information from the superimposed value or signal and the value or signal transmitted by them.
- the methods are also well suited for other communication systems such as LIN and I2C.
- a network or a participant of a network are set up to carry out the described methods in particular by having the corresponding electronic memory and computing resources.
- Also stored on a storage medium of such a user or on the distributed storage resources of a network may be a computer program configured to perform all the steps of a corresponding method when executed in the subscriber or in the network.
- Show 1 schematically shows the structure of an exemplary, underlying communication system
- FIG. 3 shows schematically exemplary signal sequences of two subscribers of a network as well as a resulting superposed value sequence on a transmission channel between the subscribers
- FIG. 4 schematically shows the sequence of an exemplary method for generating a key between two subscribers of a network.
- the present invention relates to a method for generating a shared secret or (secret) symmetric cryptographic key between two nodes of a communication system (participants of a network) communicating with each other via a shared medium (transmission channel of the network).
- the generation or negotiation of the cryptographic keys is based on a public data exchange between the two participants, although a possible listening third party as an attacker is not or only very difficult to draw conclusions about the generated key.
- it is thus possible to fully automatically and securely establish corresponding symmetrical cryptographic keys between two different subscribers of a network, in order then to implement certain security functions, such as eg data encryption, based thereon.
- a common secret is first established for this, which can be used to generate the key.
- such a shared secret can also be used for purposes other than cryptographic keys in the strict sense, for example as a one-time pad.
- the invention is suitable for a multiplicity of wired or wireless as well as optical networks or communication systems, in particular also those in which the various subscribers communicate with each other via a linear bus and the media access to this bus takes place by means of a bitwise bus arbitration.
- This principle represents, for example, the basis of the widespread CAN bus.
- Possible fields of application of the invention accordingly include, in particular, CAN-based vehicle networks as well as CAN-based networks in automation technology.
- the present invention describes an approach with which automatically symmetric cryptographic keys can be generated in one, or in particular between two nodes of a network. This generation takes place by exploiting properties of the corresponding transfer layer.
- Transmission medium a linear bus (wired or optical) 30, as shown by way of example in Fig. 2.
- the network 20 in FIG. 2 consists of just this linear bus 30 as a shared transmission medium (for example, as a wired transmission channel), nodes 21, 22 and 23, and (optional) bus terminations 31 and 32.
- on-off-keying on-off-keying amplitude shift keying
- a signal is transmitted, for example in the form of a simple carrier signal, in the other case (value 'Off' or '1') no signal is transmitted.
- the state ' ⁇ ' is dominant while the state 'Off' is recessive.
- Another example of a corresponding communication system that supports this distinction between dominant and recessive bits is a (wired or optical) system based on bitwise bus arbitration, such as that used in the CAN bus.
- the basic idea here is also that if, for example, two nodes want to transmit a signal at the same time and one node transmits a '1', whereas the second node transmits a '0' which 'gains' '0' (ie the dominant bit) ie, the signal level that can be measured on the bus corresponds to a logical '0' .
- This mechanism is used, in particular, for resolving potential collisions, whereby priority messages (ie messages with a previous, dominant signal level) are transmitted by When the node itself transmits a recessive bit but a dominant bit is detected on the bus, the corresponding node breaks its transmission attempt in favor of the higher priority message (with the earlier dominant bit).
- FIG. 3 shows, for example, how a subscriber 1 (T1) keeps the bit sequence 0, 1, 1, 0, 1 ready for transmission between the times t0 and t5 via the transmission channel. Subscriber 2 (T2) keeps the bit sequence 0, 1, 0, 1, 1 for transmission between times t0 and t5 over the transmission channel ready.
- bit string 0, 1, 0, 0, 1 will be seen on the bus (B) Only between times t1 and t2 and between t4 and t5, both subscriber 1 (T1) and subscriber 2 (T2) provide a recessive bit "1", so that only in this case does the logical AND operation result in a bit level of " 1 "on the bus (B) results.
- the process for generating a symmetric key pair is started in step 41 by one of the two nodes involved in this example (subscriber 1 and subscriber 2). This can be done, for example, by sending a special message or a special message header.
- Both Subscriber 1 and Subscriber 2 initially generate a bit sequence locally (i.e., internally and independently) in step 42.
- this bit sequence is at least twice, in particular at least three times as long as the common key desired as a result of the method.
- the bit sequence is preferably generated in each case as a random or pseudo-random bit sequence, for example with the aid of a suitable random number generator or pseudo random number generator.
- subscriber 1 and subscriber 2 transmit (largely) synchronously their respectively generated bit sequences over the divided transmission medium (using the transmission method with dominant and recessive bits, as already explained above).
- Different possibilities for synchronizing the corresponding transmissions are conceivable.
- either subscriber 1 or subscriber 2 could first send a suitable synchronization message to the respective other node and then start the transmission of the actual bit sequences after a certain period of time following the complete transmission of this message.
- bit sequences of a subscriber generated in step 42 can also be transmitted to several messages distributed in step 43, for example if this necessitates the (maximum) sizes of the corresponding messages.
- the transmission of the correspondingly large number of correspondingly large messages distributed bit sequences of the other subscriber takes place again (largely) synchronously.
- the two bit sequences then overlap, whereby due to the previously required property of the system with the distinction of dominant and recessive bits, the individual bits of subscriber 1 and subscriber 2 result in an overlay, in the example mentioned de facto AND-linked. This results in a corresponding overlay on the transmission channel, which could detect, for example, a listening third party.
- Both subscriber 1 and subscriber 2 detect during the transmission of their bit sequences of step 43 in a parallel step 44, the effective (overlaid) bit sequences S e ff on the shared transmission medium.
- the effective (overlaid) bit sequences S e ff on the shared transmission medium.
- this is usually done in conventional systems during the arbitration phase anyway.
- a node knows that the effective state is dominant on the shared medium if the node itself has sent a dominant bit, but if a node has sent a recessive bit, it does not know the state on the shared transmission medium first Further, however, in this case he can determine by suitable measurement how it looks like, because, in this case, the node itself does not send anything, so there are no problems with so-called self-interference, which is a complex echo cancellation, especially in the case of wireless systems would require.
- both subscriber 1 and subscriber 2 also again (largely) synchronously transmit their initial bit sequences STI and ST2, but this time inverted.
- the synchronization of the corresponding transmissions can again be realized exactly in the same way as described above.
- the two sequences are then ANDed together again.
- Subscribers 1 and 2 in turn determine the effective, superimposed bit sequences S e ff on the shared transmission medium.
- Both subscriber 1 and subscriber 2 determine during the transmission of their now inverted bit sequences then again the effective, superimposed bit sequences on the shared transmission medium.
- both nodes subscriber 1 and subscriber 2), as well as a possible attacker (eg subscriber 3) who overhears the communication on the shared transmission medium, thus know the effective, superimposed bit sequences S e ff and Seff '.
- participant 1 still knows his initially generated, local bit sequence STI and participant 2 his initially generated, local bit sequence ST2.
- subscriber 1 in turn does not know the initially generated, local bit sequence of subscriber 2 and subscriber 2 does not know the initially generated, local bit sequence of subscriber 1.
- the detection of the overlay bit sequence again takes place during the transmission in step 46.
- subscriber 1 and subscriber 2 can also send their inverted, local bit sequence directly with or directly after their original, local bit sequence, ie. Steps 45 and 46 are carried out with the steps 43 and 44.
- the original and the inverted bit sequence can be transmitted in a message, but also in separate messages as partial bit sequences.
- step 47 subscriber 1 and subscriber 2 now respectively locally (ie internally) link the effective, superposed bit sequences (S e ff and S e ff '), in particular with a logical OR function.
- the individual bits in the bit sequence (Sges) resulting from the OR operation now indicate whether the corresponding bits of STI and ST2 are identical or different. For example, if the nth bit within S tot is a '0', it means that the nth bit within STI is inverse to the corresponding one Bit within ST2 is. Likewise, if the nth bit within Sges is a '1', the corresponding bits within STI and ST2 are identical.
- Subscriber 1 and subscriber 2 then cancel in step 48 based on the bit sequence S ges obtained from the OR operation in their original, initial bit sequences STI and ST2 all bits which are identical in both sequences. This consequently leads to correspondingly shortened bit sequences.
- the thus shared, shortened bit sequence is now processed locally by participant 1 and participant 2 in step 49 in a suitable manner in order to generate the actual desired key of the desired length N.
- this treatment can be done.
- One possibility is to select N bits from the common truncated bit sequence, where it must be clearly defined which N bits are to be taken, eg simply by selecting the first N bits of the sequence.
- the rendering can be done with any linear and nonlinear function that returns a N bit length bit sequence when applied to the co-present truncated bit sequence.
- the mechanism of key generation from the co-present truncated bit sequence is preferably in both Participants 1 and 2 are identical and will be carried out in the same way.
- a checksum could be calculated using the generated keys and exchanged between subscribers 1 and 2. If both checksums are not identical, then obviously something has failed. In this case, the described method for key generation could be repeated.
- a whole series of resulting shortened bit sequences which are each present in the case of subscribers 1 and 2 can be generated, which are then combined into a single large sequence before the actual key is derived therefrom , If necessary, this can also be done adaptively. If after performing the described procedure once, e.g. For example, if the length of the common, truncated bit sequence is less than the desired key length N, one could re-run e.g. Generate further bits before the actual key derivation.
- the generated, symmetric key pair can now finally be used by subscriber 1 and subscriber 2 to secure a data communication.
- a potential attacker eg subscriber 3 can listen to the public data transmission between subscriber 1 and subscriber 2 and thus gain knowledge of the effective, superposed bit sequences (S e ff and S e ff ') as described. The attacker then only knows which bits in the locally generated bit sequences of nodes 1 and 2 are identical and which are not. In addition, with the identical bits, the attacker can even determine whether it is a '1' or a '0'. For a complete knowledge of the resulting, shortened bit sequence (and thus the basis for the key generation), however, he lacks the information about the non-identical bits. Around In addition, in a preferred variant, the bit values identical in the original, locally generated bit sequences of the users 1 and 2 are deleted in the attacker.
- participant 3 has only information that is not used for key generation. Although he knows that correspondingly shortened bit sequences emerge from the different between the local bit sequences of the participants 1 and 2 participants bits. However, he does not know which bits have been sent by subscriber 1 and subscriber 2 respectively. In addition to the information about the superimposed overall bit sequence, subscriber 1 and subscriber 2 also have the information about the locally generated bit sequence transmitted by them in each case. The fact that the keys generated in subscribers 1 and 2 remain secret as a basis, despite the public data transmission, results from this information advantage over a subscriber 3 following only the public data transmission.
- the one-time encryption is a symmetric, cryptographic encryption method, in particular for message transmission, in which a new key is used in each case for each new information to be encrypted (and in particular to be transmitted).
- the method is information-theoretically secure and can not be broken as long as each key is used only once, it is a random key, the key length is chosen at least as long as the length of the information to be encrypted, and the keys are kept secret. Should e.g. If a message is transmitted encrypted in the form of a bit sequence of a certain length, the key for secure encryption by means of one-time encryption is a bit or value sequence of at least the same length.
- the secret generated as a value sequence from the methods described above, but also a derived bit or value sequence be used (which corresponds to a part of the secret, for example).
- the encryption is then preferably carried out by logical link between the key and information to be encrypted, for example by an XOR linkage of bit sequences.
- a new one-time key based on a secret generated by the methods described is generated before each secure message or data sequence to be transmitted (or more generally: communication) and used for the protection.
- a particular number of keys may be derived and stored from one or more secrets generated by the methods described above. Each of the stored keys can then be used once as a disposable key.
- the one-time key may be obtained by mapping the secret using a suitable function.
- the length of the disposable key may be larger, smaller, or equal to the length of the secret. It is also possible to select a one-time key which is shorter than a data sequence to be secured with it, e.g. by repeatedly or multiply the disposable key or by increasing the length of the disposable key by a figure.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Small-Scale Networks (AREA)
Abstract
L'invention concerne un procédé permettant de générer un élément secret dans un premier abonné de réseau, selon lequel le premier abonné de réseau déclenche sur un canal de transmission une transmission d'au moins une première série de valeurs au moins partiellement synchronisée par rapport à une transmission d'au moins une seconde série de valeurs par un second abonné de réseau sur le canal de transmission Le premier abonné de réseau détermine l'élément secret sur la base de la ou des premières séries de valeurs et sur la base d'une superposition de la ou des premières séries de valeurs et de la ou des secondes séries de valeurs sur le canal de transmission. La communication du premier abonné de réseau est sécurisée par un chiffrement à usage unique basé sur l'élément secret.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
DE102015220026.4A DE102015220026A1 (de) | 2015-10-15 | 2015-10-15 | Verfahren zur Erzeugung eines Geheimnisses für eine Einmalverschlüsselung in einem Netzwerk |
DE102015220026.4 | 2015-10-15 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2017064129A1 true WO2017064129A1 (fr) | 2017-04-20 |
Family
ID=57130388
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/EP2016/074489 WO2017064129A1 (fr) | 2015-10-15 | 2016-10-12 | Procédé permettant de générer un élément secret pour un chiffrement à usage unique dans un réseau |
Country Status (2)
Country | Link |
---|---|
DE (1) | DE102015220026A1 (fr) |
WO (1) | WO2017064129A1 (fr) |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
DE102009002396A1 (de) | 2009-04-15 | 2010-10-21 | Robert Bosch Gmbh | Verfahren zum Manipulationsschutz eines Sensors und von Sensordaten des Sensors und einen Sensor hierzu |
DE102009045133A1 (de) | 2009-09-29 | 2011-03-31 | Robert Bosch Gmbh | Verfahren zum Manipulationsschutz von Sensordaten und Sensor hierzu |
DE102012215326A1 (de) * | 2012-08-29 | 2014-03-06 | Robert Bosch Gmbh | Verfahren und Vorrichtung zur Ermittlung eines kryptografischen Schlüssels in einem Netzwerk |
DE102015207220A1 (de) | 2014-04-28 | 2015-10-29 | Robert Bosch Gmbh | Verfahren zur Erzeugung eines Geheimnisses oder eines Schlüssels in einem Netzwerk |
DE102014209042A1 (de) | 2014-05-13 | 2015-11-19 | Robert Bosch Gmbh | Verfahren und Vorrichtung zum Erzeugen eines geheimen Schlüssels |
DE102014208975A1 (de) | 2014-05-13 | 2015-11-19 | Robert Bosch Gmbh | Verfahren zur Generierung eines Schlüssels in einem Netzwerk sowie Teilnehmer an einem Netzwerk und Netzwerk |
-
2015
- 2015-10-15 DE DE102015220026.4A patent/DE102015220026A1/de active Pending
-
2016
- 2016-10-12 WO PCT/EP2016/074489 patent/WO2017064129A1/fr active Application Filing
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
DE102009002396A1 (de) | 2009-04-15 | 2010-10-21 | Robert Bosch Gmbh | Verfahren zum Manipulationsschutz eines Sensors und von Sensordaten des Sensors und einen Sensor hierzu |
DE102009045133A1 (de) | 2009-09-29 | 2011-03-31 | Robert Bosch Gmbh | Verfahren zum Manipulationsschutz von Sensordaten und Sensor hierzu |
DE102012215326A1 (de) * | 2012-08-29 | 2014-03-06 | Robert Bosch Gmbh | Verfahren und Vorrichtung zur Ermittlung eines kryptografischen Schlüssels in einem Netzwerk |
DE102015207220A1 (de) | 2014-04-28 | 2015-10-29 | Robert Bosch Gmbh | Verfahren zur Erzeugung eines Geheimnisses oder eines Schlüssels in einem Netzwerk |
DE102014209042A1 (de) | 2014-05-13 | 2015-11-19 | Robert Bosch Gmbh | Verfahren und Vorrichtung zum Erzeugen eines geheimen Schlüssels |
DE102014208975A1 (de) | 2014-05-13 | 2015-11-19 | Robert Bosch Gmbh | Verfahren zur Generierung eines Schlüssels in einem Netzwerk sowie Teilnehmer an einem Netzwerk und Netzwerk |
Non-Patent Citations (4)
Title |
---|
"BOSCH CAN SPECIFICATION VERSION 2.0", BOSCH CAN SPECIFICATION VERSION 2.0, XX, XX, 1 September 1991 (1991-09-01), pages 1 - 69, XP002291910 * |
"Road vehicles ? Controller area network (CAN) ? Part 1: Data link layer and physical signalling ; ISO+11898-1-2003", IEEE DRAFT; ISO+11898-1-2003, IEEE-SA, PISCATAWAY, NJ USA, vol. msc.upamd, 18 November 2010 (2010-11-18), pages 1 - 52, XP017637056 * |
K. V. O. RABAH: "Implementation of One-Time Pad Cryptography", INFORMATION TECHNOLOGY JOURNAL, vol. 4, no. 1, 1 January 2005 (2005-01-01), pages 87 - 95, XP055022097 * |
MARIUSZ BOROWSKI ET AL: "Modern usage of old one-time pad", COMMUNICATIONS AND INFORMATION SYSTEMS CONFERENCE (MCC), 2012 MILITARY, IEEE, 8 October 2012 (2012-10-08), pages 1 - 5, XP032282106, ISBN: 978-1-4673-1422-0 * |
Also Published As
Publication number | Publication date |
---|---|
DE102015220026A1 (de) | 2017-04-20 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP3138258B1 (fr) | Procédé de génération d'un secret ou d'une clé dans un réseau | |
DE102015220038A1 (de) | Verfahren zur Erzeugung eines Geheimnisses oder Schlüssels in einem Netzwerk | |
DE102016208451A1 (de) | Verfahren zur Erzeugung eines Geheimnisses oder eines Schlüssels in einem Netzwerk | |
EP3363145B1 (fr) | Procédé et dispositif permettant de générer un secret partagé | |
WO2016188667A1 (fr) | Procédé pour générer un élément secret ou une clé dans un réseau | |
WO2017064124A1 (fr) | Agencement de circuits de génération d'un secret ou d'une clé dans un réseau | |
EP3363146B1 (fr) | Procédé de génération d'une clé dans un agencement de circuits | |
WO2017064027A1 (fr) | Procédé de génération d'un élément secret ou d'une clé dans un réseau | |
WO2017064129A1 (fr) | Procédé permettant de générer un élément secret pour un chiffrement à usage unique dans un réseau | |
WO2017064075A1 (fr) | Agencement de circuits pour la génération d'un secret ou d'une clé dans un réseau | |
WO2017064125A1 (fr) | Procédé permettant de générer un élément secret ou une clé dans un réseau | |
WO2017064067A1 (fr) | Procédé pour générer une clé dans un réseau et pour activer une sécurisation d'une communication dans le réseau sur la base de la clé | |
WO2017064131A1 (fr) | Procédé permettant de générer un élément secret ou une clé dans un réseau | |
DE102016208453A1 (de) | Verfahren zur Erzeugung eines Geheimnisses oder eines Schlüssels in einem Netzwerk | |
WO2017064025A1 (fr) | Procédé de génération d'un élément secret ou d'une clé dans un réseau | |
EP3363144B1 (fr) | Procédé et dispositif permettant d'établir un secret partagé | |
WO2017064002A1 (fr) | Procédé et dispositif permettant de générer un secret partagé | |
DE102016208452A1 (de) | Verfahren zur Erzeugung eines Geheimnisses oder eines Schlüssels in einem Netzwerk | |
DE102016208448A1 (de) | Verfahren zur Erzeugung eines Geheimnisses oder eines Schlüssels in einem Netzwerk | |
WO2017064006A1 (fr) | Procédé et dispositif permettant de générer une clé partagée dans un système de bus de terrain | |
DE102016208442A1 (de) | Verfahren zur Erzeugung eines Geheimnisses oder eines Schlüssels in einem Netzwerk | |
DE102016208444A1 (de) | Verfahren zur Erzeugung eines Geheimnisses oder eines Schlüssels in einem Netzwerk | |
DE102016208449A1 (de) | Verfahren zur Erzeugung eines Geheimnisses oder eines Schlüssels in einem Netzwerk | |
DE102015219993A1 (de) | Verfahren und Vorrichtung zum Erzeugen eines gemeinsamen Geheimnisses vorgegebener Länge |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 16781116 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 16781116 Country of ref document: EP Kind code of ref document: A1 |