ZA201409419B - Determination of cryptographic keys - Google Patents
Determination of cryptographic keysInfo
- Publication number
- ZA201409419B ZA201409419B ZA2014/09419A ZA201409419A ZA201409419B ZA 201409419 B ZA201409419 B ZA 201409419B ZA 2014/09419 A ZA2014/09419 A ZA 2014/09419A ZA 201409419 A ZA201409419 A ZA 201409419A ZA 201409419 B ZA201409419 B ZA 201409419B
- Authority
- ZA
- South Africa
- Prior art keywords
- determination
- cryptographic keys
- cryptographic
- keys
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0838—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
- H04L9/0847—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving identity based encryption [IBE] schemes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/14—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
- H04L9/16—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms the keys or algorithms being changed during operation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
- H04L9/3093—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving Lattices or polynomial equations, e.g. NTRU scheme
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/24—Key scheduling, i.e. generating round keys or sub-keys for block encryption
Landscapes
- Engineering & Computer Science (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Computer Security & Cryptography (AREA)
- Mathematical Optimization (AREA)
- Mathematical Physics (AREA)
- Pure & Applied Mathematics (AREA)
- Physics & Mathematics (AREA)
- Computing Systems (AREA)
- Theoretical Computer Science (AREA)
- Mathematical Analysis (AREA)
- General Physics & Mathematics (AREA)
- Algebra (AREA)
- Telephonic Communication Services (AREA)
- Mobile Radio Communication Systems (AREA)
- Storage Device Security (AREA)
- Lock And Its Accessories (AREA)
Applications Claiming Priority (4)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US201261649464P | 2012-05-21 | 2012-05-21 | |
| US201261732997P | 2012-12-04 | 2012-12-04 | |
| EP12196092 | 2012-12-07 | ||
| PCT/IB2013/053224 WO2013175324A1 (en) | 2012-05-21 | 2013-04-24 | Determination of cryptographic keys |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| ZA201409419B true ZA201409419B (en) | 2016-09-28 |
Family
ID=47435744
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| ZA2014/09419A ZA201409419B (en) | 2012-05-21 | 2014-12-19 | Determination of cryptographic keys |
Country Status (9)
| Country | Link |
|---|---|
| US (1) | US20150134960A1 (enExample) |
| EP (1) | EP2853058A1 (enExample) |
| JP (1) | JP2015521003A (enExample) |
| CN (1) | CN104303450A (enExample) |
| BR (1) | BR112014028757A2 (enExample) |
| MX (1) | MX340269B (enExample) |
| RU (1) | RU2014151791A (enExample) |
| WO (1) | WO2013175324A1 (enExample) |
| ZA (1) | ZA201409419B (enExample) |
Families Citing this family (10)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US10359996B2 (en) * | 2013-02-28 | 2019-07-23 | Koninklijke Philips N.V. | Random number generator and stream cipher |
| SE538279C2 (sv) | 2014-09-23 | 2016-04-19 | Kelisec Ab | Förfarande och system för att fastställa förekomst av |
| SE540133C2 (en) | 2014-10-09 | 2018-04-10 | Kelisec Ab | Improved system for establishing a secure communication channel |
| SE538304C2 (sv) | 2014-10-09 | 2016-05-03 | Kelisec Ab | Improved installation of a terminal in a secure system |
| SE539271C2 (en) | 2014-10-09 | 2017-06-07 | Kelisec Ab | Mutual authentication |
| SE542460C2 (en) | 2014-10-09 | 2020-05-12 | Kelisec Ab | Improved security through authenticaton tokens |
| US11088834B2 (en) * | 2015-04-28 | 2021-08-10 | Palo Alto Research Center Incorporated | System for privacy-preserving monetization of big data and method for using the same |
| KR20230050464A (ko) * | 2020-08-19 | 2023-04-14 | 에스엔투엔, 엘엘씨 | 알려진 사용자 사이의 보안 통신 |
| JP2022091498A (ja) | 2020-12-09 | 2022-06-21 | セイコーエプソン株式会社 | 暗号通信システム、暗号通信方法および暗号通信装置 |
| CN113965325B (zh) * | 2021-10-20 | 2023-07-25 | 成都卫士通信息产业股份有限公司 | 数据传输认证方法、装置、电子设备及计算机存储介质 |
Family Cites Families (8)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| JPH10164047A (ja) * | 1996-11-29 | 1998-06-19 | Oki Electric Ind Co Ltd | 暗号通信システム |
| US6754820B1 (en) * | 2001-01-30 | 2004-06-22 | Tecsec, Inc. | Multiple level access system |
| JP3464153B2 (ja) * | 1998-09-16 | 2003-11-05 | 村田機械株式会社 | 暗号通信方法及び暗号通信システム |
| US20050265550A1 (en) * | 2002-03-13 | 2005-12-01 | Koninklijke Philips Electronics N.V. | Polynomial-based multi-user key generation and authentication method and system |
| US8379867B2 (en) * | 2007-09-24 | 2013-02-19 | Mymail Technology, Llc | Secure email communication system |
| WO2010041164A2 (en) * | 2008-10-06 | 2010-04-15 | Philips Intellectual Property & Standards Gmbh | A method for operating a network, a system management device, a network and a computer program therefor |
| CN101977198B (zh) * | 2010-10-29 | 2013-09-25 | 西安电子科技大学 | 域间认证及密钥协商方法 |
| FR3015080B1 (fr) * | 2013-12-17 | 2016-01-22 | Oberthur Technologies | Verification d'integrite de paire de cles cryptographiques |
-
2013
- 2013-04-24 EP EP13727992.3A patent/EP2853058A1/en not_active Withdrawn
- 2013-04-24 MX MX2014014004A patent/MX340269B/es active IP Right Grant
- 2013-04-24 US US14/400,572 patent/US20150134960A1/en not_active Abandoned
- 2013-04-24 RU RU2014151791A patent/RU2014151791A/ru not_active Application Discontinuation
- 2013-04-24 BR BR112014028757A patent/BR112014028757A2/pt not_active IP Right Cessation
- 2013-04-24 JP JP2015513298A patent/JP2015521003A/ja active Pending
- 2013-04-24 CN CN201380026604.7A patent/CN104303450A/zh active Pending
- 2013-04-24 WO PCT/IB2013/053224 patent/WO2013175324A1/en not_active Ceased
-
2014
- 2014-12-19 ZA ZA2014/09419A patent/ZA201409419B/en unknown
Also Published As
| Publication number | Publication date |
|---|---|
| CN104303450A (zh) | 2015-01-21 |
| US20150134960A1 (en) | 2015-05-14 |
| MX340269B (es) | 2016-07-04 |
| JP2015521003A (ja) | 2015-07-23 |
| MX2014014004A (es) | 2015-02-10 |
| EP2853058A1 (en) | 2015-04-01 |
| RU2014151791A (ru) | 2016-07-20 |
| WO2013175324A1 (en) | 2013-11-28 |
| BR112014028757A2 (pt) | 2017-06-27 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| AP2014007430A0 (en) | cryptographic | |
| EP2834943A4 (en) | CRYPTOGRAPHIC HASH DATABASE | |
| ZA201409419B (en) | Determination of cryptographic keys | |
| GB2486461B (en) | Key derivation | |
| PL2628572T3 (pl) | Dłuto | |
| EP2608162A4 (en) | KEYBOARD CRYPTÉ ANTI-ESPIONAGE | |
| GB201503191D0 (en) | Secure gesture | |
| IL238978A0 (en) | Social verification | |
| GB2502677B (en) | Security | |
| GB201208290D0 (en) | Saco | |
| EP2610822A4 (en) | KEYBOARD FITTED ANTI-ESPIONAGE | |
| PL2634333T3 (pl) | Zamek | |
| GB2500883B (en) | Improved saw-horse | |
| PL2817798T3 (pl) | Instrument klawiszowy | |
| EP2914176A4 (en) | PROSTATE GLOVE | |
| GB201216962D0 (en) | Key mechanism | |
| IL217478A0 (en) | Anonymous authentication | |
| PL2719849T3 (pl) | Zamek | |
| GB201320378D0 (en) | Key store | |
| GB201200121D0 (en) | Key+ | |
| GB201202038D0 (en) | Key holder | |
| GB201207952D0 (en) | Restriction enzymes | |
| GB201201605D0 (en) | Bricks | |
| GB201217092D0 (en) | Instruments | |
| AU345804S (en) | Key support |