Method and apparatus for asymetric key management in a cryptogra

Cryptography – Key management – Key distribution

Patent

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

380232, 380273, 380277, 380281, 705 66, 705 71, 713169, 713171, H04K 100

Patent

active

061283916

ABSTRACT:
A method and apparatus for asymmetrical key management in a cryptographic system is provided. Embodiments of the invention implement varying levels of diversification to manage the encryption keys. In one embodiment, a unique key per device approach is used that minimizes the risks due to unauthorized key access. In yet another embodiment, a unique key per device per transaction is used. The keys generated in embodiments of the invention can be used to authenticate one device with another. An authenticating device generates a current key that is initially unknown to an unauthenticated device. The authenticating device sends information to an unauthenticated device to assist it in determining the value of the current key. The unauthenticated device uses the determined value of the current key to derive the authenticating device's authentication value. Each device generates a authentication value that must be correctly determined by an unauthenticated device for successful authentication. Authentication is performed between two devices such that each device is authenticated with the other device. Computing devices of a system can be grouped. In one embodiment devices are grouped such that one group includes devices that have a master key and another group includes devices that have a key that is derived from the master key. Another embodiment includes groups whose devices have the group's master key and a key derived from each of the master keys of the other group(s). In this embodiment, a dual authentication process can be used to authenticate two devices from different groups.

REFERENCES:
patent: 4471216 (1984-09-01), Herve
patent: 4605820 (1986-08-01), Campbell
patent: 4811393 (1989-03-01), Hazard
patent: 4961142 (1990-10-01), Elliott et al.
patent: 5036461 (1991-07-01), Elliott et al.
patent: 5175416 (1992-12-01), Mansvelt et al.
patent: 5446796 (1995-08-01), Ishiguro
patent: 5559887 (1996-09-01), Davis et al.
patent: 5577121 (1996-11-01), Davis et al.
patent: 5602917 (1997-02-01), Mueller
patent: 5729609 (1998-03-01), Moulart
patent: 5745576 (1998-04-01), Abraham
Schneier B, "Applied Cryptography" Protocols, Algorithms and Source Code in C, Second Edition; Chapter 12, Data Encryption Standard (DES); John Wiley & Sons, New York, 1996.
"Financial Services Retail Key Management," American National Standards Institute, ANSI/ABA X9.24-19, pp. 36-50, Apr. 6, 1992.
Hellman, Martin E., "The Mathematics of Public-Key Cryptography, " Scientific American, pp. 146-157, Aug. 1979.
Fiestel, Horst, "Crytography and Computer Privacy," Scientific American, vol. 238, No. 5, pp. 15-23, May 1973.
Naccache, David, et al., "Cryptograhic Smart Cards, " IEEE Micro 1996, vol. 16, No. 3, pp. 14-24, Jun. 1996.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Method and apparatus for asymetric key management in a cryptogra does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Method and apparatus for asymetric key management in a cryptogra, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method and apparatus for asymetric key management in a cryptogra will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-202916

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.