Cryptography – Key management – Key distribution
Reexamination Certificate
2007-02-20
2007-02-20
Moise, Emmanuel L. (Department: 2137)
Cryptography
Key management
Key distribution
Reexamination Certificate
active
09921231
ABSTRACT:
One embodiment of the present invention provides a system for establishing a shared cryptographic key between participating nodes in a network. The system operates by sending a first message from the first node to the second node requesting establishment of a shared key. The second node sends a second message containing identifiers and a message authentication code to a key distribution center (KDC). The authentication code is generated using a second node key belonging to the second node. The KDC recreates the previously created second node key using the second node identifier and a secret key known only to the key distribution center. The KDC then verifies the message authentication code using the second node key. If the message authentication code is verified, the KDC creates a shared key for the nodes to use while communicating with each other. The KDC securely communicates this shared key to the participating nodes
REFERENCES:
patent: 4386233 (1983-05-01), Smid et al.
patent: 5276735 (1994-01-01), Boebert et al.
patent: 5491750 (1996-02-01), Bellare et al.
patent: 5539824 (1996-07-01), Bjorklund et al.
patent: 5864667 (1999-01-01), Barkan
Menezes, Alfred, et al. Handbook of Applied Cryptography. CRC Press, 1997. pp. 33, 321-331, 352-368, 497-504.
Schneier, Bruce. Applied Cryptography, second Edition: Protocols, Algorithms, and Source Code in C. John Wiley & Sons, 1996. pp. 30-31, 47-65, 115, 429-431, 455-459.
Shamir, Adi. “Identity-Based Cryptosystems and Signature Signature Schemes”. CRYPTO '84, LNCS 196, pp. 47-53, 1985.
Gunther, Christoph. “An Identity-Based Key-Exchange Protocol”. EUROCRYPT '89, LNCS 434, pp. 29-37, 1990.
Miller, Newman, Schiller & Saltzer, “Kerberos Authentication and Authorization System” Project Athena Technical Plan, 1987.
J. Klohl and C. Newman, “The Kerberos Network Authentication Service (V5)” Network Working Group, Sep. 1993.
Otway and Ress, “Efficient and Timely Mutual Authentication” The ANSA Project.
Brandstad ed. “Computer Security and the Data Encryption Standard” National bureau of Standards, Feb. 1978.
Davis and Swick, “Network Security via Private Key Certificates” MIT Project Athena: Operating Systems Review, 1990.
Davis Zachary A.
Hamaty Christopher J.
McAfee, Inc.
Moise Emmanuel L.
LandOfFree
Method and apparatus for cryptographic key establishment... does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Method and apparatus for cryptographic key establishment..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method and apparatus for cryptographic key establishment... will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3880075