System and method for key escrow encryption

Cryptography – Particular algorithmic function encoding – Nbs/des algorithm

Patent

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

380 30, H04L 908

Patent

active

055573460

ABSTRACT:
A system and method for key escrow cryptography for use in a system comprising a sender and a receiver. Only public escrow keys are stored in the sender and the receiver. The sender encrypts a message using a secret session key (KS), and generates a leaf verification string (LVS) by combining an unique program identifier (UIP), a public portion of a program unique key (KUpub), and a signature. The sender encrypts the KS using the KUpub to generate a first encrypted session key (EKS), and generates a first law enforcement access field (LEAF) by encrypting a combination of the first EKS and the UIP with a copy of a public portion of a family key (KFpub) stored in the sender. The encrypted message, the LVS, and the first LEAF are transmitted from the sender to the receiver. The receiver stores therein a public portion of the KEPF key (KEPFpub). The receiver extracts the UIP, KUpub, and the signature from the LVS, and then encrypts the KS using the extracted KUpub to generate a second encrypted session key (EKS). The receiver generates a second LEAF by encrypting a combination of the second EKS and the extracted UIP with a copy of the KFpub stored in the receiver. The receiver then compares the first LEAF to the second LEAF. If the first LEAF is equal to the second LEAF, then the receiver decrypts the encrypted message using the KS.

REFERENCES:
patent: 5276737 (1994-01-01), Micali
patent: 5315658 (1994-05-01), Micali
Computer Systems Laboratory, National Institute of Standards and Technology, Gaithersburg, MD, "Escrowed Encryption Standard (EES)", Federal Information Processing Standards Publication, FIPS PUB 185, Feb. 9, 1994.
Dorothy Denning, "The Clipper Chip: A Technical Summary", Revised Apr. 21, 1993.
Dorothy Denning, "The Clipper Chip: A Technical Summary", Apr. 19, 1993.
L. Harn and H. Y. Lin, "Integration of user authentication and access control", IEEE Proceedings-E, vol. 139, No. 2, pp. 139-143, Mar., 1992.
Brickell et al., "Skipjack Review: Interim Report: The Skipjack Algorithm", Georgetown University, Office of Public Affairs, pp. 1-6, Jul. 28, 1993.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

System and method for key escrow encryption does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with System and method for key escrow encryption, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and System and method for key escrow encryption will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-416752

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.