Cryptography – Key management – Having particular key generator
Patent
1990-05-07
1991-05-14
Tarcza, Thomas H.
Cryptography
Key management
Having particular key generator
380 44, 380 47, H04L 902
Patent
active
050162764
ABSTRACT:
A system for generating a cryptokey (k) to be shared among entities (A, B) engaged in communications, in particular one known as the key predistribution system. Indentifiers (y.sub.A, y.sub.S) for the entities engaging in communications under a center and a center algorithm (G) which only the center knows are generated, then secret algorithms (x.sub.A, X.sub.B) distinct to each entity are generated on added to IC cards or other cipher generation means (2, 3). A cipher generation means (2, 3) is provided for each entity. The identifiers (y.sub.B, y.sub.A) of the other entity are applied to compute a cryptokey, whereby a common cryptokey is generated.
Also disclosed is a system for communications using the above shared cryptokey.
REFERENCES:
patent: 3962539 (1976-06-01), Ehrsam et al.
patent: 4386233 (1983-05-01), Smid et al.
patent: 4438824 (1984-05-01), Mueller-Schloer
patent: 4458109 (1984-07-01), Mueller-Schloer
patent: 4484025 (1984-11-01), Ostermann et al.
patent: 4578530 (1986-03-01), Zeidler
patent: 4656474 (1987-04-01), Mollier et al.
R. Blom, "An Optimal Class of Symmetric Key Generation Systems," Lecture Notes in Computer Science, Advances in Cryptology, 1985, pp. 335-338.
R. Blom, "Non-Public Key Distribution," Advances in Cryptology, Proceedings of Crypto 82, Plenum Press, New York, N.Y., 1983, pp. 231-236.
B. Schanning, "Data Encryption with Public Key Distribution," Eascon '79 Record, vol. 3, IEEE Publication 79CH 1476-1 AES, pp. 653-660.
Japanese Patent Document No. 61-166240 (Appl. No. 60-56750), published on Jul. 26, 1986, Patent Abstracts of Japan, vol. 10, No. 370, Dec. 10, 1986.
Imai et al., "Cryptography," Journal of the Television Society, vol. 39, No. 12 (1985), pp. 1140-1147.
A. G. Konheim, Cryptography, A Primer, John Wiley & Sons, New York, 1981, pp. 285-293.
C. H. Meyer et al., Crytography: A New Dimension in Computer Data Security, John Wiley & Sons, New York, 1982, pp. 300-330.
D. E. Denning, Cryptography and Data Security, Addison-Wesley Publishing Company, Reading, Mass., 1982, pp. 173-179.
D. W. Davies et al., Security for Computer Networks, John Wiley & Sons, New York, 1984, pp. 156-168 and 231-233.
Matsumoto et al., "Asymmetric Cryptosystems Using Obscure Expressions in Ciphering Conversion," Papers of 1983 National Conference of Systems Division of Society of Electrical Communications, Sep., 1983, No. S8-5, pp. 1-469 to 1-470.
Matsumoto et al., "On Multivariate Polynomial Tuple Asymmetric Cryptosystems," Feb. 7, 1986, 1986 Code and Data Security Symposium Materials E2, Code and Data Security Research Conference, Special Committee on Data Security of Society of Electronic Communications.
Matsumoto et al., "A Cryptographically Useful Theorum on the Connection Between Uni and Multivariate Polynomials," The Transactions of the IECE of Japan, vol. E68, No. 3, Mar. 1985, pp. 138-146.
Imai et al., "Algebraic Methods for Constructing Asymmetric Cryptosystems," Third International Conference on Applied Algebra, Algebraic Algorithms and Symbolic Computation, Error Correcting Codes, Jul. 15-19, 1985, Grenoble, France, pp. 108-119.
Koh et al., Coding Theory, Corona Publishing Company, Ltd., Tokyo, Japan, 1975, pp. 108-110.
Imai Hideki
Matumoto Tutomu
Kabushiki Kaisha Advance
Swann Tod
Tarcza Thomas H.
LandOfFree
Common cryptokey generation system and communication system usin does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Common cryptokey generation system and communication system usin, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Common cryptokey generation system and communication system usin will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-1654546