Computer system for securing communications using split private

Cryptography – Particular algorithmic function encoding – Nbs/des algorithm

Patent

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

380 30, H04K 100

Patent

active

057374198

ABSTRACT:
A programmed computer secures communications between users of a crypto-system in which each user has an associated asymmetric crypto-key with a public key portion accessible to all system users and a corresponding private key portion having a first private key portion known only to the associated user and a corresponding second private key portion. The computer includes a processor programmed to generate a temporary asymmetric crypto-key having a first temporary key portion and an associated second temporary key portion. The computer then encrypts the second temporary key portion with the first private key portion of a first user crypto-key associated with a first user to form a first encrypted message. The processor directs the issuance of the first encrypted message to a second user having access to the second private key portion of the first user crypto-key. The processor next applies the public key portion of the first user crypto-key to decrypt a second encrypted message generated by the second user, which includes the first encrypted message encrypted with the second private key portion of the first user crypto-key, to thereby authenticate the second user to the first user. The computer also includes a storage medium for storing the first temporary key portion, and the public key portion of the first user crypto-key.

REFERENCES:
patent: 4200770 (1980-04-01), Hellman et al.
patent: 4218582 (1980-08-01), Hellman et al.
patent: 4405829 (1983-09-01), Rivest et al.
patent: 4424414 (1984-01-01), Hellman et al.
patent: 4736423 (1988-04-01), Matyas
patent: 4995082 (1991-02-01), Schnorr
patent: 5276737 (1994-01-01), Micali
patent: 5299263 (1994-03-01), Beller et al.
patent: 5375169 (1994-12-01), Seheidt et al.
C. Boyd, Cryptography and Coding: "Digital Multisignatures", 15-17 Dec. 1986, pp. 241-246.
Kohl, John et al., "The Kerberos.TM. Network Authentication Service (V5), Internet-Draft, Sep. 1, 1992, pp. 1-69.
Bellovin, Steven M. et al., "Encrypted Key Exchange: Passwork-Based Protocols Secure Against Dictionary Attacks", IEE, 1992, pp. 72-84.
Schneier, B., "Applied Cryptography, Protocols, Algorithms and Source Code in C", pp. 428-436, John Wiley & Sons, NY 1994 (re Kent, S., Privacy Enhancement for Internet Electronic Mail: Part II: Certificate Based Key Management, Internet RFC 1422, Feb. 1993).
Schneier, B., "Applied Cryptography, Protocols, Algorithms and Source Code In C", p. 424, John Wiley & Sons, NY 1994 (re Kohl, J.T., The Evolution of the Kerberos Authentication Service, EurOpen Conference Proceedings, May 1991).
Schneier, B., "Applied Cryptography", Wiley & Sons, 1994, Sections 3.4 and 16.3 and p. 576. Multiple Key Public Key.
R.L. Rivest, A. Shamir & L. Adleman, "A Method for Obtaining Digital Signatures and Public-key Cryptosystems, CACM, vol. 21, pp. 120-126, Feb. 1978.
M.J. Wiener "Cryptoanalysis of Short RSA Secret Exponents", IEEE Transaction on Information Theory, vol. 36, No. 3, pp. 553-558.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Computer system for securing communications using split private does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Computer system for securing communications using split private , we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Computer system for securing communications using split private will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-21042

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.