Cryptographic method for key agreement and user authentication

Cryptography – Particular algorithmic function encoding – Public key

Patent

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

380 21, 380 23, 380 49, 379 95, 34082531, 34082534, H04L 930, H04L 908

Patent

active

052221407

ABSTRACT:
Protocols for session key agreement and authentication in a communication system such as a portable communication system make use of public key cryptographic techniques. The protocols of the present invention are especially suited for use in a portable communication system because portable telephones are required by the inventive protocols to perform only a minimal amount of processing, while assigning the heavier computations to the network. The inventive protocols also authenticate the weaker (i.e. portable) side. The protocols also ensure that a third party cannot trace the location of a user by eavesdropping on a radio signal transmitted by a portable telephone.

REFERENCES:
patent: 4912762 (1990-03-01), Lee et al.
patent: 4956863 (1990-09-01), Goss
"Encryption Algorithm For Computer Data Protection", Federal Register, Part I, (vol. 40, No. 52; Mar. 17, 1975).
A. Shimizu et al., "Feal-Fast Data Encipherment Algorithm," Systems and Computers in Japan, 1988, vol. 19, No. 7., pp. 20-34.
S. Miyaguchi, "The Feal Cipher Family," Proceedings of CRYPTO '90, 1990, Santa Barbara, CA, pp. 1-12.
H. C. Williams, "A Modification of RSA Public-Key Encryption," IEEE Transaction on Information Theory, Nov. 1980, vol. IT-26, No. 6, pp. 726-729.
M. O. Rabin, "Digitalized Signatures and Public Key Functions as Intractable as Factorization," MIT Laboratory for Computer Science, Jan. 1979, TR 212, pp. 1-16.
Z. Shmuely, "Composite Diffie-Hellman Public Key Generating Schemes Are Hard To Break," Computer Science Department of Technion, Feb. 1985, Israel, TR 356, pp. 1-18.
K. S. McCurley, "A Key Distribution System Equivalent to Factoring," Journal of Cryptology, 1988, vol. 1, No. 2, pp. 95-105.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Cryptographic method for key agreement and user authentication does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Cryptographic method for key agreement and user authentication, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Cryptographic method for key agreement and user authentication will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-1445573

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.