Cryptography – Particular algorithmic function encoding – Public key
Patent
1991-11-08
1993-06-22
Gregory, Bernarr E.
Cryptography
Particular algorithmic function encoding
Public key
380 21, 380 23, 380 49, 379 95, 34082531, 34082534, H04L 930, H04L 908
Patent
active
052221407
ABSTRACT:
Protocols for session key agreement and authentication in a communication system such as a portable communication system make use of public key cryptographic techniques. The protocols of the present invention are especially suited for use in a portable communication system because portable telephones are required by the inventive protocols to perform only a minimal amount of processing, while assigning the heavier computations to the network. The inventive protocols also authenticate the weaker (i.e. portable) side. The protocols also ensure that a third party cannot trace the location of a user by eavesdropping on a radio signal transmitted by a portable telephone.
REFERENCES:
patent: 4912762 (1990-03-01), Lee et al.
patent: 4956863 (1990-09-01), Goss
"Encryption Algorithm For Computer Data Protection", Federal Register, Part I, (vol. 40, No. 52; Mar. 17, 1975).
A. Shimizu et al., "Feal-Fast Data Encipherment Algorithm," Systems and Computers in Japan, 1988, vol. 19, No. 7., pp. 20-34.
S. Miyaguchi, "The Feal Cipher Family," Proceedings of CRYPTO '90, 1990, Santa Barbara, CA, pp. 1-12.
H. C. Williams, "A Modification of RSA Public-Key Encryption," IEEE Transaction on Information Theory, Nov. 1980, vol. IT-26, No. 6, pp. 726-729.
M. O. Rabin, "Digitalized Signatures and Public Key Functions as Intractable as Factorization," MIT Laboratory for Computer Science, Jan. 1979, TR 212, pp. 1-16.
Z. Shmuely, "Composite Diffie-Hellman Public Key Generating Schemes Are Hard To Break," Computer Science Department of Technion, Feb. 1985, Israel, TR 356, pp. 1-18.
K. S. McCurley, "A Key Distribution System Equivalent to Factoring," Journal of Cryptology, 1988, vol. 1, No. 2, pp. 95-105.
Beller Michael J.
Chang Li Fung
Yacobi Yacov
Bell Communications Research Inc.
Gregory Bernarr E.
Suchyta Leonard Charles
LandOfFree
Cryptographic method for key agreement and user authentication does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Cryptographic method for key agreement and user authentication, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Cryptographic method for key agreement and user authentication will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-1445573