Extended authenticated key exchange

Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Particular communication authentication technique

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C380S044000

Reexamination Certificate

active

07627760

ABSTRACT:
Extended authenticated key exchange is described. In one aspect, an identity (IDA) of an initiator and an identity (IDB) of a responder are determined. A first party (i.e., the initiator or the responder) computes a session key based at least on IDAand IDB. A second party (i.e., the initiator or the responder) that is not the first party, uses at least IDAand IDBto compute a corresponding session key. The initiator's session key and the responder's corresponding session key, if equal, provide for secure exchange of data between the initiator and the responder.

REFERENCES:
patent: 6122736 (2000-09-01), Vanstone et al.
patent: 6226383 (2001-05-01), Jablon
patent: 6487661 (2002-11-01), Vanstone et al.
patent: 6539479 (2003-03-01), Wu
patent: 6718467 (2004-04-01), Trostle
patent: 6993651 (2006-01-01), Wray et al.
patent: 7490239 (2009-02-01), Beeson
patent: 2002/0062451 (2002-05-01), Scheidt et al.
patent: 2003/0081785 (2003-05-01), Boneh et al.
patent: 2003/0123655 (2003-07-01), Lambert et al.
patent: 2004/0081321 (2004-04-01), Struik
patent: 2006/0093138 (2006-05-01), Durand et al.
SeongHan Shin, “Leakage-Resilient Authenticated Key Establishment Protocols”, LNCS 2894, Advances in Cryptology—ASIACRYPT, pp. 155-173, Springer Berlin/Heidelberg, 2003.
Boyd et. al., “Elliptic Curve Based Password Authenticated Key Exchange Protocols”, ACISP 2001, LNCS 2119, pp. 487-501, 2001, Springer-Verlag Berlin Heidelberg 2001.
Scott Vanstone, PCT/CA 03/00317, “Key Argument and Transport Protocol”, Mar. 8, 2002.
Canetti et al., “Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels”, LNCS, vol. 2045, Proceedings of the International Conference on the Theory and Application of Cryptographic Techniques: Advances in Cryptography. pp. 451-474. Springer-Verlag. 2001.
Law et al. “An Efficient Protocol for Authenticated Key Agreement”; Technical Report CORR 98-05, Dept. of C&O, University Waterloo, Canada, 1998; pp. 1-16.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Extended authenticated key exchange does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Extended authenticated key exchange, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Extended authenticated key exchange will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-4146660

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.