Method and apparatus for a key-management scheme for internet pr

Cryptography – Particular algorithmic function encoding – Public key

Patent

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

380 21, H04L 930

Patent

active

056339330

ABSTRACT:
A first data processing device (node I) is coupled to a private network which is in turn coupled to the Internet. A second data processing device (node J) is coupled to the same, or to a different network, which is also coupled to the Internet, such that node I communicates to node J using the Internet protocol. Node I is provided with a secret value i, and a public value .alpha..sup.i mod p. Node J is provided with a secret value j, and a public value .alpha..sup.j mod p. Data packets (referred to as "datagrams") are encrypted using the teachings of the present invention to enhance network security. A source node I obtains a Diffie-Helman (DH) certificate for node J, (either from a local cache, from a directory service, or directly from node J), and obtains node J's public value .alpha..sup.j mod p from the DH certificate. Node I then computes the value of .alpha..sup.ij mod p, and derives a key K.sub.ij from the value .alpha..sup.ij mod p. A transient key K.sub.p is then generated at random, and K.sub.p is used to encrypt the datagram to be sent by node I. K.sub.p is then encrypted with key K.sub.ij. Upon receipt of the encrypted datagram by the receiving node J, the node J obtains a DH certificate for node I, (either from a local cache, from a directory service, or directly from node J), and obtains the public value .alpha..sup.i mod p. Node I then computes the value of .alpha..sup.ij mod p and derives the key K.sub.ij. Node J utilizes the key K.sub.ij to decrypt the transient key K.sub.p, and using the decrypted transient key K.sub.p, node J decrypts the datagram packet, thereby resulting in the original data in unencrypted form.

REFERENCES:
patent: 5241599 (1993-08-01), Bellovin et al.
patent: 5416842 (1995-05-01), Aziz
patent: 5469507 (1995-11-01), Canetti et al.
patent: 5544246 (1996-08-01), Mandelbaum et al.
patent: 5548646 (1996-08-01), Aziz et al.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Method and apparatus for a key-management scheme for internet pr does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Method and apparatus for a key-management scheme for internet pr, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method and apparatus for a key-management scheme for internet pr will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-2334769

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.