Cryptography – Particular algorithmic function encoding – Nbs/des algorithm
Patent
1993-12-30
1996-02-13
Cangialosi, Salvatore
Cryptography
Particular algorithmic function encoding
Nbs/des algorithm
380 25, H04L 908
Patent
active
054917492
ABSTRACT:
A method is described for substantially concurrently performing entity authentication operations and short-lived secret key distribution operations over an insecure communication channel between communication partners, wherein authenticity of communication partners is determined by possession of the long-lived shared secret key. The method includes a number of steps. Data flows are exchanged between the communication partners to define a composite key. At least a portion of the data flows have been encrypted or otherwise masked in a manner which utilizes the long-lived shared secret key. At least one authentication tag is passed between communication partners over the communication channel. The at least one authentication tag is based at least partially upon the composite key. The authentication tag is utilized to determine the authenticity of at least one communication partner.
REFERENCES:
patent: 4193131 (1980-03-01), Lennon et al.
patent: 4438824 (1984-03-01), Mueller-Schloer
patent: 4549075 (1985-10-01), Saada et al.
patent: 4588985 (1986-05-01), Carter et al.
patent: 4720859 (1988-01-01), Aaro et al.
patent: 4723284 (1988-02-01), Munck et al.
patent: 4799061 (1989-01-01), Abraham et al.
patent: 4805216 (1989-02-01), Gruenberg
patent: 5148479 (1992-09-01), Bird et al.
patent: 5153919 (1992-10-01), Reeds, III et al.
patent: 5241599 (1993-08-01), Bellovin et al.
patent: 5299263 (1994-03-01), Beller et al.
patent: 5371294 (1994-12-01), Diffie et al.
R. R. Jueneman, S. M. Matyas, C. H. Meyer, "Message Authentication", Sep. 1985, vol. 23, No. 9, pp. 29-40.
R. Bird, et al., "Systematic Design of a Family of Attack-Resistant Authentication Protocols", Jun. 1993, pp. 1-28.
Steven M. Bellovin, Michael Merritt, "Encrypted Key Exchange: Password-Based Protocols Secure Against Dictionary Attacks", pp. 1-13.
T. Mark A. Lomas, et al. "Reducing Risks from Poorly Chosen Keys", pp. 14-18.
Li Gong, et al. "Protecting Poorly Chosen Secrets from Guessing Attacks", Sep. 25, 1992, pp. 1-18.
Refik Molva, et al., "Research Report, KryptoKnight Authentication and Key Distribution System", Apr. 1, 1992, pp. 1-17.
Cangialosi Salvatore
Dillon Andrew J.
Hunn Melvin A.
International Business Machines - Corporation
LaBaw Jeffrey S.
LandOfFree
Method and apparatus for entity authentication and key distribut does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Method and apparatus for entity authentication and key distribut, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method and apparatus for entity authentication and key distribut will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-245495