Method and apparatus for entity authentication and key distribut

Cryptography – Particular algorithmic function encoding – Nbs/des algorithm

Patent

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

380 25, H04L 908

Patent

active

054917492

ABSTRACT:
A method is described for substantially concurrently performing entity authentication operations and short-lived secret key distribution operations over an insecure communication channel between communication partners, wherein authenticity of communication partners is determined by possession of the long-lived shared secret key. The method includes a number of steps. Data flows are exchanged between the communication partners to define a composite key. At least a portion of the data flows have been encrypted or otherwise masked in a manner which utilizes the long-lived shared secret key. At least one authentication tag is passed between communication partners over the communication channel. The at least one authentication tag is based at least partially upon the composite key. The authentication tag is utilized to determine the authenticity of at least one communication partner.

REFERENCES:
patent: 4193131 (1980-03-01), Lennon et al.
patent: 4438824 (1984-03-01), Mueller-Schloer
patent: 4549075 (1985-10-01), Saada et al.
patent: 4588985 (1986-05-01), Carter et al.
patent: 4720859 (1988-01-01), Aaro et al.
patent: 4723284 (1988-02-01), Munck et al.
patent: 4799061 (1989-01-01), Abraham et al.
patent: 4805216 (1989-02-01), Gruenberg
patent: 5148479 (1992-09-01), Bird et al.
patent: 5153919 (1992-10-01), Reeds, III et al.
patent: 5241599 (1993-08-01), Bellovin et al.
patent: 5299263 (1994-03-01), Beller et al.
patent: 5371294 (1994-12-01), Diffie et al.
R. R. Jueneman, S. M. Matyas, C. H. Meyer, "Message Authentication", Sep. 1985, vol. 23, No. 9, pp. 29-40.
R. Bird, et al., "Systematic Design of a Family of Attack-Resistant Authentication Protocols", Jun. 1993, pp. 1-28.
Steven M. Bellovin, Michael Merritt, "Encrypted Key Exchange: Password-Based Protocols Secure Against Dictionary Attacks", pp. 1-13.
T. Mark A. Lomas, et al. "Reducing Risks from Poorly Chosen Keys", pp. 14-18.
Li Gong, et al. "Protecting Poorly Chosen Secrets from Guessing Attacks", Sep. 25, 1992, pp. 1-18.
Refik Molva, et al., "Research Report, KryptoKnight Authentication and Key Distribution System", Apr. 1, 1992, pp. 1-17.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Method and apparatus for entity authentication and key distribut does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Method and apparatus for entity authentication and key distribut, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method and apparatus for entity authentication and key distribut will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-245495

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.