Method and apparatus for interoperable validation of key recover

Cryptography – Particular algorithmic function encoding – Nbs/des algorithm

Patent

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

380 30, H04L 932

Patent

active

060581883

ABSTRACT:
In a cryptographic communications system, a method and apparatus for allowing a sender of encrypted data to demonstrate to a receiver its ability to correctly generate key recovery information that is transmitted along with the encrypted data and from which law enforcement agents or others may recover the original encryption key. Initially, the sender generates a key pair comprising a private signature key and a corresponding public verification key and sends the latter to a key recovery validation service (KRVS). Upon a satisfactory demonstration by the sender of its ability to correctly generate key recovery information, the KRVS generates a certificate certifying the public verification key and the ability of the sender to correctly generate key recovery information. The sender uses its private signature key to generate a digital signature on the key recovery information, which is sent along with the key recovery information and encrypted data to the receiver. The receiver verifies the signature on the key recovery information using the certified public verification key and decrypts the encrypted data only if the signature is verified as being a valid signature.

REFERENCES:
patent: 4200770 (1980-04-01), Hellman et al.
patent: 5276737 (1994-01-01), Micali
patent: 5315658 (1994-05-01), Micali
patent: 5557765 (1996-09-01), Lipner et al.
patent: 5579393 (1996-11-01), Conner et al.
patent: 5615268 (1997-03-01), Bisbee et al.
patent: 5661803 (1997-08-01), Cordery et al.
patent: 5664017 (1997-09-01), Gressel et al.
patent: 5815573 (1998-09-01), Johnson et al.
patent: 5825880 (1998-10-01), Sudia et al.
patent: 5841865 (1998-11-01), Sudia
"A Taxonomy for Key Escrow Encryption System", D. E. Denning et al., Communications of the ACM, vol. 39, No. 3, Mar. 1996, pp. 34-40.
"Alternatives To RSA Using Diffie-Hellman With DSS", (1996) , pub. at http:// www.cylink.com/products/security/rsa/rsa-dss2. htm.
Applied Cryptography(Second Edition 1996) Bruce Schneier, John Wiley & Sons, Inc., New York pp. 70-71.
"Binding Cryptography. A fraud-detectible alternative to key-escrow proposals", E. Verheul et at. (1996), published at http:// cwix.kub.nl/.about.frw/people/koops/binding.htm.
"Binding the ElGamal Encryption Scheme", E. Verheul et al., (1996) , published at http://cwis.dub.nl/.about.frw/people/koops / bindtech.htm.
"New Directions in Cryptography", IEEE Transactions on Information Theory, vol. IT-22, No. 6, Nov. 1976, pp. 644-654.
Public Key Infrastructure "Binding Cryptography --A Fraud-Detectible Alternative to Key-Escrow Proposals" E. Verheul et al., Computer Law & Security Report, vol. 13, No. 1, 1997, pp. 3-14.
"To Tap of Not To Tap", D. Denning, Communications of the ACM, vol. 36, No. 3, Mar. 1993, pp. 26-33.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Method and apparatus for interoperable validation of key recover does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Method and apparatus for interoperable validation of key recover, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method and apparatus for interoperable validation of key recover will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-1600159

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.