Cryptography – Particular algorithmic function encoding – Nbs/des algorithm
Patent
1997-07-24
2000-05-02
Swann, Tod R.
Cryptography
Particular algorithmic function encoding
Nbs/des algorithm
380 30, H04L 932
Patent
active
060581883
ABSTRACT:
In a cryptographic communications system, a method and apparatus for allowing a sender of encrypted data to demonstrate to a receiver its ability to correctly generate key recovery information that is transmitted along with the encrypted data and from which law enforcement agents or others may recover the original encryption key. Initially, the sender generates a key pair comprising a private signature key and a corresponding public verification key and sends the latter to a key recovery validation service (KRVS). Upon a satisfactory demonstration by the sender of its ability to correctly generate key recovery information, the KRVS generates a certificate certifying the public verification key and the ability of the sender to correctly generate key recovery information. The sender uses its private signature key to generate a digital signature on the key recovery information, which is sent along with the key recovery information and encrypted data to the receiver. The receiver verifies the signature on the key recovery information using the certified public verification key and decrypts the encrypted data only if the signature is verified as being a valid signature.
REFERENCES:
patent: 4200770 (1980-04-01), Hellman et al.
patent: 5276737 (1994-01-01), Micali
patent: 5315658 (1994-05-01), Micali
patent: 5557765 (1996-09-01), Lipner et al.
patent: 5579393 (1996-11-01), Conner et al.
patent: 5615268 (1997-03-01), Bisbee et al.
patent: 5661803 (1997-08-01), Cordery et al.
patent: 5664017 (1997-09-01), Gressel et al.
patent: 5815573 (1998-09-01), Johnson et al.
patent: 5825880 (1998-10-01), Sudia et al.
patent: 5841865 (1998-11-01), Sudia
"A Taxonomy for Key Escrow Encryption System", D. E. Denning et al., Communications of the ACM, vol. 39, No. 3, Mar. 1996, pp. 34-40.
"Alternatives To RSA Using Diffie-Hellman With DSS", (1996) , pub. at http:// www.cylink.com/products/security/rsa/rsa-dss2. htm.
Applied Cryptography(Second Edition 1996) Bruce Schneier, John Wiley & Sons, Inc., New York pp. 70-71.
"Binding Cryptography. A fraud-detectible alternative to key-escrow proposals", E. Verheul et at. (1996), published at http:// cwix.kub.nl/.about.frw/people/koops/binding.htm.
"Binding the ElGamal Encryption Scheme", E. Verheul et al., (1996) , published at http://cwis.dub.nl/.about.frw/people/koops / bindtech.htm.
"New Directions in Cryptography", IEEE Transactions on Information Theory, vol. IT-22, No. 6, Nov. 1976, pp. 644-654.
Public Key Infrastructure "Binding Cryptography --A Fraud-Detectible Alternative to Key-Escrow Proposals" E. Verheul et al., Computer Law & Security Report, vol. 13, No. 1, 1997, pp. 3-14.
"To Tap of Not To Tap", D. Denning, Communications of the ACM, vol. 36, No. 3, Mar. 1993, pp. 26-33.
Chandersekaran Coimbatore S.
Gennaro Rosario
Gupta Sarbari
Matyas, Jr. Stephen M.
Safford David R.
International Business Machines - Corporation
Jack Todd
Kinnaman Jr. William A.
Swann Tod R.
LandOfFree
Method and apparatus for interoperable validation of key recover does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Method and apparatus for interoperable validation of key recover, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method and apparatus for interoperable validation of key recover will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-1600159