Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Having particular address related cryptography
Reexamination Certificate
2006-08-22
2006-08-22
Sheikh, Ayaz (Department: 2136)
Electrical computers and digital processing systems: support
Multiple computer communication using cryptography
Having particular address related cryptography
C726S006000, C380S044000
Reexamination Certificate
active
07096356
ABSTRACT:
A method and apparatus for negotiating a shared secret among members of a multicast group are disclosed. A tree that represents the group is created and stored in a memory. Each node of the tree is associated with a group member. The shared secret is generated by traversing the tree in post-order, and at each node of the tree, recursively generating a partial key value for use in the shared secret and a base value for use in subsequent recursive partial key value generation. At each node, a partial key value is computed by accumulating the exponent portion of the Diffie-Hellman key equation and computing a new base value for use in subsequent computations. If a particular node has a left or right child sub-tree, each sub-tree is also recursively traversed in post-order fashion. When traversal of the entire tree is complete, all nodes have the shared secret key.
REFERENCES:
patent: 4845744 (1989-07-01), DeBenedictis
patent: 4881264 (1989-11-01), Merkle
patent: 4937811 (1990-06-01), Harris
patent: 5471580 (1995-11-01), Fujiwara et al.
patent: 5592552 (1997-01-01), Fiat
patent: 5634011 (1997-05-01), Auerbach et al.
patent: 5748736 (1998-05-01), Mittra
patent: 5754659 (1998-05-01), Sprunk et al.
patent: 6049878 (2000-04-01), Caronni et al.
patent: 6058420 (2000-05-01), Davies
patent: 6134599 (2000-10-01), Chiu et al.
patent: 6195751 (2001-02-01), Caronni et al.
patent: 6240188 (2001-05-01), Dondeti et al.
patent: 6263435 (2001-07-01), Dondeti et al.
patent: 6295361 (2001-09-01), Kadansky et al.
patent: 6327252 (2001-12-01), Silton et al.
patent: 6363154 (2002-03-01), Peyravian et al.
patent: 6684331 (2004-01-01), Srivastava
patent: 6701434 (2004-03-01), Rohatgi
patent: 6751659 (2004-06-01), Fenger et al.
patent: 6826687 (2004-11-01), Rohatgi
Caronni et al., Efficient security for large and dynamic multicast groups, Jun. 1998, International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises, Page(s):376-383.
Perrig et al., ELK, a new protocol for efficient large-group key distribution, May 2001, IEEE, pp. 247-262.
Stoica et al., REUNITE: a recursive unicast approach to multicast, Mar. 2000, INFOCOM 2000. Nineteenth Annual Joint Conference of the IEEE Computer and Communications Societies. vol. 3, 26-30 Page(s):1644-1653 vol. 3.
Steiner et al., Diffie-Hellman Key Distribution Extended to Group Communciation, 1996, ACM, pp. 31-37.
Kim et al., Simple and fault-tolerant key agreement for dynamic collaborative groups, Nov. 2000, ACM, pp. 235-244.
Suvo Mittra, lolus: a framework for scalable secure multicast, 1997, ACM, pp. 277-288.
Waldvogel et al., The VersaKey framework: Versatile Group Key Management, Sep. 1999, IEEE, pp. 1614-1631.
Klinker, J.E., Multicast tree construction in directed networks, Oct. 1996, Military Communications Conference, 1996. MILCOM '96, Conference Proceedings, IEEE, vol. 2, Page(s):496-500 vol. 2.
Kim et al., Simple and fault-tolerant key agreement for dynamic collaborative groups, Nov. 2000, ACM, pp. 235-244.
S. Setia et al., “Kronos: A Scalable Group Re-Keying Approach for Secure Multicast,” Proc. Of 2000 IEE Symposium on Security & Privacy, 2000., pp. 1-14.
T. Hardjono et al., “Intra-Domain Group Key Management Protocol,” IETF Internet-Draft, Sep. 2000, pp. 1-30.
D. Harkins et al., “The Internet Key Exchange (IKE),” IETF RFC 2409, Nov. 1998.
H. Harney et al., “Group Secure Association Key Management Protocol,” IETF Internet-Draft, Jun. 2000.
H. Harney et al., “Group Key Management Protocol (GKMP) Architecture,” IETF RFC 2094, Jul. 1997.
H. Harney et al., “Group Key Management Protocol (GKMP) Specification,” IETF RFC 2093, Jul. 1997.
S. Kent et al., “Security Architecture for the Internet Protocol,” IETF RFC 2401, Nov. 1998.
Chen Shigang
Wei Liman
Cervetti David Garcia
Cisco Technology Inc.
Hickman Palermo & Truong & Becker LLP
Sheikh Ayaz
LandOfFree
Method and apparatus for negotiating Diffie-Hellman keys... does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Method and apparatus for negotiating Diffie-Hellman keys..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method and apparatus for negotiating Diffie-Hellman keys... will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3615838