Cryptography – Particular algorithmic function encoding – Nbs/des algorithm
Patent
1997-02-25
1999-07-06
Swann, Tod R.
Cryptography
Particular algorithmic function encoding
Nbs/des algorithm
380 30, 380 25, 380 45, 380 44, H04K 100
Patent
active
059206306
ABSTRACT:
A key escrow encryption method, where two users each have secret encryption keys and corresponding public encryption keys. One user receives the public encryption keys of the other user and generates a first datum based on them, an identifier of the other user, the secret encryption keys and identifier of the user, and an access restriction. The user generates a second datum based on the first datum and another access restriction. The user generates a key based on the first and second datums. The user encrypts a message using the key and sends it to the other user. Key escrow is included by requiring each user to distribute its secret encryption keys among escrow agents. The escrow agents transform, sign, and transmit it to a certifying authority. The certifying authority signs and publishes it as user's public key certificate. To communicate, a user retrieves the certificate of the other user, forms a key, encrypts a message, and transmits it to the other user. The other user retrieves the certificate of the user, forms the key, and decrypts the message. A key encryption key scheme may be used. A third party may intercept the message, receive authorization, receive portions of the key from the escrow agents, recover the key, and recover the message. A data recovery scheme may be used.
REFERENCES:
patent: 5124117 (1992-06-01), Tatebayashi
patent: 5150411 (1992-09-01), Maurer
patent: 5199070 (1993-03-01), Matsuzaki et al.
patent: 5276737 (1994-01-01), Micali
patent: 5315658 (1994-05-01), Micali
patent: 5436972 (1995-07-01), Fischer
patent: 5481613 (1996-01-01), Ford et al.
patent: 5535276 (1996-07-01), Ganesan
patent: 5557346 (1996-09-01), Lipner et al.
patent: 5557678 (1996-09-01), Ganesan
patent: 5557765 (1996-09-01), Lipner et al.
patent: 5606617 (1997-02-01), Brands
patent: 5631961 (1997-05-01), Mills et al.
patent: 5633928 (1997-05-01), Lenstra et al.
patent: 5633929 (1997-05-01), Kaliski et al.
patent: 5745573 (1998-04-01), Lipner et al.
patent: 5768388 (1998-06-01), Goldwasser et al.
patent: 5796830 (1998-08-01), Johnson et al.
patent: 5799086 (1998-08-01), Saudia
patent: 5815573 (1998-09-01), Johnson et al.
patent: 5841613 (1996-01-01), Ford et al.
patent: 5841865 (1998-11-01), Saudia
patent: 5850451 (1998-12-01), Saudia
patent: 5852665 (1998-12-01), Gressel et al.
patent: 5857022 (1999-01-01), Saudia
A Taxonomy for Key Escrow Encryption Systems, Denning et al., Comm. of the ACM Mar. 1996.
Description of Key Escrow Systems, Denning, Internet, May 1, 1996.
A Key Escrow System with Warrant Bounds, Lenstra et al., Adv. in Cryptology--Crypto '95, 1995, pp. 197-207.
Federal Information Processing Standards Publication 185 Escrowed Encryption Standard (EES) National Institutes of Standards and Technologiy, Feb. 9, 1994.
Dorothy Denning "Key Escrowing Today", IEEE Communications Magazine pp. 58-68, Sep. 1994.
James Nechvatal "A Public-Key Based Key Escrow System" Elsevier Science Inc., Dec. 1996.
Yung-Cheng Lee et al. "On the Key Recovery of the Key Escrow System" IEEE pp. 216-220, Aug. 1, 1986.
Bielefeld Benjamin M.
Livingston Boyd T.
Monroe Thomas H.
Pendergrass J. William
Wertheimer Michael A.
Callahan Paul E.
Morelli Robert D.
Swann Tod R.
United States of America
LandOfFree
Method of public key cryptography that includes key escrow does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Method of public key cryptography that includes key escrow, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method of public key cryptography that includes key escrow will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-905322