Method of sharing cryptokey

Cryptography – Particular algorithmic function encoding – Nbs/des algorithm

Patent

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

380 28, H04L 908

Patent

active

059871296

ABSTRACT:
In a center, a Fourier transformation with a weighting function and a center matrix are applied to the identifier of each entity (steps 2-1, 2-2), which is then randomized by one-time pass random number data generated by a manual operation at each entity, thereby generating a secret private key peculiar to each entity (steps 2-3.about.2-5). The center also generates an identifier transformation algorithm based on the one-time pass random number data and the Fourier transformation with a weighting function (step 2-6). Thereafter, the center distributes the identifier transformation algorithm and the secret private key to each entity. Each entity applies the identifier transformation algorithm and the secret private key to the identifier of another entity with which to communicate, for thereby generating a common cryptokey for cryptographic communications between the entities.

REFERENCES:
patent: 5016276 (1991-05-01), Matsumoto et al.
patent: 5202921 (1993-04-01), Herzberg et al.
patent: 5606615 (1997-02-01), Lapointe et al.
patent: 5729609 (1998-03-01), Moulart et al.
patent: 5778069 (1998-07-01), Tomlinson et al.
R. Blom, "An Optimal Class of Symmetric Key Generation Systems," Lecture Notes in Computer Science, Advances in Cryptology, 1985, pp. 335-338.
R. Blom, "Non-Public Key Distribution," Advances in Cryptology, Proceedings of Crypto 82, Plenum Press, New York, N.Y., pp. 231-236.
T. Matsumoto et al., "Performance of Linear Schemes for the Key Predistribution System," IEICE Technical Report on Information Security, May 20, 1988.
M. Mitani et al., "Digital Signal Processing Series vol. 3 Digital Filter Design", Shokodo, Apr. 20, 1987, pp. 75-78.
T. Matsumoto et al., "A Method for Sharing Cryptography Key Without Communication: Key Predistribution System", Trans. of IEICE, vol. J71-A, No. 11, Nov. 25, 1988, pp. 2046-2053.
T. Matsumoto et al., "Performance of Linear Schemes for the Key Predistribution System", IEICE Technical Report ISEC88-5, Inst. of Elec., Info. and Comm. Engineers of Japan, vol. 88, No. 33, May 20, 1988, pp. 29-32.
H. Imai, "Coding Theory", IEICE, 5th ed., Jun. 10, 1994, pp. 158-159.
J. Massey et al., "A Fourier Transform Approach to the Linear complexity of Nonlinearly Filtered Sequences", Advances in Cryptology: Proceedings of CRYPTO97, Springer-Verlag (1994), pp. 332-340.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Method of sharing cryptokey does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Method of sharing cryptokey, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method of sharing cryptokey will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-1334392

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.