Cryptography – Key management – Having particular key generator
Reexamination Certificate
2005-08-16
2005-08-16
Morse, Gregory (Department: 2134)
Cryptography
Key management
Having particular key generator
C380S043000, C380S284000, C380S285000, C380S277000, C380S278000, C380S279000, C380S283000
Reexamination Certificate
active
06931128
ABSTRACT:
A security key, such as an encryption key, is generated so as to make it more difficult for eavesdroppers to identify the key. Specifically, a cryptographically secure random number generator generates a random bit sequence that is included in a seed. This random seed is provided along with a negotiated master secret to a key generation module. The key generation module may implement a pseudo random function that is in accordance with the Transport Layer Security (TLS) protocol or the Wireless Transport Layer Security (WTLS) protocol. This key may then be used to encrypt a plain text message to form an encrypted data packet. The encrypted data packet also includes the random seed in unencrypted form. The encrypted data packet may be transmitted over a public network to a recipient with reduced risk of eavesdropping.
REFERENCES:
patent: 5381481 (1995-01-01), Gammie et al.
patent: 5412730 (1995-05-01), Jones
patent: 5428686 (1995-06-01), Brown et al.
patent: 6327660 (2001-12-01), Patel
patent: 6357046 (2002-03-01), Thompson et al.
patent: 2002/0159598 (2002-10-01), Rubinstein et al.
patent: WO 98/55717 (1998-12-01), None
Schneier, B., “Applied Cryptography, Protocols, Algorithms and Source Code in C”. 1996, John Wiley & Sons, Inc., Second Edition, pp. 169-187.
Complexity Measure of Encryption Keys Used for Securing Computer Networks Mostafa A. Bahie-Eldin, Egyptian Armed Forces/Alaa A. Omar, Tech. Res. Dep., Cairo, Egypt IEEE Computer Soc, 1988, pp. 250-255.
Fast Generation of Prime Numbers and Secure Public-Key Cryptographic Parameters Ueli M. Maurer Journal of Cryptology, Summer 1995, vol. 8, No. 3, pp. 123-155.
Encryption with Keyed Random Permutations F. Ayoub Electronics Letters, Aug. 20, 1981, vol. 17, No. 17, pp. 583-585.
Quantum Key Distribution Over a 48 km Optical Fibre Network Richard J, Hughes, George L. Morgan, & C. Glen Peterson Journal of Modern Optics, Feb. 15/Mar. 10, 2000, vol. 47, No. 2/3, pp. 533-547.
Gennaro, R., et al., “Two-Phase Cryptographic Key Recovery System,”Computers&Security,vol. 16, No. 6, 1997, pp. 481-506.
Zhou, J., “Further analysis of the Internet key exchange protocol,”Computer Communications,Nov. 1, 2000, vol. 23, No. 17, pp. 1606-1612.
Microsoft Corporation
Morse Gregory
Tran Tongoc
Workman Nydegger
LandOfFree
Methods and systems for generating encryption keys using... does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Methods and systems for generating encryption keys using..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Methods and systems for generating encryption keys using... will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3521700