Cryptography – Key management – Having particular key generator
Reexamination Certificate
2006-10-10
2006-10-10
Louis-Jacques, Jacques (Department: 2134)
Cryptography
Key management
Having particular key generator
C380S043000, C380S284000, C380S285000, C380S278000, C380S283000
Reexamination Certificate
active
07120249
ABSTRACT:
A security key, such as an encryption key, is generated so as to make it more difficult for eavesdroppers to identify the key. Specifically, a cryptographically secure random number generator generates a random bit sequence that is included in a seed. This random seed is provided along with a negotiated master secret to a key generation module. The key generation module may implement a pseudo random function that is in accordance with the Transport Layer Security (TLS) protocol or the Wireless Transport Layer Security (WTLS) protocol. This key may then be used to encrypt a plain text message to form an encrypted data packet. The encrypted data packet also includes the random seed in unencrypted form. The encrypted data packet may be transmitted over a public network to a recipient with reduced risk of eavesdropping.
REFERENCES:
patent: 3958081 (1976-05-01), Ehrsam et al.
patent: 4369332 (1983-01-01), Campbell, Jr.
patent: 4791669 (1988-12-01), Kage
patent: 4985919 (1991-01-01), Naruse et al.
patent: 5381481 (1995-01-01), Gammie et al.
patent: 5412730 (1995-05-01), Jones
patent: 5428686 (1995-06-01), Brown et al.
patent: 6240183 (2001-05-01), Marchant
patent: 6327660 (2001-12-01), Patel
patent: 6357046 (2002-03-01), Thompson et al.
patent: 6931128 (2005-08-01), Roberts
patent: 2002/0159598 (2002-10-01), Rubinstein et al.
patent: WO 98/55717 (1998-12-01), None
Schneier, B. “Applied Cryptography, Protocols, Algorithms and Source Code in C”. 1996, John Wiley & Sons, Inc. Second Edition, pp. 169-187.
Zhou, J., “Further analysis of the Internet Key Exchange Protocol”, Computer Communication, Nov. 1, 2000, vol. 23, No. 17, pp. 1606-1612.
Genmaro, R., et al., “Two-Phrase Cryptographic Key Recovery System,” Computer & Security, vol. 16, No. 6, 1997, pp. 481-506.
Bahie-Eldin et al., “Complexity Measure of Encryption Keys for Securing Computer Networks”, IEEE Computer Soc., 1988, pp. 250-255.
Hughes et al., “Quantum Key Distribution Over a 48 km Optical Fibre Network”, Journal of Modern Optics, Feb. 15/Mar. 10, 2000, vol. 47, No. 2/3, pp. 533-547.
Electronics Letters, Aug. 20, 1981, vol. 17, No. 17, pp. 583-585.
Louis-Jacques Jacques
Microsoft Corporation
Tran Tongoc
LandOfFree
Methods and systems for generating encryption keys using... does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Methods and systems for generating encryption keys using..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Methods and systems for generating encryption keys using... will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3685038