Methods and systems for generating encryption keys using...

Cryptography – Key management – Having particular key generator

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C380S043000, C380S284000, C380S285000, C380S278000, C380S283000

Reexamination Certificate

active

07120249

ABSTRACT:
A security key, such as an encryption key, is generated so as to make it more difficult for eavesdroppers to identify the key. Specifically, a cryptographically secure random number generator generates a random bit sequence that is included in a seed. This random seed is provided along with a negotiated master secret to a key generation module. The key generation module may implement a pseudo random function that is in accordance with the Transport Layer Security (TLS) protocol or the Wireless Transport Layer Security (WTLS) protocol. This key may then be used to encrypt a plain text message to form an encrypted data packet. The encrypted data packet also includes the random seed in unencrypted form. The encrypted data packet may be transmitted over a public network to a recipient with reduced risk of eavesdropping.

REFERENCES:
patent: 3958081 (1976-05-01), Ehrsam et al.
patent: 4369332 (1983-01-01), Campbell, Jr.
patent: 4791669 (1988-12-01), Kage
patent: 4985919 (1991-01-01), Naruse et al.
patent: 5381481 (1995-01-01), Gammie et al.
patent: 5412730 (1995-05-01), Jones
patent: 5428686 (1995-06-01), Brown et al.
patent: 6240183 (2001-05-01), Marchant
patent: 6327660 (2001-12-01), Patel
patent: 6357046 (2002-03-01), Thompson et al.
patent: 6931128 (2005-08-01), Roberts
patent: 2002/0159598 (2002-10-01), Rubinstein et al.
patent: WO 98/55717 (1998-12-01), None
Schneier, B. “Applied Cryptography, Protocols, Algorithms and Source Code in C”. 1996, John Wiley & Sons, Inc. Second Edition, pp. 169-187.
Zhou, J., “Further analysis of the Internet Key Exchange Protocol”, Computer Communication, Nov. 1, 2000, vol. 23, No. 17, pp. 1606-1612.
Genmaro, R., et al., “Two-Phrase Cryptographic Key Recovery System,” Computer & Security, vol. 16, No. 6, 1997, pp. 481-506.
Bahie-Eldin et al., “Complexity Measure of Encryption Keys for Securing Computer Networks”, IEEE Computer Soc., 1988, pp. 250-255.
Hughes et al., “Quantum Key Distribution Over a 48 km Optical Fibre Network”, Journal of Modern Optics, Feb. 15/Mar. 10, 2000, vol. 47, No. 2/3, pp. 533-547.
Electronics Letters, Aug. 20, 1981, vol. 17, No. 17, pp. 583-585.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Methods and systems for generating encryption keys using... does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Methods and systems for generating encryption keys using..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Methods and systems for generating encryption keys using... will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-3685038

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.