Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Particular communication authentication technique
Reexamination Certificate
2001-07-30
2008-09-09
Moise, Emmanuel L (Department: 2137)
Electrical computers and digital processing systems: support
Multiple computer communication using cryptography
Particular communication authentication technique
C713S169000, C380S044000, C380S283000
Reexamination Certificate
active
07424615
ABSTRACT:
The invention provides a cryptographic method which includes receiving at a first entity a second public key MA. At least one of a first session key KBand a first secret SBmay be generated based on the second public key MA. A first random nonce NBmay be generated which may be encrypted with at least one of the first session key KBand the first secret SBto obtain an encrypted random nonce. The encrypted random nonce may be transmitted from the first entity. In response to transmitting the encrypted random nonce, the first computer may receive a data signal containing a modification of the first random nonce NB+1. If the modification of the first random nonce NB+1was correctly performed, then at least one of (i) opening a communication link at the first computer, and (ii) generating a first initialization vector IBis performed.
REFERENCES:
patent: 4200770 (1980-04-01), Hellman et al.
patent: 4956863 (1990-09-01), Goss
patent: 5241599 (1993-08-01), Bellovin et al.
patent: 5515441 (1996-05-01), Faucher
patent: 5666415 (1997-09-01), Kaufman
patent: 5673322 (1997-09-01), Pepe et al.
patent: 5696880 (1997-12-01), Gustafson et al.
patent: 5729608 (1998-03-01), Janson et al.
patent: 5742845 (1998-04-01), Wagner
patent: 5754659 (1998-05-01), Sprunk et al.
patent: 5793866 (1998-08-01), Brown et al.
patent: 5796833 (1998-08-01), Chen et al.
patent: 5822434 (1998-10-01), Caronni et al.
patent: 5835726 (1998-11-01), Shwed et al.
patent: 5896455 (1999-04-01), Vanstone et al.
patent: 5937422 (1999-08-01), Nelson et al.
patent: 5953420 (1999-09-01), Matyas, Jr. et al.
patent: 5953424 (1999-09-01), Vogelesang et al.
patent: 5966441 (1999-10-01), Calamera
patent: 5987131 (1999-11-01), Clapp
patent: 6047072 (2000-04-01), Field et al.
patent: 6064736 (2000-05-01), Davis et al.
patent: 6085320 (2000-07-01), Kaliski, Jr.
patent: 6226383 (2001-05-01), Jablon
patent: 6233608 (2001-05-01), Laursen et al.
patent: 6263437 (2001-07-01), Liao et al.
patent: 6307938 (2001-10-01), Matyas et al.
patent: 6539479 (2003-03-01), Wu
patent: 6643774 (2003-11-01), McGarvey
patent: 6681017 (2004-01-01), Matias et al.
patent: 6769060 (2004-07-01), Dent et al.
patent: 6775772 (2004-08-01), Binding et al.
patent: 2001/0042205 (2001-11-01), Vanstone et al.
patent: 2002/0002678 (2002-01-01), Chow et al.
Schneier, Bruce. Applied Cryptography. John Wiley & Sons. 1996. Washington DC. pp. 4-5 and 357.
Wu, Thomas. The Secure Remote Password Protocol. Nov. 11, 1997. Computer Science Department. Stanford University.
Menezes, Alfred J. Handbook of Applied Cryptography. CRC Press. 1997. pp. 234-237.
SNAKE, Simple Network Authenticating Key Exchange, Apr. 1999, pp. 1-4.
Sun Microsystems, Inc. “The UltraSPARC Processor-Technology: White Paper: The UltraSPARC Architecture”, Nov. 14, 1995, 10 pages.
Gursharan S. Sidhu et al. “Inside AppleTalk”, Mar. 1989, 4 pages, Addison-Wesley Publishing Company, Inc.
“SPEKE: A Strong Password Method”, Oct. 18, 1999, 1 page.
Steven M. Bellovin and Michael Merritt, “Augmented Encrypted Key Exchange: a Password-Based Protocol Secure Against Dictionary Attacks and Password File Compromise”, 1stACM Conf. on Computer & Communication Security, p. 244-250, 1993.
John Kelsey, et al., “Secure Applications of Low-Entropy Keys”, Proc. 1stInternational Workshop on Information Security, p. 121-134, 1997.
Bruce Schneier, “Applied Cryptography Protocols, Algorithm, and Source Code in C”, 2ndEdition, published by John Wiley & Sons, p. 52-53 and p. 429-455, 1996.
Shai Halevi and Hugo Krawczyk, “Public-key Cryptography and Password Protocols”, Pro. 5thACM Conf. on Computer & Communication Security, p. 122-131, 1998.
M. Steiner, G. Tsudik, and M. Waidner, “Refinement and Extension of Encrypted Key Exchange”, Operating Systems Review, vol. 29, Iss. 3, p. 22-30, 1995.
D.P. Jablon, “Extended Password Key Exchange Protocols Immune to Dictionary Attack”, Proceedings Sixth IEEE Enterprise Security Workshop, p. 248-255, 1997.
Jalbert Christopher P.
O'Rourke David M.
Wallace Leland A.
Apple Inc.
Moise Emmanuel L
Pyzocha Michael
LandOfFree
Mutually authenticated secure key exchange (MASKE) does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Mutually authenticated secure key exchange (MASKE), we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Mutually authenticated secure key exchange (MASKE) will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3983018