Cryptography – Key management – Key escrow or recovery
Reexamination Certificate
1997-04-08
2001-06-19
Cangialosi, Salvatore (Department: 2661)
Cryptography
Key management
Key escrow or recovery
Reexamination Certificate
active
06249585
ABSTRACT:
BACKGROUND OF THE INVENTION
1. Field of the Invention
The present invention relates generally to cryptographic communication systems, and more specifically, toward the verification of information encrypted within a data recovery field.
2. Related Art
Communication between two parties can be secured through the encryption of data using a symmetric session key. One method of generating a session key uses a Diffie-Hellman key exchange. The session key is determined by a sender based on a private key of the sender and a public key of a receiver. The session key is determined by the receiver using a private key of the receiver and a public key of the sender. Because of the way in which the private key and the public key are determined, the sender and the receiver will each determine the identical session key. Once determined, the session key is used to encrypt the communications between the two parties.
Law enforcement officials are naturally concerned with the widespread use of encryption by criminal entities. Accordingly, law enforcement officials require some form of assurance that they will be able to recover the encrypted communications under the proper circumstances, for example, after obtaining a court order. This form of limited access to the encrypted communications is enabled by the creation and use of a data recovery field (“DRF”), and more particularly a key recovery field (“KRF”). The KRF includes the session key encrypted using the public key of a recovery agent (e.g., a trusted data recovery center (“DRC”)) or other information that only the recovery agent can use to determine the session key For a law enforcement official to recover the contents of the KRF, the law enforcement official provides the KRF together with a suitable court order to the DRC. If the court order is valid, the DRC uses the KRF to determine the session key and provides it to the law enforcement official, thereby allowing access to the encrypted session.
From the standpoint of the government, this system will only be effective if the session key or other information included within the KRF is the same session key that was used to encrypt the communications. Thus, what is needed is a system and method for verifying that the session key can be recovered from information included within the KRF without revealing any private information.
SUMMARY OF THE INVENTION
The present invention is a system and method for verifying that a session key, or other user secret, can be recovered from public information associated with an encrypted communication in a system using a Diffie-Hellman key exchange protocol. In particular, the present invention provides recovery information to a recovery agent that allows the recovery agent to recover the session key. In addition to the recovery information, the present invention provides verification information that allows a verifier to verify that the session key can be recovered from the recovery information.
A feature of the present invention is that only the recovery agent can recover the session key. Furthermore, any person or device with the proper verification information (and, of course, instructions) can verify that the session key is recoverable from the recovery information. The present invention accomplishes this without revealing any secret information. In other words, the recovery information is publicly verifiable.
REFERENCES:
patent: 5557765 (1996-09-01), Lipner et al.
patent: 5745573 (1998-04-01), Lipner et al.
patent: 5768388 (1998-06-01), Goldwasser et al.
patent: 5796830 (1998-08-01), Johnson et al.
patent: 5815573 (1998-09-01), Johnson et al.
patent: 5852665 (1998-12-01), Gressel et al.
patent: 5907618 (1999-05-01), Gennaro et al.
patent: 5920630 (1999-07-01), Wertheimer et al.
patent: 5937066 (1999-08-01), Gennaro et al.
Eric Verheul, Henk van Tilborg; “Binding the ElGamal Encryption Scheme,” http://www.kub.nl/~frw/people/koops/bindtech.htm, ©1996, 2 pages.
Eric Verheul, Henk van Tilborg; “Binding Cryptography. A fraud-detectible alternative to key-escrow proposals,” http://www.kub.nl/~frw/people/koops/binding.htm, ©1996, 4 pages.
Carman David W.
McGrew David A.
Cangialosi Salvatore
Coolet Godward LLP
Network Associates, Inc
LandOfFree
Publicly verifiable key recovery does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Publicly verifiable key recovery, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Publicly verifiable key recovery will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-2464955