Cryptography – Particular algorithmic function encoding – Nbs/des algorithm
Patent
1994-08-11
1996-09-17
Cangialosi, Salvatore
Cryptography
Particular algorithmic function encoding
Nbs/des algorithm
380 30, H04L 908
Patent
active
055573460
ABSTRACT:
A system and method for key escrow cryptography for use in a system comprising a sender and a receiver. Only public escrow keys are stored in the sender and the receiver. The sender encrypts a message using a secret session key (KS), and generates a leaf verification string (LVS) by combining an unique program identifier (UIP), a public portion of a program unique key (KUpub), and a signature. The sender encrypts the KS using the KUpub to generate a first encrypted session key (EKS), and generates a first law enforcement access field (LEAF) by encrypting a combination of the first EKS and the UIP with a copy of a public portion of a family key (KFpub) stored in the sender. The encrypted message, the LVS, and the first LEAF are transmitted from the sender to the receiver. The receiver stores therein a public portion of the KEPF key (KEPFpub). The receiver extracts the UIP, KUpub, and the signature from the LVS, and then encrypts the KS using the extracted KUpub to generate a second encrypted session key (EKS). The receiver generates a second LEAF by encrypting a combination of the second EKS and the extracted UIP with a copy of the KFpub stored in the receiver. The receiver then compares the first LEAF to the second LEAF. If the first LEAF is equal to the second LEAF, then the receiver decrypts the encrypted message using the KS.
REFERENCES:
patent: 5276737 (1994-01-01), Micali
patent: 5315658 (1994-05-01), Micali
Computer Systems Laboratory, National Institute of Standards and Technology, Gaithersburg, MD, "Escrowed Encryption Standard (EES)", Federal Information Processing Standards Publication, FIPS PUB 185, Feb. 9, 1994.
Dorothy Denning, "The Clipper Chip: A Technical Summary", Revised Apr. 21, 1993.
Dorothy Denning, "The Clipper Chip: A Technical Summary", Apr. 19, 1993.
L. Harn and H. Y. Lin, "Integration of user authentication and access control", IEEE Proceedings-E, vol. 139, No. 2, pp. 139-143, Mar., 1992.
Brickell et al., "Skipjack Review: Interim Report: The Skipjack Algorithm", Georgetown University, Office of Public Affairs, pp. 1-6, Jul. 28, 1993.
Balenson David M.
Ellison Carl M.
Lipner Steven B.
Walker Stephen T.
Cangialosi Salvatore
Trusted Information Systems, Inc.
LandOfFree
System and method for key escrow encryption does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with System and method for key escrow encryption, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and System and method for key escrow encryption will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-416752