Cryptography – Key management
Reexamination Certificate
2009-03-26
2011-11-01
Orgad, Edan (Department: 2439)
Cryptography
Key management
C705S071000, C713S171000, C726S001000, C726S002000, C726S022000
Reexamination Certificate
active
08050408
ABSTRACT:
The election of a key server is provided. The key server is a single device that broadcasts an encryption key to other devices in a network segment. Also, automatic reelection of a new key server is provided when a current key server becomes unavailable. Key receivers may separately detect that a new key server is needed and separately determine from state information which key receiver should be elected the new key server. The state information may have been received in previously sent messages. Thus, further messaging is not needed to elect a new key server.
REFERENCES:
patent: 6804703 (2004-10-01), Allen et al.
patent: 2005/0050004 (2005-03-01), Sheu et al.
patent: 2006/0088167 (2006-04-01), Bade et al.
patent: 2006/0129691 (2006-06-01), Coffee et al.
patent: 2007/0016663 (2007-01-01), Weis
U.S. Appl. No. 10/625,445, filed Sep. 2, 2008 Huang et al.
Barker, E., et. al., “Recommendation for Key Management—Part 1:General”, NIST Special Publication 800-57 Part 1, Aug. 2005.
Barker, E., et. al., “Recommendation for Key Management—Part 2:Best Practices for Key Management Organization”, NIST Special Publication 800-57 Part 2, Aug. 2005.
Douceur, J.R.; 2002. The Sybil Attack. In Revised Papers From the First international Workshop on Peer-To-Peer Systems (Mar. 7-8, 2002). P. Druschel, M. F. Kaashoek, and A. I. Rowstron, Eds. Lecture Notes in Computer Science, vol. 2429. Springer-Verlag, London, 251-260. Available at http://www.cs.rice.edu/Conferences/IPTPS02/101. pdf.
Dworkin, M.; “Recommendation for Block Cipher Modes of Operation: The CMAC Mode for Authentication”, NIST Special Publication 800-38B, May 2005; http://csrc.nist.gov/publications
istpubs/800-38C/SP800-38C.pdf.
IEEE, “IEEE P802.1AE/D4.0 Draft Standard for Local and Metropolitan Area Networks: Media Access Control (MAC) Security”, Aug. 25, 2005.
McGrew, D.A. and Viega, J. “The Galois/Counter Mode of Operation (GCM)”, May 31, 2005. Available at http://csrc.nist.gov/CryptoToolkit/modes/proposedmodes/gcm/gcm-revised-spec.pdf.
NIST, “Advanced Encryption Standards”, FIPS 197, Nov. 2001. Available at http://csrc.nist.gov/publications/fips/ index.html.
NIST, “Annex C: Approved Random Number Generators for FIPS PUB 140-2, Security Requirements for Cryptographic Modules”, Draft, Jan. 31, 2005.
NIST, “Security requirements for Cryptographic Modules”, FIPS 140-2, May 2001. Available at http://csrc.nist.gov/publications/fips/index.html.
NIST, Draft NIST AES Key Wrap Specification, Nov. 16, 2001. Available at http://csrc.nist.gov/CryptoToolkit/kms/key-wrap.pdf.
NIST Computer Security Division's CSRC Home page, See http://csrc.nist.gov/.
Perrig, A., et. al., “Efficient Authentication and Signing of Multicast Streams over Lossy Channels”, IEEE Symposium on Security and Privacy (May 2000), pp. 56-73.
Perrig, A., et. al., SPINS: Security Protocols for Sensor Networks, Wireless Networks (Sep. 2002), vol. 8, No. 5, pp. 521-534. Available at http://sparrow.ece.cmu.edu/˜adrian/projects/mc2001/spins-wine-journal.pdf.
Seaman, Mick; “A distributed fault-tolerant group key selection protocol for MACsec”, Revision 0.4, Dec. 2004; http://www.ieee802.org/1/files/public/docs2004/af-KeySelectionProtocol-seaman-v03.pdf.
Seaman, Mick; “A distributed fault-tolerant group key selection protocol for MACsec”, Rev.0.3, Jul. 6, 2004, 8 pages.
Cisco Technology Inc.
Fish & Richardson P.C.
Orgad Edan
Tolentino Roderick
LandOfFree
Techniques for managing keys using a key server in a network... does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Techniques for managing keys using a key server in a network..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Techniques for managing keys using a key server in a network... will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-4286394