Cryptography – Particular algorithmic function encoding – Nbs/des algorithm
Patent
1994-11-09
1996-07-09
Cain, David C.
Cryptography
Particular algorithmic function encoding
Nbs/des algorithm
380 23, 380 4, 380 46, 380 49, 380 21, H04K 100
Patent
active
055352766
ABSTRACT:
In a system, such as a system utilizing a Kerberos protocol, system users each have an associated asymmetric crypto-key. The security of communications over the system is enhanced by a first user generating a temporary asymmetric crypto-key having a first temporary key portion and an associated second temporary key portion. The second temporary key portion is encrypted by the first user with the first private key portion of the first user crypto-key to form a first encrypted message. Another user, preferably an authentication server, applies the second private key portion and the public key portion of the first user crypto-key to the first encrypted message to decrypt the second temporary key portion and thereby authenticate the first user to the security server. The authentication server then encrypts the first encrypted message with the second private key portion of the first user crypto-key to form a second encrypted message. The first user next applies the public key portion of the first user crypto-key to decrypt the second encrypted message and obtain the second temporary key portion, thereby authenticating the security server to the first user.
REFERENCES:
patent: 4200770 (1980-04-01), Hellman et al.
patent: 4218582 (1980-08-01), Hellman et al.
patent: 4405829 (1983-09-01), Rivest et al.
patent: 4424414 (1984-01-01), Hellman et al.
patent: 4995082 (1991-02-01), Schnorr
R. L. Rivest, A. Shamir & L. Adleman, "A Method for Obtaining Digital Signatures and Public-key Cryptosystems", CACM, vol. 21, pp. 120-126, Feb. 1978.
M. J. Weiner, "Cryptanalysis of Short RSA Secret Exponents", IEEE Transaction on Information Theory, vol. 36, No. 3, pp. 553-558.
C. Boyd, Cryptography and Coding: "Digital Multisignatures", 15-17 Dec. 1986, pp. 241-246.
Kohl, John et al., "The Kerberos.TM. Network Authentication Service (V5)", Internet-Draft, Sep. 1, 1992, pp. 1-69.
Bellovin, Steven M. et al., "Encrypted Key Exchange: Password-Based Protocols Secure Against Dictionary Attacks", IEE, 1992, pp. 72-84.
Schneier, B., "Applied Cryptography, Protocols, Algorithms and Source Code in C", pp. 428-436, John Wiley & Sons, NY 1994 (re Kent, S., Privacy Enhancement for Internet Electronic Mail: Part II: Certificate Based Key Management, Internet RFC 1422, Feb. 1993).
Schneier, B., "Applied Cryptography Protocols, Algorithms and Source Code in C", p. 424, John Wiley & Sons NY 1994 (re Kohl, J. T., The Evolution of the Kerberos Authentication Service, EurOpen Conference Proceedings, May 1991).
Bell Atlantic Network Services Inc.
Cain David C.
LandOfFree
Yaksha, an improved system and method for securing communication does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Yaksha, an improved system and method for securing communication, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Yaksha, an improved system and method for securing communication will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-1874595