Yaksha, an improved system and method for securing communication

Cryptography – Particular algorithmic function encoding – Nbs/des algorithm

Patent

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

380 23, 380 4, 380 46, 380 49, 380 21, H04K 100

Patent

active

055352766

ABSTRACT:
In a system, such as a system utilizing a Kerberos protocol, system users each have an associated asymmetric crypto-key. The security of communications over the system is enhanced by a first user generating a temporary asymmetric crypto-key having a first temporary key portion and an associated second temporary key portion. The second temporary key portion is encrypted by the first user with the first private key portion of the first user crypto-key to form a first encrypted message. Another user, preferably an authentication server, applies the second private key portion and the public key portion of the first user crypto-key to the first encrypted message to decrypt the second temporary key portion and thereby authenticate the first user to the security server. The authentication server then encrypts the first encrypted message with the second private key portion of the first user crypto-key to form a second encrypted message. The first user next applies the public key portion of the first user crypto-key to decrypt the second encrypted message and obtain the second temporary key portion, thereby authenticating the security server to the first user.

REFERENCES:
patent: 4200770 (1980-04-01), Hellman et al.
patent: 4218582 (1980-08-01), Hellman et al.
patent: 4405829 (1983-09-01), Rivest et al.
patent: 4424414 (1984-01-01), Hellman et al.
patent: 4995082 (1991-02-01), Schnorr
R. L. Rivest, A. Shamir & L. Adleman, "A Method for Obtaining Digital Signatures and Public-key Cryptosystems", CACM, vol. 21, pp. 120-126, Feb. 1978.
M. J. Weiner, "Cryptanalysis of Short RSA Secret Exponents", IEEE Transaction on Information Theory, vol. 36, No. 3, pp. 553-558.
C. Boyd, Cryptography and Coding: "Digital Multisignatures", 15-17 Dec. 1986, pp. 241-246.
Kohl, John et al., "The Kerberos.TM. Network Authentication Service (V5)", Internet-Draft, Sep. 1, 1992, pp. 1-69.
Bellovin, Steven M. et al., "Encrypted Key Exchange: Password-Based Protocols Secure Against Dictionary Attacks", IEE, 1992, pp. 72-84.
Schneier, B., "Applied Cryptography, Protocols, Algorithms and Source Code in C", pp. 428-436, John Wiley & Sons, NY 1994 (re Kent, S., Privacy Enhancement for Internet Electronic Mail: Part II: Certificate Based Key Management, Internet RFC 1422, Feb. 1993).
Schneier, B., "Applied Cryptography Protocols, Algorithms and Source Code in C", p. 424, John Wiley & Sons NY 1994 (re Kohl, J. T., The Evolution of the Kerberos Authentication Service, EurOpen Conference Proceedings, May 1991).

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Yaksha, an improved system and method for securing communication does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Yaksha, an improved system and method for securing communication, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Yaksha, an improved system and method for securing communication will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-1874595

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.