Method and apparatus for generating pairwise cryptographic...

Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Having particular address related cryptography

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C713S168000, C713S169000, C713S171000, C713S189000, C713S151000, C726S003000, C726S014000, C726S015000, C380S259000, C380S277000, C380S283000

Reexamination Certificate

active

10262814

ABSTRACT:
Group key management techniques are applied to generating pair-wise keys for point-to-point secure communication applications. Nodes participating in a secure communication group each receive a group key and associated policy information. When a first node wishes to establish a secure point-to-point connection to a second node, the first node derives a pairwise key from the group key and policy information, for example, by hashing the group key and information identifying the two nodes. As a result, a pairwise key is generated without exchanging negotiation messages among the two nodes and without expensive asymmetric cryptographic computation approaches.

REFERENCES:
patent: 5729608 (1998-03-01), Janson et al.
patent: 6330562 (2001-12-01), Boden et al.
patent: 6363154 (2002-03-01), Peyravian et al.
patent: 6438612 (2002-08-01), Ylonen et al.
patent: 6915437 (2005-07-01), Swander et al.
patent: 6959089 (2005-10-01), Sprunk
patent: 2002/0012433 (2002-01-01), Haverinen et al.
Yuliang Zheng, “Amending Leighton and Micali's Key Distribution Protocol,” Nov. 2, 1993, pp. 1-5.
David A. McGrew, “The Universal Security Transform, <draft-mcgrew-saag-ust-01.txt>,” Apr. 2002, pp. 1-14.
Mark Baugher et al., “Group Domain of Interpretation (GDOI), <draft-ietf-msec-gdoi-01.txt,” Aug. 20, 2001, pp. 1-42.
D. Harkins et al., “The Internet Key Exchange (IKE),” Nov. 1998, pp. 1-41.
D. Piper, “The Internet IP Security Domain of Interpretation for ISAKMP,” Nov. 1998, pp. 1-32.
H. Orman, “The OAKLEY Key Determination Protocol,” Nov. 1998, pp. 1-55.
Anonymous, “Tunnel Endpoint Discovery Enhancement,” Cisco IOS Release 12.0(5)T, undated, pp. 1-10.
David A. McGrew, Ph.D., “mcgrew at ieee dot org,” file://\\Sj\clients\Cisco%20Systems..., printed Feb. 12, 2003, pp. 1-8.
Mark Baugher et al., “Group Domain of Interpretation (GDOI), <draft-ietf-msec-gdoi-02.txt,” Jan. 7, 2002, pp. 1-28.
David A. McGrew, “Segmented Integer Counter Mode: Specification and Rationale,” Oct. 19, 2000, pp. 1-4.
Ohad Rodeh, “Secure Group Communication,” Submitted to the Senate of the Hebrew University in Jerusalem (2001), 106 pages.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Method and apparatus for generating pairwise cryptographic... does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Method and apparatus for generating pairwise cryptographic..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method and apparatus for generating pairwise cryptographic... will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-3849518

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.