Two-way public key authentication and key agreement for low-cost terminals
IPC분류정보
국가/구분
United States(US) Patent
등록
국제특허분류(IPC7판)
H04L-009/30
H04L-009/08
출원번호
US-0026673
(1993-03-04)
발명자
/ 주소
Beller Michael J. (Red Bank NJ) Yacobi Yacov (Berkeley Heights NJ)
출원인 / 주소
Bell Communications Research, Inc. (Livingston NJ 02)
인용정보
피인용 횟수 :
157인용 특허 :
0
초록▼
A method for achieving mutual authentication and session key agreement between a first party 12 which has minimal computational resources and a second party 18 which has substantial computational resources utilizes a modular square root operation for certificate authentication and key distribution a
A method for achieving mutual authentication and session key agreement between a first party 12 which has minimal computational resources and a second party 18 which has substantial computational resources utilizes a modular square root operation for certificate authentication and key distribution and an ElGamal, NIST DSS, or other efficient signature operation for obtaining the signature of a message. These operations are highly advantageous in a system with asymmetric resources because the computation power required to perform these operations is far less than the computation power required to invert these operations. The entire mutual authentication and session key agreement method can be carried out using only three modular multiplications on the weak computational side.
대표청구항▼
A method for achieving mutual identification and session key agreement between a terminal and a server at the start of communication session comprising the steps of (a) transmitting from the server to the terminal an identity j of the server, public key Nj of the server and a certificate Cj of the s
A method for achieving mutual identification and session key agreement between a terminal and a server at the start of communication session comprising the steps of (a) transmitting from the server to the terminal an identity j of the server, public key Nj of the server and a certificate Cj of the server which certificate Cj, if valid, is congruent to √h(j, Nj)mod Nu where Nj is a public key of the server, Nu is a public key of a central authority, and h() signifies a one-way hashing function, (b) at the terminal, verifying that said transmitted certificate Cj received at the terminal satisfies h(j, Nj)≡cj2 mod Nu, (c) at the terminal, choosing a random number x≡(xLxR) and obtaining y≡x2 mod Nj and transmitting y to said server, (d) at said server, performing the modular square root operation to obtain x=(xL, xR)≡√y mod N by using secret keys of the server pj,qj, such that Nj=pjqj, and transmitting xL back to the terminal, (e) transmitting, from the terminal to the server, an identity i of the terminal, a public key Pi of the terminal, and a certificate ci of the terminal which certificate ci, if valid, is congruent to √h(i,Pi) mod Nu, wherein the identity i, the public key Pi and the certificate ci are encrypted using xR as a session key, (f) at the server, verifying that the received certificate ci satisfies h(i,Pi)≡Ci2mod Nu, (g) computing at the terminal a signature S(m) based on a challenge message m sent by the server by applying an asymmetric signature operation to said challenge message m, and transmitting the signature to the server in encrypted form using xR as a session key, and (h) verifying the signature at the server.
Kaplan Dmitry ; Stanhope David M. ; McKernan Randolph W. ; Wilburn Howard L. ; Green Evan R., Apparatus and method for preventing fraudulent calls in a wireless telephone system using destination and fingerprint a.
Schell, Roger R.; Kingdon, Kevin W.; Berson, Thomas A.; Jueneman, Robert R., Apparatus for control of cryptography implementations in third party applications.
Hoogerwerf David N. ; Stanhope David M. ; Barrere William Gerrit ; Green Evan R. ; McKernan Randolph W., Automated forced call disruption for use with wireless telephone systems.
Davis Terry L. (Scottsdale AZ) Russell James F. (Hockessin DE) Sears John W. (Peoria AZ) Trice Philip H. (Phoenix AZ), Common cryptographic key verification in a transaction network.
Milliken, Walter Clark; Strayer, William Timothy; Milligan, Stephen Douglas; Sanchez, Luis; Partridge, Craig, Hash-based systems and methods for detecting and preventing transmission of polymorphic network worms and viruses.
Milliken, Walter Clark; Strayer, William Timothy; Milligan, Stephen Douglas; Sanchez, Luis; Partridge, Craig, Hash-based systems and methods for detecting and preventing transmission of polymorphic network worms and viruses.
Milliken, Walter Clark; Strayer, William Timothy; Milligan, Stephen Douglas, Hash-based systems and methods for detecting and preventing transmission of unwanted e-mail.
Guski Richard Henry ; Dayka John Carr ; McGee Harvey Tildon ; Wells Bruce Robert, Method and apparatus for entity authentication and session key generation.
Schell, Roger R.; Kingdon, Kevin W.; Berson, Thomas A.; Jueneman, Robert R., Method and apparatus for escrowing properties used for accessing executable modules.
Matyas ; Jr. Stephen Michael ; Johnson Donald Byron, Method and apparatus for establishing an authenticated shared secret value between a pair of users.
Rudokas Ronald S. (Alamo CA) Storch John A. (Laguna Niguel CA) Daniels David L. (Placentia CA), Method and apparatus for fraud control in cellular telephone systems.
Hameau, Patrice; Fougeroux, Nicolas; Bole, Benoît, Method for making secure the pre-initialising phase of a silicon chip integrated system, in particular a smart card and integrated system therefor.
Pitchenik David E. ; Cordery Robert A. ; Ryan ; Jr. Frederick W., Method for verifying the expected postal security device in a postage metering system.
Matsumoto Norihisa,JPX ; Hayashi Masato,JPX ; Matsui Susumu,JPX ; Tanaka Kazuhisa,JPX, Personal station authentication system and authentication method.
Carman David W. ; Balenson David M. ; Tajalli Homayoon ; Walker Stephen T., System and method for controlling access to a user secret using a key recovery field.
Ganesan Ravi (Arlington VA) Yacobi Yacov (Berkeley Heights NJ), System and method for identity verification, forming joint signatures and session key agreement in an RSA public cryptos.
Kaplan Dmitry ; Stanhope David M. ; McKernan Randolph W. ; Wilburn Howard L. ; Green Evan R., System and method for the verification of authentic telephone numbers in a wireless telephone system.
Davis Terry L. (Scottsdale AZ) Hart James A. (Radnor PA) Imperia Vincent A. (Tempe AZ) Love Michael (Wilmington DE) O\Malley Michael F. (Glenside PA) Russell James F. (Hockessin DE) Sears John W. (Pe, Transaction system for integrated circuit cards.
Kent Eldon Seamons ; William Hale Winsborough, Trust negotiation in a client/server data processing network using automatic incremental credential disclosure.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.