GR1005832B - Method of establishing strong keys and securing communications between wireless and other devices. - Google Patents
Method of establishing strong keys and securing communications between wireless and other devices.Info
- Publication number
- GR1005832B GR1005832B GR20070100303A GR20070100303A GR1005832B GR 1005832 B GR1005832 B GR 1005832B GR 20070100303 A GR20070100303 A GR 20070100303A GR 20070100303 A GR20070100303 A GR 20070100303A GR 1005832 B GR1005832 B GR 1005832B
- Authority
- GR
- Greece
- Prior art keywords
- parties
- common
- key
- devices
- secure
- Prior art date
Links
- 238000000034 method Methods 0.000 title abstract 4
- 238000012795 verification Methods 0.000 abstract 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0838—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
- H04L9/0841—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols
- H04L9/0844—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols with user authentication or key authentication, e.g. ElGamal, MTI, MQV-Menezes-Qu-Vanstone protocol or Diffie-Hellman protocols using implicitly-certified keys
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/80—Wireless
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The present invention provides a secure method for establishing cryptographic keys based on a Diffie-Hellman type of key exchange that can be used by two parties (devices, entities, etc.) to secure their in-between communications. The method uses commitments and older secrets for creating a sense of "continuity" with older attempts of communication (session/key continuity). The computation of the common Diffie-Hellman key is performed only after successful authentications take place. Then, the two parties verify the common secret using some secondary channel, such as for example, voice verification. In addition to the above, a warning indicator is provided that warns users if a common secret was discovered by the protocol using some appropriate interface. If users have interacted in the past, they should share common secrets. If this is not the case, a person-in-the-middle attack is taking place even if authentication values happen to match. Overall, the previous measures reduce the danger of attcks thus creating an effective and secure method for communication between two parties.
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| GR20070100303A GR1005832B (en) | 2007-05-22 | 2007-05-22 | Method of establishing strong keys and securing communications between wireless and other devices. |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| GR20070100303A GR1005832B (en) | 2007-05-22 | 2007-05-22 | Method of establishing strong keys and securing communications between wireless and other devices. |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| GR1005832B true GR1005832B (en) | 2008-02-27 |
Family
ID=38819659
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| GR20070100303A GR1005832B (en) | 2007-05-22 | 2007-05-22 | Method of establishing strong keys and securing communications between wireless and other devices. |
Country Status (1)
| Country | Link |
|---|---|
| GR (1) | GR1005832B (en) |
Citations (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| EP0768775A2 (en) * | 1995-10-09 | 1997-04-16 | Matsushita Electric Industrial Co., Ltd. | Method and apparatus for mutual authentication according to the challenge/response principle |
| EP1134929A1 (en) * | 2000-03-17 | 2001-09-19 | Lucent Technologies Inc. | Secure mutual network authentication and key exchange protocol |
| US20070076879A1 (en) * | 2005-10-03 | 2007-04-05 | Nokia Corporation | System, method and computer program product for authenticating a data agreement between network entities |
-
2007
- 2007-05-22 GR GR20070100303A patent/GR1005832B/en not_active IP Right Cessation
Patent Citations (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| EP0768775A2 (en) * | 1995-10-09 | 1997-04-16 | Matsushita Electric Industrial Co., Ltd. | Method and apparatus for mutual authentication according to the challenge/response principle |
| EP1134929A1 (en) * | 2000-03-17 | 2001-09-19 | Lucent Technologies Inc. | Secure mutual network authentication and key exchange protocol |
| US20070076879A1 (en) * | 2005-10-03 | 2007-04-05 | Nokia Corporation | System, method and computer program product for authenticating a data agreement between network entities |
Non-Patent Citations (2)
| Title |
|---|
| BOYKO V ET AL: "PROVABLY SECURE PASSWORD-AUTHENTICATED KEY EXCHANGE USING DIFFIE-HELLMAN", ADVANCES IN CRYPTOLOGY - EUROCRYPT 2000. INTERNATIONAL CONF. ON THE THEORY AND APPLICATION OF CRYPTOGRAPHIC TECHNIQUES. BRUGES, BE, MAY 14, vol. VOL. 1807, 14 May 2000 (2000-05-14), pages 156 - 171, XP000896058, ISBN: 3-540-67517-5 * |
| JABLON D P: "STRONG PASSWORD-ONLY AUTHENTICATED KEY EXCHANGE", COMPUTER COMMUNICATION REVIEW, ACM, NEW YORK, NY, US, vol. 26, no. 5, October 1996 (1996-10-01), pages 5 - 26, XP000641968, ISSN: 0146-4833 * |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Islam et al. | An improved three party authenticated key exchange protocol using hash function and elliptic curve cryptography for mobile-commerce environments | |
| CN103986503B (en) | Safe bluetooth earphone and voice communication method thereof | |
| WO2014176046A3 (en) | Community of interest-based secured communications over ipsec | |
| PL1889503T3 (en) | Method for agreeing on a security key between at least one first and one second communications station for securing a communications link | |
| CN105306492B (en) | A kind of asynchronous cryptographic key negotiation method and device for security instant communication | |
| RU2016102035A (en) | EFFECTIVE NETWORK LEVEL FOR IPv6 PROTOCOL. | |
| WO2012148096A3 (en) | Method of sharing a session key between wireless communication terminals using a variable-length authentication code | |
| WO2008030523A3 (en) | Real privacy management authentication system | |
| MY203124A (en) | Wireless network connection method and apparatus, and storage medium | |
| WO2011017099A3 (en) | Secure communication using asymmetric cryptography and light-weight certificates | |
| MX2010003677A (en) | Secure wireless communication. | |
| WO2008048179A3 (en) | Cryptographic key management in communication networks | |
| EP4247034A3 (en) | Method and system for providing security from a radio access network | |
| SA114350627B1 (en) | Key agreement protocol | |
| WO2005101722A3 (en) | Asynchronous enhanced shared secret provisioning protocol | |
| CN104468126B (en) | A kind of safe communication system and method | |
| TW200633460A (en) | Method and system for deriving an encryption key using joint randomness not shared by others | |
| WO2012092072A3 (en) | System and method for mutually authenticated cryptographic key exchange using matrices | |
| WO2016144257A3 (en) | Method and system for facilitating authentication | |
| WO2008078101A3 (en) | Method and device for mutual authentication | |
| NZ592061A (en) | Secure negotiation of authentication capabilities | |
| MY142729A (en) | Bootstrapping authentication using distinguished random challenges | |
| CN102685749A (en) | Wireless safety authentication method orienting to mobile terminal | |
| CN107493169A (en) | A kind of authentication identifying method based on quantum key and national secret algorithm | |
| CN102833748A (en) | Wireless network lightweight class authentication key negotiation protocol based on digital certificate |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| PG | Patent granted | ||
| ML | Lapse due to non-payment of fees |
Effective date: 20141203 |