[go: up one dir, main page]

GR1005832B - Method of establishing strong keys and securing communications between wireless and other devices. - Google Patents

Method of establishing strong keys and securing communications between wireless and other devices.

Info

Publication number
GR1005832B
GR1005832B GR20070100303A GR20070100303A GR1005832B GR 1005832 B GR1005832 B GR 1005832B GR 20070100303 A GR20070100303 A GR 20070100303A GR 20070100303 A GR20070100303 A GR 20070100303A GR 1005832 B GR1005832 B GR 1005832B
Authority
GR
Greece
Prior art keywords
parties
common
key
devices
secure
Prior art date
Application number
GR20070100303A
Other languages
Greek (el)
Inventor
Περσεφονη Λαππα
Original Assignee
Περσεφονη Λαππα
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Περσεφονη Λαππα filed Critical Περσεφονη Λαππα
Priority to GR20070100303A priority Critical patent/GR1005832B/en
Publication of GR1005832B publication Critical patent/GR1005832B/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0838Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
    • H04L9/0841Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols
    • H04L9/0844Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols with user authentication or key authentication, e.g. ElGamal, MTI, MQV-Menezes-Qu-Vanstone protocol or Diffie-Hellman protocols using implicitly-certified keys
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/80Wireless

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The present invention provides a secure method for establishing cryptographic keys based on a Diffie-Hellman type of key exchange that can be used by two parties (devices, entities, etc.) to secure their in-between communications. The method uses commitments and older secrets for creating a sense of "continuity" with older attempts of communication (session/key continuity). The computation of the common Diffie-Hellman key is performed only after successful authentications take place. Then, the two parties verify the common secret using some secondary channel, such as for example, voice verification. In addition to the above, a warning indicator is provided that warns users if a common secret was discovered by the protocol using some appropriate interface. If users have interacted in the past, they should share common secrets. If this is not the case, a person-in-the-middle attack is taking place even if authentication values happen to match. Overall, the previous measures reduce the danger of attcks thus creating an effective and secure method for communication between two parties.
GR20070100303A 2007-05-22 2007-05-22 Method of establishing strong keys and securing communications between wireless and other devices. GR1005832B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
GR20070100303A GR1005832B (en) 2007-05-22 2007-05-22 Method of establishing strong keys and securing communications between wireless and other devices.

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
GR20070100303A GR1005832B (en) 2007-05-22 2007-05-22 Method of establishing strong keys and securing communications between wireless and other devices.

Publications (1)

Publication Number Publication Date
GR1005832B true GR1005832B (en) 2008-02-27

Family

ID=38819659

Family Applications (1)

Application Number Title Priority Date Filing Date
GR20070100303A GR1005832B (en) 2007-05-22 2007-05-22 Method of establishing strong keys and securing communications between wireless and other devices.

Country Status (1)

Country Link
GR (1) GR1005832B (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0768775A2 (en) * 1995-10-09 1997-04-16 Matsushita Electric Industrial Co., Ltd. Method and apparatus for mutual authentication according to the challenge/response principle
EP1134929A1 (en) * 2000-03-17 2001-09-19 Lucent Technologies Inc. Secure mutual network authentication and key exchange protocol
US20070076879A1 (en) * 2005-10-03 2007-04-05 Nokia Corporation System, method and computer program product for authenticating a data agreement between network entities

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0768775A2 (en) * 1995-10-09 1997-04-16 Matsushita Electric Industrial Co., Ltd. Method and apparatus for mutual authentication according to the challenge/response principle
EP1134929A1 (en) * 2000-03-17 2001-09-19 Lucent Technologies Inc. Secure mutual network authentication and key exchange protocol
US20070076879A1 (en) * 2005-10-03 2007-04-05 Nokia Corporation System, method and computer program product for authenticating a data agreement between network entities

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
BOYKO V ET AL: "PROVABLY SECURE PASSWORD-AUTHENTICATED KEY EXCHANGE USING DIFFIE-HELLMAN", ADVANCES IN CRYPTOLOGY - EUROCRYPT 2000. INTERNATIONAL CONF. ON THE THEORY AND APPLICATION OF CRYPTOGRAPHIC TECHNIQUES. BRUGES, BE, MAY 14, vol. VOL. 1807, 14 May 2000 (2000-05-14), pages 156 - 171, XP000896058, ISBN: 3-540-67517-5 *
JABLON D P: "STRONG PASSWORD-ONLY AUTHENTICATED KEY EXCHANGE", COMPUTER COMMUNICATION REVIEW, ACM, NEW YORK, NY, US, vol. 26, no. 5, October 1996 (1996-10-01), pages 5 - 26, XP000641968, ISSN: 0146-4833 *

Similar Documents

Publication Publication Date Title
Islam et al. An improved three party authenticated key exchange protocol using hash function and elliptic curve cryptography for mobile-commerce environments
CN103986503B (en) Safe bluetooth earphone and voice communication method thereof
WO2014176046A3 (en) Community of interest-based secured communications over ipsec
PL1889503T3 (en) Method for agreeing on a security key between at least one first and one second communications station for securing a communications link
CN105306492B (en) A kind of asynchronous cryptographic key negotiation method and device for security instant communication
RU2016102035A (en) EFFECTIVE NETWORK LEVEL FOR IPv6 PROTOCOL.
WO2012148096A3 (en) Method of sharing a session key between wireless communication terminals using a variable-length authentication code
WO2008030523A3 (en) Real privacy management authentication system
MY203124A (en) Wireless network connection method and apparatus, and storage medium
WO2011017099A3 (en) Secure communication using asymmetric cryptography and light-weight certificates
MX2010003677A (en) Secure wireless communication.
WO2008048179A3 (en) Cryptographic key management in communication networks
EP4247034A3 (en) Method and system for providing security from a radio access network
SA114350627B1 (en) Key agreement protocol
WO2005101722A3 (en) Asynchronous enhanced shared secret provisioning protocol
CN104468126B (en) A kind of safe communication system and method
TW200633460A (en) Method and system for deriving an encryption key using joint randomness not shared by others
WO2012092072A3 (en) System and method for mutually authenticated cryptographic key exchange using matrices
WO2016144257A3 (en) Method and system for facilitating authentication
WO2008078101A3 (en) Method and device for mutual authentication
NZ592061A (en) Secure negotiation of authentication capabilities
MY142729A (en) Bootstrapping authentication using distinguished random challenges
CN102685749A (en) Wireless safety authentication method orienting to mobile terminal
CN107493169A (en) A kind of authentication identifying method based on quantum key and national secret algorithm
CN102833748A (en) Wireless network lightweight class authentication key negotiation protocol based on digital certificate

Legal Events

Date Code Title Description
PG Patent granted
ML Lapse due to non-payment of fees

Effective date: 20141203