CA2062170A1 - Key distribution system for distributing a cipher key between two subsystems by one-way communication - Google Patents
Key distribution system for distributing a cipher key between two subsystems by one-way communicationInfo
- Publication number
- CA2062170A1 CA2062170A1 CA2062170A CA2062170A CA2062170A1 CA 2062170 A1 CA2062170 A1 CA 2062170A1 CA 2062170 A CA2062170 A CA 2062170A CA 2062170 A CA2062170 A CA 2062170A CA 2062170 A1 CA2062170 A1 CA 2062170A1
- Authority
- CA
- Canada
- Prior art keywords
- cipher key
- subsystem
- key
- information
- public
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0838—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
- H04L9/0841—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols
- H04L9/0844—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols with user authentication or key authentication, e.g. ElGamal, MTI, MQV-Menezes-Qu-Vanstone protocol or Diffie-Hellman protocols using implicitly-certified keys
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Storage Device Security (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
In a key distribution system comprising a first subsystem (11), a second subsystem (12), and a public file (13), the first subsystem transmits distribution information (IDA, YA) to the second subsystem via a communication channel (16). The first subsystem (11) comprises a reading unit (22) for accessing the public file by reception identification information (IDB) inputted from an input unit (21) to read reception public information (XB). A first cipher key generator (28) generates a first cipher key (KA) by applying a first predetermined transformation on the reception public information and the reception identification information on the basis of first and second constants (n, t), and a random number (r). A distribution code generator (29) generates a key distribution code (YA) by applying a second predetermined transformation on transmission public information (XA) and a third constant (?) on the basis of the first constant, first secret information (rA), and the random number. The second subsystem comprises a second cipher key generator (35) for generating a second cipher key (KB) by applying a third predetermined transformation on the key distribution code and the transmission identification information on the basis of the first and the second constants and second secret information (rB). The second cipher key coincides with the first cipher key.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP119544/1991 | 1991-03-05 | ||
JP3119544A JP2725478B2 (en) | 1991-03-05 | 1991-03-05 | Encryption key distribution method |
Publications (2)
Publication Number | Publication Date |
---|---|
CA2062170A1 true CA2062170A1 (en) | 1992-09-06 |
CA2062170C CA2062170C (en) | 1997-03-04 |
Family
ID=14763933
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CA002062170A Expired - Fee Related CA2062170C (en) | 1991-03-05 | 1992-03-02 | Key distribution system for distributing a cipher key between two subsystems by one-way communication |
Country Status (5)
Country | Link |
---|---|
US (1) | US5251258A (en) |
EP (1) | EP0502441B1 (en) |
JP (1) | JP2725478B2 (en) |
CA (1) | CA2062170C (en) |
DE (1) | DE69227936T2 (en) |
Families Citing this family (20)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPH06175905A (en) * | 1992-12-03 | 1994-06-24 | Fujitsu Ltd | Ciphered file sharing method |
US5677954A (en) * | 1993-07-07 | 1997-10-14 | Ntt Mobile Communications Network, Inc. | Cryptical control method for personal communication |
EP0711480B1 (en) * | 1993-07-27 | 1997-06-11 | International Business Machines Corporation | Method and system for authenticated secure key distribution in a communication system |
US5668878A (en) * | 1994-02-28 | 1997-09-16 | Brands; Stefanus Alfonsus | Secure cryptographic methods for electronic transfer of information |
FR2717334B1 (en) * | 1994-03-11 | 1996-04-19 | Pierre Rolin | Integrity check of data exchanged between two telecommunications network stations. |
US5838792A (en) * | 1994-07-18 | 1998-11-17 | Bell Atlantic Network Services, Inc. | Computer system for centralized session key distribution, privacy enhanced messaging and information distribution using a split private key public cryptosystem |
US5557678A (en) * | 1994-07-18 | 1996-09-17 | Bell Atlantic Network Services, Inc. | System and method for centralized session key distribution, privacy enhanced messaging and information distribution using a split private key public cryptosystem |
US5748735A (en) * | 1994-07-18 | 1998-05-05 | Bell Atlantic Network Services, Inc. | Securing E-mail communications and encrypted file storage using yaksha split private key asymmetric cryptography |
US5588059A (en) * | 1995-03-02 | 1996-12-24 | Motorola, Inc. | Computer system and method for secure remote communication sessions |
EP0735472A3 (en) * | 1995-03-31 | 2000-01-19 | Sun Microsystems, Inc. | Method and apparatus for conspiracy among objects |
US5684951A (en) * | 1996-03-20 | 1997-11-04 | Synopsys, Inc. | Method and system for user authorization over a multi-user computer system |
GB2319704B (en) * | 1996-11-15 | 2001-07-04 | Desktop Guardian Ltd | Data encryption technique |
US6944763B1 (en) * | 1999-04-13 | 2005-09-13 | Sony Corporation | Data transmission system |
JP2001211154A (en) * | 2000-01-25 | 2001-08-03 | Murata Mach Ltd | Secret key generating method, ciphering method, and cipher communication method |
JP2001211155A (en) * | 2000-01-25 | 2001-08-03 | Murata Mach Ltd | Method and device for generating common key and cipher communication method |
SE517460C2 (en) * | 2000-03-24 | 2002-06-11 | Imp Internat Ab | Method and system for encryption and authentication |
JP2007288254A (en) * | 2006-04-12 | 2007-11-01 | Sony Corp | Communication system, communication apparatus and method, and program |
US8707042B2 (en) * | 2008-08-28 | 2014-04-22 | Red Hat, Inc. | Sharing keys between cooperating parties |
KR20130049542A (en) * | 2011-11-04 | 2013-05-14 | 삼성전자주식회사 | Memory device and memory systme comprising the device |
CN109240974A (en) * | 2017-07-10 | 2019-01-18 | 比亚迪股份有限公司 | Double 2-vote-2 system synchronous method and computer equipment |
Family Cites Families (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4200770A (en) * | 1977-09-06 | 1980-04-29 | Stanford University | Cryptographic apparatus and method |
DE3782780T2 (en) * | 1986-08-22 | 1993-06-09 | Nec Corp | KEY DISTRIBUTION PROCEDURE. |
US4908861A (en) * | 1987-08-28 | 1990-03-13 | International Business Machines Corporation | Data authentication using modification detection codes based on a public one way encryption function |
JP2734726B2 (en) * | 1989-03-03 | 1998-04-02 | 日本電気株式会社 | Encryption key distribution method |
CA2011396C (en) * | 1989-03-03 | 1995-01-03 | Kazue Tanaka | Cipher-key distribution system |
US4956863A (en) * | 1989-04-17 | 1990-09-11 | Trw Inc. | Cryptographic method and apparatus for public key exchange with authentication |
JP2606419B2 (en) * | 1989-08-07 | 1997-05-07 | 松下電器産業株式会社 | Cryptographic communication system and cryptographic communication method |
JP3080382B2 (en) * | 1990-02-21 | 2000-08-28 | 株式会社日立製作所 | Cryptographic communication system |
US5142578A (en) * | 1991-08-22 | 1992-08-25 | International Business Machines Corporation | Hybrid public key algorithm/data encryption algorithm key distribution method based on control vectors |
-
1991
- 1991-03-05 JP JP3119544A patent/JP2725478B2/en not_active Expired - Fee Related
-
1992
- 1992-02-28 EP EP92103460A patent/EP0502441B1/en not_active Expired - Lifetime
- 1992-02-28 DE DE69227936T patent/DE69227936T2/en not_active Expired - Fee Related
- 1992-02-28 US US07/843,275 patent/US5251258A/en not_active Expired - Lifetime
- 1992-03-02 CA CA002062170A patent/CA2062170C/en not_active Expired - Fee Related
Also Published As
Publication number | Publication date |
---|---|
EP0502441A2 (en) | 1992-09-09 |
DE69227936T2 (en) | 1999-05-27 |
JPH04277951A (en) | 1992-10-02 |
US5251258A (en) | 1993-10-05 |
EP0502441B1 (en) | 1998-12-23 |
JP2725478B2 (en) | 1998-03-11 |
CA2062170C (en) | 1997-03-04 |
EP0502441A3 (en) | 1993-06-23 |
DE69227936D1 (en) | 1999-02-04 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CA2062170A1 (en) | Key distribution system for distributing a cipher key between two subsystems by one-way communication | |
EP0385511A3 (en) | Cipher-key distribution system | |
TW347498B (en) | Information supply system | |
EP0944992B1 (en) | Method and device for the remote operation and remote control of systems and apparatus via a telephone network | |
CA2010450A1 (en) | Method for encrypting transmitted data using a unique key | |
TW369778B (en) | Method for providing a secure communication between two devices and application of this method | |
CA2219344A1 (en) | Method for granting authorized users to access a computer system | |
CA2150825A1 (en) | Methods and apparatus for uniquely end encrypting data | |
EP0725512A3 (en) | Data communication system using public keys | |
ATE171331T1 (en) | DEVICE AND METHOD FOR SECURING COMMUNICATION SYSTEMS | |
CA2287181A1 (en) | Telecommunications apparatus and method | |
CA2313242A1 (en) | Data communications | |
CA2164173A1 (en) | Method and Apparatus for Incremental Delivery of Access Rights | |
MY136291A (en) | Method, communications system and receiving device for the billing of access-controlled programs and/or data from broadcast transmitters | |
CA2177154A1 (en) | Electronic book selection and delivery system | |
MY124136A (en) | Communication method, and information processing apparatus | |
CA2197676A1 (en) | User Authentication in a Communications Network | |
DE60029455D1 (en) | ELECTRONIC MONEY, ASSOCIATED ELECTRONIC STOCK AND THESE ELECTRONIC PAYMENT SYSTEMS USED | |
SE9300543L (en) | Procedure for information transfer and device for carrying out the procedure | |
CA2474856A1 (en) | Method and apparatus for generating a stream cipher | |
SG43321A1 (en) | A data exchange system with a check of the apparatus for its authentication status | |
WO2001037478A3 (en) | Encryption key management system using multiple smart cards | |
ATE310344T1 (en) | METHOD FOR INTRODUCING A SERVICE KEY INTO A TERMINAL DEVICE AND DEVICES FOR CARRYING OUT THE METHOD | |
ATE59720T1 (en) | TERMINAL FOR PROTECTED ACCESS SYSTEM. | |
AU2297597A (en) | Function access control system with encryption using a plurality of dynamic variables |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
EEER | Examination request | ||
MKLA | Lapsed |