CA2062170A1 - Key distribution system for distributing a cipher key between two subsystems by one-way communication - Google Patents

Key distribution system for distributing a cipher key between two subsystems by one-way communication

Info

Publication number
CA2062170A1
CA2062170A1 CA2062170A CA2062170A CA2062170A1 CA 2062170 A1 CA2062170 A1 CA 2062170A1 CA 2062170 A CA2062170 A CA 2062170A CA 2062170 A CA2062170 A CA 2062170A CA 2062170 A1 CA2062170 A1 CA 2062170A1
Authority
CA
Canada
Prior art keywords
cipher key
subsystem
key
information
public
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CA2062170A
Other languages
French (fr)
Other versions
CA2062170C (en
Inventor
Kazue Tanaka
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
NEC Corp
Original Assignee
Kazue Tanaka
Nec Corporation
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Kazue Tanaka, Nec Corporation filed Critical Kazue Tanaka
Publication of CA2062170A1 publication Critical patent/CA2062170A1/en
Application granted granted Critical
Publication of CA2062170C publication Critical patent/CA2062170C/en
Anticipated expiration legal-status Critical
Expired - Fee Related legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0838Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
    • H04L9/0841Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols
    • H04L9/0844Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols with user authentication or key authentication, e.g. ElGamal, MTI, MQV-Menezes-Qu-Vanstone protocol or Diffie-Hellman protocols using implicitly-certified keys

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Storage Device Security (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

In a key distribution system comprising a first subsystem (11), a second subsystem (12), and a public file (13), the first subsystem transmits distribution information (IDA, YA) to the second subsystem via a communication channel (16). The first subsystem (11) comprises a reading unit (22) for accessing the public file by reception identification information (IDB) inputted from an input unit (21) to read reception public information (XB). A first cipher key generator (28) generates a first cipher key (KA) by applying a first predetermined transformation on the reception public information and the reception identification information on the basis of first and second constants (n, t), and a random number (r). A distribution code generator (29) generates a key distribution code (YA) by applying a second predetermined transformation on transmission public information (XA) and a third constant (?) on the basis of the first constant, first secret information (rA), and the random number. The second subsystem comprises a second cipher key generator (35) for generating a second cipher key (KB) by applying a third predetermined transformation on the key distribution code and the transmission identification information on the basis of the first and the second constants and second secret information (rB). The second cipher key coincides with the first cipher key.
CA002062170A 1991-03-05 1992-03-02 Key distribution system for distributing a cipher key between two subsystems by one-way communication Expired - Fee Related CA2062170C (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
JP119544/1991 1991-03-05
JP3119544A JP2725478B2 (en) 1991-03-05 1991-03-05 Encryption key distribution method

Publications (2)

Publication Number Publication Date
CA2062170A1 true CA2062170A1 (en) 1992-09-06
CA2062170C CA2062170C (en) 1997-03-04

Family

ID=14763933

Family Applications (1)

Application Number Title Priority Date Filing Date
CA002062170A Expired - Fee Related CA2062170C (en) 1991-03-05 1992-03-02 Key distribution system for distributing a cipher key between two subsystems by one-way communication

Country Status (5)

Country Link
US (1) US5251258A (en)
EP (1) EP0502441B1 (en)
JP (1) JP2725478B2 (en)
CA (1) CA2062170C (en)
DE (1) DE69227936T2 (en)

Families Citing this family (20)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH06175905A (en) * 1992-12-03 1994-06-24 Fujitsu Ltd Ciphered file sharing method
US5677954A (en) * 1993-07-07 1997-10-14 Ntt Mobile Communications Network, Inc. Cryptical control method for personal communication
EP0711480B1 (en) * 1993-07-27 1997-06-11 International Business Machines Corporation Method and system for authenticated secure key distribution in a communication system
US5668878A (en) * 1994-02-28 1997-09-16 Brands; Stefanus Alfonsus Secure cryptographic methods for electronic transfer of information
FR2717334B1 (en) * 1994-03-11 1996-04-19 Pierre Rolin Integrity check of data exchanged between two telecommunications network stations.
US5838792A (en) * 1994-07-18 1998-11-17 Bell Atlantic Network Services, Inc. Computer system for centralized session key distribution, privacy enhanced messaging and information distribution using a split private key public cryptosystem
US5557678A (en) * 1994-07-18 1996-09-17 Bell Atlantic Network Services, Inc. System and method for centralized session key distribution, privacy enhanced messaging and information distribution using a split private key public cryptosystem
US5748735A (en) * 1994-07-18 1998-05-05 Bell Atlantic Network Services, Inc. Securing E-mail communications and encrypted file storage using yaksha split private key asymmetric cryptography
US5588059A (en) * 1995-03-02 1996-12-24 Motorola, Inc. Computer system and method for secure remote communication sessions
EP0735472A3 (en) * 1995-03-31 2000-01-19 Sun Microsystems, Inc. Method and apparatus for conspiracy among objects
US5684951A (en) * 1996-03-20 1997-11-04 Synopsys, Inc. Method and system for user authorization over a multi-user computer system
GB2319704B (en) * 1996-11-15 2001-07-04 Desktop Guardian Ltd Data encryption technique
US6944763B1 (en) * 1999-04-13 2005-09-13 Sony Corporation Data transmission system
JP2001211154A (en) * 2000-01-25 2001-08-03 Murata Mach Ltd Secret key generating method, ciphering method, and cipher communication method
JP2001211155A (en) * 2000-01-25 2001-08-03 Murata Mach Ltd Method and device for generating common key and cipher communication method
SE517460C2 (en) * 2000-03-24 2002-06-11 Imp Internat Ab Method and system for encryption and authentication
JP2007288254A (en) * 2006-04-12 2007-11-01 Sony Corp Communication system, communication apparatus and method, and program
US8707042B2 (en) * 2008-08-28 2014-04-22 Red Hat, Inc. Sharing keys between cooperating parties
KR20130049542A (en) * 2011-11-04 2013-05-14 삼성전자주식회사 Memory device and memory systme comprising the device
CN109240974A (en) * 2017-07-10 2019-01-18 比亚迪股份有限公司 Double 2-vote-2 system synchronous method and computer equipment

Family Cites Families (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4200770A (en) * 1977-09-06 1980-04-29 Stanford University Cryptographic apparatus and method
DE3782780T2 (en) * 1986-08-22 1993-06-09 Nec Corp KEY DISTRIBUTION PROCEDURE.
US4908861A (en) * 1987-08-28 1990-03-13 International Business Machines Corporation Data authentication using modification detection codes based on a public one way encryption function
JP2734726B2 (en) * 1989-03-03 1998-04-02 日本電気株式会社 Encryption key distribution method
CA2011396C (en) * 1989-03-03 1995-01-03 Kazue Tanaka Cipher-key distribution system
US4956863A (en) * 1989-04-17 1990-09-11 Trw Inc. Cryptographic method and apparatus for public key exchange with authentication
JP2606419B2 (en) * 1989-08-07 1997-05-07 松下電器産業株式会社 Cryptographic communication system and cryptographic communication method
JP3080382B2 (en) * 1990-02-21 2000-08-28 株式会社日立製作所 Cryptographic communication system
US5142578A (en) * 1991-08-22 1992-08-25 International Business Machines Corporation Hybrid public key algorithm/data encryption algorithm key distribution method based on control vectors

Also Published As

Publication number Publication date
EP0502441A2 (en) 1992-09-09
DE69227936T2 (en) 1999-05-27
JPH04277951A (en) 1992-10-02
US5251258A (en) 1993-10-05
EP0502441B1 (en) 1998-12-23
JP2725478B2 (en) 1998-03-11
CA2062170C (en) 1997-03-04
EP0502441A3 (en) 1993-06-23
DE69227936D1 (en) 1999-02-04

Similar Documents

Publication Publication Date Title
CA2062170A1 (en) Key distribution system for distributing a cipher key between two subsystems by one-way communication
EP0385511A3 (en) Cipher-key distribution system
TW347498B (en) Information supply system
EP0944992B1 (en) Method and device for the remote operation and remote control of systems and apparatus via a telephone network
CA2010450A1 (en) Method for encrypting transmitted data using a unique key
TW369778B (en) Method for providing a secure communication between two devices and application of this method
CA2219344A1 (en) Method for granting authorized users to access a computer system
CA2150825A1 (en) Methods and apparatus for uniquely end encrypting data
EP0725512A3 (en) Data communication system using public keys
ATE171331T1 (en) DEVICE AND METHOD FOR SECURING COMMUNICATION SYSTEMS
CA2287181A1 (en) Telecommunications apparatus and method
CA2313242A1 (en) Data communications
CA2164173A1 (en) Method and Apparatus for Incremental Delivery of Access Rights
MY136291A (en) Method, communications system and receiving device for the billing of access-controlled programs and/or data from broadcast transmitters
CA2177154A1 (en) Electronic book selection and delivery system
MY124136A (en) Communication method, and information processing apparatus
CA2197676A1 (en) User Authentication in a Communications Network
DE60029455D1 (en) ELECTRONIC MONEY, ASSOCIATED ELECTRONIC STOCK AND THESE ELECTRONIC PAYMENT SYSTEMS USED
SE9300543L (en) Procedure for information transfer and device for carrying out the procedure
CA2474856A1 (en) Method and apparatus for generating a stream cipher
SG43321A1 (en) A data exchange system with a check of the apparatus for its authentication status
WO2001037478A3 (en) Encryption key management system using multiple smart cards
ATE310344T1 (en) METHOD FOR INTRODUCING A SERVICE KEY INTO A TERMINAL DEVICE AND DEVICES FOR CARRYING OUT THE METHOD
ATE59720T1 (en) TERMINAL FOR PROTECTED ACCESS SYSTEM.
AU2297597A (en) Function access control system with encryption using a plurality of dynamic variables

Legal Events

Date Code Title Description
EEER Examination request
MKLA Lapsed