CA2210763A1 - Key generation from a given string for entity authentication - Google Patents

Key generation from a given string for entity authentication

Info

Publication number
CA2210763A1
CA2210763A1 CA 2210763 CA2210763A CA2210763A1 CA 2210763 A1 CA2210763 A1 CA 2210763A1 CA 2210763 CA2210763 CA 2210763 CA 2210763 A CA2210763 A CA 2210763A CA 2210763 A1 CA2210763 A1 CA 2210763A1
Authority
CA
Canada
Prior art keywords
bitstream
character string
bitstreams
sub
given
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CA 2210763
Other languages
French (fr)
Other versions
CA2210763C (en
Inventor
Weidong Kou
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
IBM Canada Ltd
Original Assignee
IBM Canada Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by IBM Canada Ltd filed Critical IBM Canada Ltd
Priority to CA 2210763 priority Critical patent/CA2210763C/en
Publication of CA2210763A1 publication Critical patent/CA2210763A1/en
Application granted granted Critical
Publication of CA2210763C publication Critical patent/CA2210763C/en
Anticipated expiration legal-status Critical
Expired - Fee Related legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/065Encryption by serially and continuously modifying data stream elements, e.g. stream cipher systems, RC4, SEAL or A5/3
    • H04L9/0656Pseudorandom key sequence combined element-for-element with data sequence, e.g. one-time-pad [OTP] or Vernam's cipher
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN

Abstract

The invention provides a scheme for generating a symmetric encryption key for a given character string, such as a password or an alphanumeric. There is no limitation on the length or content of the given character string. The character string is converted to a bitstream using a standard character encoding scheme, such as ASCII. The bitstream is then subjected to combinations of bitstream processing operations over multiple rounds. The bitstream processing operations can include splitting the bitstream into multiple sub-bitstreams, reordering and shuffling the sub-bitstreams, performing logical bit-wise operations on the sub-bitstreams, performing one-way hashing on the sub-bitstreams, and combining the multiple sub-bitstreams back into a single bitstream through logical bit-wise operations on the sub-bitstreams. Prior to converting the character string into a bitstream, the given character string may be optionally combined with an initialization character string (for example, an initialization string associated with a particular processor), and it is the combined character string that is then encoded and used for generating an encryption key. Applying the combination rounds of the bitstream processes multiple times, for example sixteen times, will result in a strong key for encryption.
CA 2210763 1997-07-17 1997-07-17 Key generation from a given string for entity authentication Expired - Fee Related CA2210763C (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CA 2210763 CA2210763C (en) 1997-07-17 1997-07-17 Key generation from a given string for entity authentication

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CA 2210763 CA2210763C (en) 1997-07-17 1997-07-17 Key generation from a given string for entity authentication

Publications (2)

Publication Number Publication Date
CA2210763A1 true CA2210763A1 (en) 1999-01-17
CA2210763C CA2210763C (en) 2000-02-29

Family

ID=4161080

Family Applications (1)

Application Number Title Priority Date Filing Date
CA 2210763 Expired - Fee Related CA2210763C (en) 1997-07-17 1997-07-17 Key generation from a given string for entity authentication

Country Status (1)

Country Link
CA (1) CA2210763C (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2001013572A1 (en) * 1999-08-19 2001-02-22 Visto Corporation System and method for encrypting and decrypting files
US6233341B1 (en) 1998-05-19 2001-05-15 Visto Corporation System and method for installing and using a temporary certificate at a remote site
US6708221B1 (en) 1996-12-13 2004-03-16 Visto Corporation System and method for globally and securely accessing unified information in a computer network
US6766454B1 (en) 1997-04-08 2004-07-20 Visto Corporation System and method for using an authentication applet to identify and authenticate a user in a computer network
US7739334B1 (en) 2000-03-17 2010-06-15 Visto Corporation System and method for automatically forwarding email and email events via a computer network to a server computer
US7752166B2 (en) 2001-11-15 2010-07-06 Visto Corporation System and methods for asynchronous synchronization
US8117450B2 (en) * 2001-10-11 2012-02-14 Hewlett-Packard Development Company, L.P. System and method for secure data transmission

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060195595A1 (en) 2003-12-19 2006-08-31 Mendez Daniel J System and method for globally and securely accessing unified information in a computer network
US8549314B2 (en) 2010-04-29 2013-10-01 King Saud University Password generation methods and systems
DE102011016150A1 (en) * 2011-03-28 2012-10-04 Jurij Schilling Method for authentication of code password based on algorithm, involves using authentication not only between processing system and user, but also between processing system and another processing system
US9083510B1 (en) * 2013-03-13 2015-07-14 Emc Corporation Generation and management of crypto key for cloud data

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6708221B1 (en) 1996-12-13 2004-03-16 Visto Corporation System and method for globally and securely accessing unified information in a computer network
US6766454B1 (en) 1997-04-08 2004-07-20 Visto Corporation System and method for using an authentication applet to identify and authenticate a user in a computer network
US6233341B1 (en) 1998-05-19 2001-05-15 Visto Corporation System and method for installing and using a temporary certificate at a remote site
WO2001013572A1 (en) * 1999-08-19 2001-02-22 Visto Corporation System and method for encrypting and decrypting files
US7373517B1 (en) 1999-08-19 2008-05-13 Visto Corporation System and method for encrypting and decrypting files
US7739334B1 (en) 2000-03-17 2010-06-15 Visto Corporation System and method for automatically forwarding email and email events via a computer network to a server computer
US8117450B2 (en) * 2001-10-11 2012-02-14 Hewlett-Packard Development Company, L.P. System and method for secure data transmission
US7752166B2 (en) 2001-11-15 2010-07-06 Visto Corporation System and methods for asynchronous synchronization
US8069144B2 (en) 2001-11-15 2011-11-29 Visto Corporation System and methods for asynchronous synchronization
US8255359B2 (en) 2001-11-15 2012-08-28 Visto Corporation System and methods for asynchronous synchronization

Also Published As

Publication number Publication date
CA2210763C (en) 2000-02-29

Similar Documents

Publication Publication Date Title
HUP9902892A2 (en) Method and apparatus for providing for the recovery of a cryptographic key
US4288659A (en) Method and means for securing the distribution of encoding keys
NZ500201A (en) Downloading data to an MPEG receiver/decoder
EP0792043A3 (en) Method of sharing cryptokey
TWI268688B (en) System and method for acoustic two factor authentication
EP1699165A3 (en) Authentication of data transmitted in a digital transmission system
Hindi et al. A novel technique for data steganography
EP1248408A3 (en) Methods and apparatus for providing efficient password-authenticated key exchange
HUP0100232A2 (en) Method and apparatus for encrypted data stream transmission
CA2210763A1 (en) Key generation from a given string for entity authentication
TW367684B (en) A process of cryptographic communication
CA2056886A1 (en) Method for secure communication
AU2002212345A1 (en) Method and system for web-based cross-domain single-sign-on authentication
EP0966126A3 (en) Encrypting speech coder
EP0802654A3 (en) Enciphering method, deciphering method and certifying method
EP0894377A4 (en) A method for providing a secure non-reusable one-time password
HK83995A (en) Method for having a portable object, such as a memory card coupled to an external medium, be authenticated by this medium
CA2109554A1 (en) Secure Document and Method and Apparatus for Producing and Authenticating Same
TW375721B (en) DES chip processor capable of executing data encryption standard (DES) operation
CA2197915A1 (en) Cryptographic key recovery system
EP0792045A3 (en) Method and apparatus for authentication using digital signatures
CA2235359A1 (en) Implicit certificate scheme with ca chaining
CA2151590A1 (en) Method of Extending the Validity of a Cryptographic Certificate
WO2001056221B1 (en) Block encryption method and schemes for data confidentiality and integrity protection
WO1998047259A3 (en) File encryption method and system

Legal Events

Date Code Title Description
EEER Examination request
MKLA Lapsed