Unlock instant, AI-driven research and patent intelligence for your innovation.

Secure authenticated channel

A certificate and equipment technology, which is applied to secure communication devices, public keys for secure communication, and key distribution, and can solve problems such as difficult implementation, difficulty in proving protocol security, and resource consumption.

Inactive Publication Date: 2007-10-03
THOMSON LICENSING SA
View PDF0 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

One problem with these protocols is that they consume a lot of resources and are difficult to implement in devices with limited computing power, such as portable security modules like smart cards
Another problem: the use of multiple cryptographic primitives makes it difficult to prove that the protocol is secure

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Secure authenticated channel

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0015] Fig. 1 shows a session key exchange according to an embodiment of the present invention.

[0016] Before the method starts, the first device 11 knows its identity ID a , Its own private key a and public key g a . g a Is g a Shorthand for mod p, where a is the private key of the first device, g is a known generator and p is a known prime number, these are well known in the art. The second device 21 has corresponding knowledge: ID b , B, g b . The certificate of the device includes the public key and identity, respectively C a (g a , ID a ) And C b (g b , ID b ). The devices 11, 12 also have processors (CPU) 12, 22 adapted to implement the steps of the method.

[0017] At step 252, the first device 11 preferably selects the first ephemeral private key x in a random manner and calculates the ephemeral public key g x , And then put the public key g x Certificate C with the first device 11 a (g a , ID a ) Is sent to the second device 21 together in a message 254.

[0018] Upon r...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A protocol (i.e. method) and corresponding apparatuses for calculating a session key. Two peers with knowledge of a common Diffie-Hellman permanent key, Kperrn, and the identity and public key of the other peer. A first peer chooses a first ephemeral private key x and calculates the first corresponding ephemeral public key gx, which is sent to the second peer. The second peer calculates a second ephemeral public key gy in the same manner, and an ephemeral shared key Keph, hashes gy, Keph, Kperm, and its identity, and sends gy and the hash to the first peer. The first peer calculates Keph, verifies the hash, and hashes gx, Keph, Kpem, and its identity, and sends it to the second peer that verifies this hash. Thereafter, both peers obtain a session key by hashing Keph. The apparatuses may then use the session key to establish a secure authenticated channel (SAC).

Description

Technical field [0001] The present invention relates generally to a secure authentication channel, and in particular to the calculation of a session key used to establish such a channel, which is used to protect digital content, such as content in a digital television system. Background technique [0002] A secure authentication channel known in the field of cryptography is established to allow two mutually authenticated devices (usually called peers) to secretly exchange information. Preferably, the security authentication channel should have the following properties: [0003] -Mutual authentication of peers; [0004] -Key confirmation, that is, a public secret is established and at least one peer can verify that the secret is indeed public; [0005] -Forward secrecy, that is, the old session key cannot be calculated even when the long-term key (such as the certificate key) has been known. [0006] These properties can be formally proven mathematically, and what has been proven ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08
CPCH04L9/0841H04L9/30
Inventor 让·皮埃尔·安德烈奥斯阿兰·迪尔托马斯·西尔旺
Owner THOMSON LICENSING SA