Secure authenticated channel
A certificate and equipment technology, which is applied to secure communication devices, public keys for secure communication, and key distribution, and can solve problems such as difficult implementation, difficulty in proving protocol security, and resource consumption.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0015] Fig. 1 shows a session key exchange according to an embodiment of the present invention.
[0016] Before the method starts, the first device 11 knows its identity ID a , Its own private key a and public key g a . g a Is g a Shorthand for mod p, where a is the private key of the first device, g is a known generator and p is a known prime number, these are well known in the art. The second device 21 has corresponding knowledge: ID b , B, g b . The certificate of the device includes the public key and identity, respectively C a (g a , ID a ) And C b (g b , ID b ). The devices 11, 12 also have processors (CPU) 12, 22 adapted to implement the steps of the method.
[0017] At step 252, the first device 11 preferably selects the first ephemeral private key x in a random manner and calculates the ephemeral public key g x , And then put the public key g x Certificate C with the first device 11 a (g a , ID a ) Is sent to the second device 21 together in a message 254.
[0018] Upon r...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 