Updating and distributing encryption keys

A key and storage key technology, applied in key distribution, can solve the problem of not being able to know the dual key and so on

Inactive Publication Date: 2010-02-17
INFINEON TECH AG
View PDF1 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Therefore, the first problem with providing secure communication between two nodes is the ability to pass secret information (such as encryption keys) on a shared medium without making it available to other nodes, which secret information enables Encryption between two nodes
[0005] The second problem is that even if a secret is passed between nodes without being compromised, encrypting a message with a secret over time will allow a third node to obtain that secret, allowing the third node to intercept and decrypt future messages. communication
A third node will not be able to learn the dual key from simply observing the exchange, even though it is not encrypted
However, if the PAK exchange is not used, but only a Diffie-Hellman exchange that is not password protected, there is a risk that node C acts as a MitM

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Updating and distributing encryption keys
  • Updating and distributing encryption keys
  • Updating and distributing encryption keys

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0030]The making and using of the presently preferred embodiments are discussed in detail below. It should be appreciated, however, that the present invention provides many applicable inventive concepts that can be embodied in a wide variety of specific contexts. The specific embodiments discussed are merely illustrative of specific ways to make and use the invention, and do not limit the scope of the invention.

[0031] The invention will be described with respect to a preferred embodiment in a specific context, ie a pair of nodes communicating with each other. However, the invention can also be applied to other communications, such as multicast, broadcast or other multiplex communications, where several nodes are used to communicate.

[0032] now refer to figure 1 , which illustrates a network environment 100 embodying features of the present invention. In network environment 100, node A communicates with node B directly. It should be noted that Node A and Node B are ill...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention relates to methods for updating and distributing encryption keys. System and method for providing secure communications is provided. Initially, an exchange protocol, such as a password-authenticated key exchange protocol, is used to create a shared secret. From the shared secret, two keys are created: a utilized key and a stored key. The utilized key is used to encrypt messages between nodes. When it is time to replace the utilized key to maintain security, the stored key is utilized to encrypt messages for generating / distributing a new shared secret. The new shared secret is then used to generate a new utilized key and a new stored key. This process may be repeated any number of times to maintain security.

Description

technical field [0001] The present invention relates generally to systems and methods for providing security to communication networks, and more particularly to systems and methods for generating and distributing encryption keys. Background technique [0002] In order to provide confidentiality to communications between nodes of a network, it is known to provide encryption for messages. In general, it is best to provide each pair of communicating nodes with a different encryption key so that messages communicated in such a pair are specific to that pair. In this way, the third node cannot decipher and know the communication, even if it is exposed to the message (as would normally happen in a network running on a shared medium). [0003] However, an encryption key must be provided to each pair of nodes before it can be used to encrypt communications. It is most important to provide the encryption key to the communicating nodes in a secure manner, because if a third node lea...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04L29/06
CPCH04L9/0844H04L9/0891
Inventor N·金V·奥克斯曼C·布里
Owner INFINEON TECH AG
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products