Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and apparatus for determining a cryptographic key in a network

A cryptographic key, network technology, applied in the field of computer program products

Active Publication Date: 2014-03-26
ROBERT BOSCH GMBH
View PDF3 Cites 27 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, decryption is only possible with the associated private key, which is ideally known only to the receiver

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and apparatus for determining a cryptographic key in a network
  • Method and apparatus for determining a cryptographic key in a network
  • Method and apparatus for determining a cryptographic key in a network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0051] In the following description of preferred exemplary embodiments of the present invention, the same or similar reference signs are used for elements shown in different figures and acting similarly, wherein a repeated description of these elements is omitted.

[0052] figure 1 A schematic diagram of a network according to an embodiment of the present invention is shown. A network with a first network element 102 , a second network element 104 and a network node 106 is shown. The first network element 102 is also denoted Alice, the second network element 104 is also denoted Bob and the network node 106 is also denoted Max. In general, network elements 102, 104 and network nodes 106 may also be generally referred to as nodes.

[0053]The first network element 102 can communicate with the network node 106 via the first transmission channel 112 , whereby data can be transmitted between the first network element 102 and the network node 106 via the first transmission channel...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a method for generating a cryptographic key in a network. The network has a first network element (102), a second network element (104) and a network node (106), wherein the first network element can communicate with the network node via a first transmission channel (112) while the second network element can communicated with the network node via a second transmission channel (114). The method comprises, on the part of the first network element, a step of determining a first channel information on the first transmission channel based on a first pilot signal emitted from the network node, and a step of determining the symmetric cryptographic key using the first channel information and information on a combined channel information, wherein the combined channel information represents a combination of transmission characteristics of the first and the second transmission channel ( 112, 114), determined based on a second pilot signal transmitted to the network node by the second network element and a third pilot signal transmitted to the network node by the first network element at the network node side.

Description

technical field [0001] The invention relates to a method for finding a cryptographic key in a network, a method for assisting in finding a symmetric cryptographic key in a network, a corresponding device and a corresponding computer program product. Background technique [0002] Maintaining the confidentiality of data to be transmitted is one of the important protection goals in the field of communication security. Suitable encryption methods are usually used for this, ie the corresponding data are not transmitted in clear text, but are first encrypted on the sender side and then decrypted again on the receiver side. A potential attacker who can only eavesdrop on the transmitted signal cannot therefore easily reconstruct the original data in clear text. [0003] Such encryption of confidential data is particularly important in wireless communication systems, since the transmitted signals can always be received and intercepted by potential attackers in the vicinity without g...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L9/30H04L9/32
CPCH04L9/0827H04L9/28H04L9/0875H04L63/0435H04W12/041H04W12/79
Inventor A.米勒
Owner ROBERT BOSCH GMBH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products