Unlock instant, AI-driven research and patent intelligence for your innovation.

Determination of cryptographic keys

A cryptographic key and cryptographic technology, which is applied in the field of determination of cryptographic keys, can solve problems such as system damage, and achieve the effects of improving security, increasing uncertainty, and hindering collusion attacks

Inactive Publication Date: 2015-01-21
KONINKLJIJKE PHILIPS NV
View PDF4 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Specifically, if , then it is possible to recover f with the help of lattice reduction technique A , leading to K A is identified and the system is compromised

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Determination of cryptographic keys
  • Determination of cryptographic keys
  • Determination of cryptographic keys

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0070] While the invention is susceptible to embodiments in many different forms, certain specific embodiments are shown in the drawings and will be described in detail herein, with the understanding that the disclosure should be considered exemplary and not intended to limit the invention For the specific embodiment shown and described.

[0071] The following description focuses on embodiments of the present invention applicable to wireless communication systems. However, it should be understood that the invention is not limited to this application, but may be applied to fully or partially wired communication systems, including for example the Internet.

[0072] figure 1 The figure shows an example of a wireless communication system in accordance with some embodiments of the invention.

[0073] The wireless communication system comprises a first communication unit 101 (or network device) and a second communication unit 103 (or network device) that seek to securely and priva...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A first communication unit (101) comprises: a processor (203) for obtaining local key material defining a first key generating function from a Trusted Third Party (TTP). An identity processor (205) obtaining an identity for a second communication unit (103and a key generator (207) determines a first cryptographic key from the first key generating function based on the identity. A generator (209) locally generates a perturbation value which is not uniquely determined by data originating from the TTP. A key modifier (211) determines a shared cryptographic key by applying the perturbation value to the first cryptographic key. The second communication unit (103) also obtains key modifying data and uses it to determine a cryptographic key for the first communication unit (101). It then generates possible values of the perturbation value, and subsequently possible shared cryptographic keys. It then selects one that matches cryptographic data from the first communication unit (101). The perturbation value may provide increased resistance against collusion attacks.

Description

technical field [0001] The present invention relates to the determination of cryptographic keys, and more particularly, to shared keys based on local keying material from trusted authorities. Background technique [0002] Communication systems have become ubiquitous and include wired and wireless systems, and private and public networks. For example, a widely spread set of wireless communication standards is the Wi-Fi family of communication standards, which are used, for example, in many homes to provide wireless networking and Internet access. The family of Wi-Fi communication standards includes, among other things, the widely circulated IEEE 802.11a, IEEE 802.11b, IEEE 802.11g, and IEEE 802.11n standards defined by the Institute of Electrical and Electronics Engineers (IEEE). Wi-Fi is also widely used in shops, hotels, restaurants, etc. to provide wireless Internet access. [0003] An important aspect of many communication systems and applications is the ability to supp...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08
CPCH04L9/0847H04L9/3093H04L9/0819H04L9/16H04L2209/24
Inventor O.加西亚莫乔恩L.M.G.M.托休泽恩
Owner KONINKLJIJKE PHILIPS NV