Unlock instant, AI-driven research and patent intelligence for your innovation.

Apparatus and method for generating secret key

A technology for secret keys and keys, applied in the field of machine-readable storage media, to achieve the effect of reducing the probability of success

Active Publication Date: 2015-11-25
ROBERT BOSCH GMBH
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This strategy implies the risk of model-based or interception-based attacks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Apparatus and method for generating secret key
  • Apparatus and method for generating secret key
  • Apparatus and method for generating secret key

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0016] figure 1 The basic application of the method according to the invention is depicted in a schematic and simplified manner. The point of departure for the observation here is the computer network 10 , which comprises a plurality of nodes 14 that are already connected to one another in a secure manner. The cloud 12 connecting these nodes 14 represents the situation in which, in addition to the nodes 14 indicated by the symbol, any number of further nodes can participate in the computer network 10 , said further nodes enabling, for example, a direct connection of the nodes 14 within the computer network 10 . .

[0017] Thus, the nodes 14 may be, for example, wireless access points (APs), which provide access to the Internet 10 by means of the general backbone 12 . In another embodiment, the computer network 10 may be a WBAN or other wireless sensor network (WSN), the lower protocol layer corresponds to the standard IEEE802.15.4, and the routing and application interface m...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to an apparatus and a method for generating a secret key. The method has following characteristics: multiple nodes of a computer network send first signals to added nodes in a synchronous manner in terms of time; the first signals are superposed to second signals; the added nodes receive the second signals; the added nodes send third signals to the nodes of the computer network; the nodes of the computer network respectively receive fourth signals corresponding to the third signal from the added node; the nodes of the computer network respectively send fifth signals to the other nodes according to the fourth signals; the other nodes receive the fifth signals; the other nodes determine at least an approximation value of the second signals according to the fifth signals, and the added nodes and the other nodes generate the key according to the second signals and the approximate value, in particular adjusting the second signals by employing the approximate value. The invention further relates to an established apparatus for implementing the method, a corresponding computer program and a computer readable storage medium having the computer program.

Description

technical field [0001] The present invention relates to a method according to the preamble of patent claim 1 . The invention furthermore relates to a device designed to carry out such a method, a corresponding computer program and a machine-readable storage medium having such a program. Background technique [0002] A symmetric cryptosystem is a cryptosystem in which, unlike asymmetric cryptosystems, all involved (legitimate) users use the same key. Encrypting and decrypting data using the same key for computing and verifying message authentication codes, etc. brings: the key itself must first be distributed before each encrypted exchange. But because the security of the whole method is related to the secrecy of the key, the traditional scheme is usually designed to exchange the key through a secure channel. This can be done in particular by manually introducing the keys into the individual users, for example by entering a password, from which the actual keys can then be d...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08
CPCH04L9/12H04L2209/80
Inventor A.米勒
Owner ROBERT BOSCH GMBH