Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method for generating secret or secret key in network

A secret, network technology, applied in the field of cryptographic keys, which can solve problems such as inefficiency and high computational complexity of asymmetric methods

Pending Publication Date: 2017-12-08
ROBERT BOSCH GMBH
View PDF6 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In order to achieve these protection goals, suitable cryptographic methods are usually used, which can generally be divided into two different categories: on the one hand symmetric methods, in which the sender and receiver have the same cryptographic key; on the other hand On the one hand are asymmetric methods, in which the sender encrypts the data to be transmitted with the recipient's public (that is, possibly also known to a potential attacker) key, but decryption can only be done with Ideally only the associated private key is known to the receiver
[0004] Asymmetric methods especially have the following disadvantages: Asymmetric methods generally have a very high computational complexity
However, this method is significantly less efficient than the method of DE 10 2015 207 220 because it sends at least two valid packets over the bus even in the best case for each negotiated bit.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for generating secret or secret key in network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0023] The invention relates to a method for generating a secret, such as a (secret) symmetric cryptographic key, between two nodes (users of a network) of a communication system via a commonly used medium (transmission channel of the network) communicate with each other. In this case, the generation or negotiation of a secret, in particular a cryptographic key, is based on a public data exchange between two users, wherein however a possible eavesdropping third party as an attacker is still unable or only very difficult to deduce the generated key .

[0024] With the invention it is therefore possible to establish completely automated and secure corresponding symmetric cryptographic keys between two different users of the network, in order to then implement certain security functions, such as data encryption, on the basis of this. As will be described in more detail, first a common secret is established for this purpose, which can be used for key generation. In principle, ho...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a method for generating a secret or secret key in a network. The invention provides a method for generating the secret in the network, wherein the network at least comprise a first user (100) and a second user (200). The first user (100) and the second user (200) respectively perform information transmission on the common transmission medium of the network by means of respectively selected information identifications. Furthermore the first user (100) and the second user (200) generate the shared secret between the first user (100) and the second user (200) according to which utilizes the information identification on the condition of different information identifications. The first user (100) and / or the second user (200) process the task with increased priority, wheren correlating the task with the secret is a step required for generating the secret.

Description

technical field [0001] The invention relates to a method for generating a secret, such as a secret cryptographic key, in a network, in particular a common secret key between two users of the network. Point-to-point connections are also commonly referred to as networks, and should be referred to by that term here as well. In this case, the two users communicate via a commonly used transmission medium. In this case, a logical bit sequence (or more generally: a value sequence) is physically transmitted as a signal or signal sequence by a corresponding transmission method. The underlying communication system can be, for example, a CAN bus. The CAN bus provides for the transmission of dominant and recessive bits or respectively dominant and recessive signals, wherein the dominant signals or bits of the users of the network predominate over the recessive signals or bits. Depending on the state of the recessive signal, it appears on the transmission medium only when all participat...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04L12/40H04L29/06
CPCH04L9/0866H04L12/40006H04L63/0428H04L2012/40215H04L9/0838
Inventor A.穆特
Owner ROBERT BOSCH GMBH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products