Unlock instant, AI-driven research and patent intelligence for your innovation.

Method for generating a key in a circuit arrangement

A circuit device and a technology for generating keys, which are applied to secure communication devices and key distribution, can solve problems such as high computational complexity, and achieve the effects of enhanced resistance to attack and manipulation, increased reliability, and high availability.

Active Publication Date: 2022-02-15
ROBERT BOSCH GMBH
View PDF13 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Asymmetric methods especially have the disadvantage that they often have a very high computational complexity
However, especially in wired or optical systems, this approach is usually only conditionally suitable, since the corresponding channels usually have only very limited time-varying properties and an attacker can deduce relatively well, for example, the sender and receiver Channel parameters between parties

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for generating a key in a circuit arrangement
  • Method for generating a key in a circuit arrangement
  • Method for generating a key in a circuit arrangement

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026]The present invention relates to a method for generating a common confidential or (confidential) symmetrical cryptographic key between two nodes of the communication system, which is commonly used by commonly used media (network) Transport channels communicate with each other. The generation or negotiation of the password key is based on the disclosed data exchange between the two participants, where, but It is possible to make an inferior to the generated key. It is therefore possible to fully automate and securely establish a corresponding symmetric password key between two different participants of the network to facilitate a determining security function, such as data encryption. As described in detail, a common confidential is first set, which can be considered for the key generation. However, such common confidentiality can also be used as a cryptographic key on a narrow cryptographic key for other purposes, such as one-Time-pad.

[0027] This method is suitable for a ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A method is proposed for generating a key in a first circuit arrangement, in particular in a microcontroller. In this case, the first circuit arrangement causes the transmission of the at least one first value sequence on the transmission channel to be at least partially synchronized with the transmission of the at least one second value sequence via the second circuit arrangement. The first circuit arrangement determines a key for generating a key based on the at least one first value sequence and on the superposition of the at least one first value sequence and the at least one second value sequence on the transmission channel. confidential. The first circuit arrangement is monitored with regard to errors.

Description

Technical field [0001] The present invention relates to a method for generating confidentiality in a network, in particular to generate a common confidential key in two participants of the network. Point-to-point connections are commonly listed as a network and should be referred to herein. Here, these two participants communicate through a joint transmission medium. Here, the logical bit sequence (or typically: value sequence) is physically transmitted by a corresponding transmission method as a signal or signal sequence. The communication system based can be, for example, a CAN-bus. The CAN-bus sets the transmission of explicit and hidden bits or signals of the corresponding dominant and hidden signals, wherein the dominant signal or bit relative-hidden signal or bit of the participant of the network is dominated. DURCHSETZEN. Only when all participants set the hidden signal to transmit the hidden signal level when used for transmission, or when all the participants transmitted,...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/08H04L12/40
CPCH04L9/0838H04L2012/40215H04L63/06H04L63/061G05B19/042G05B2219/36542
Inventor F.哈特维希T.洛特施派赫A.森肯斯T.凯勒A.穆特
Owner ROBERT BOSCH GMBH