Unlock instant, AI-driven research and patent intelligence for your innovation.

Method of generating a cryptosynchronism

A cipher and communication session technology, applied in the usage of multiple keys/algorithms, synchronous sending/receiving encryption equipment, synchronous signal speed/phase control, etc., can solve problems such as replay attack damage

Inactive Publication Date: 2005-08-31
LUCENT TECH INC
View PDF0 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

A replay attack can wreak havoc on the receiver side of the communication since the ciphertext will be decrypted into plaintext as opposed to meaningless text

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method of generating a cryptosynchronism

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0012] For understanding and simplicity of the description, embodiments of the present invention will be described in the context of wireless communications conforming to the series of CDMA2000 standards. However, it should be understood that the method is not limited to this communication standard, or to wireless communication.

[0013] In wireless communications, mobile stations communicate with base stations over the air. A mobile station may be a mobile telephone, a wireless computer, or the like. A base station serves a certain geographic area; that is, serves communications to and from mobile stations in that area. Said communications are usually encrypted. For example in CDMA2000, there are several long-lived keys such as the encryption key (CK) and the integrity key (IK) associated with the mobile station which are used in the encryption process and the messaging integrity protection process respectively. In general, CDMA2000 also provides long-term cryptographic sy...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

In the method, a value of a first cryptosync for a communication session is derived based on a value of a second cryptosync. The second cryptosync has a longer life than the first cryptosync.

Description

Background technique [0001] Encryption has been widely used in various fields, such as wireless communication, Internet, etc. The message, data, voice, etc. to be encrypted are generally called plaintext, and the result of encryption processing is called ciphertext. In general, the encryption process involves performing an encryption algorithm on plaintext to obtain ciphertext. Many encryption algorithms, such as DES, AES, etc., involve the use of keys in the encryption process. An encryption key is a sequence of bits used in an encryption algorithm to generate ciphertext. The encryption key is known at both the sender and receiver of the communication, and is used at the receiver to decrypt the ciphertext into plaintext. [0002] One example of encryption in a wireless communication environment involves encrypting frames of information sent between a base station and a mobile station. Unfortunately, if the same information (ie, the same plaintext) is sent in two different...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/14H04L9/12
CPCH04L9/12H04L2209/80A47G1/12A47G1/1646
Inventor 萨尔瓦尔·帕特尔玛尔库斯·翁
Owner LUCENT TECH INC