Efficient management of cryptographic key generations

A cryptography and key technology, applied to the public key and key distribution of secure communication, can solve impractical problems

Active Publication Date: 2010-06-16
TELEFON AB LM ERICSSON (PUBL) +1
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

As noted above, this is not practical when the device is turned off or the key issuer cannot be contacted during the key update

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Efficient management of cryptographic key generations
  • Efficient management of cryptographic key generations
  • Efficient management of cryptographic key generations

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0067] The embodiments described below are given as examples only, and it should be understood that the present invention is not limited thereto. Further embodiments, changes, or improvements that maintain the basic underlying principles disclosed and claimed herein are within the scope of the invention.

[0068] Throughout the drawings, the same reference characters will be used for corresponding or similar elements.

[0069] refer to figure 1 , consider an information environment, here exemplified by the scope of a communication system, having at least one secret key issuer S, such as a key issuing server, at least one content or service provider P, and at least one potential recipient R. Using the terminology in the background section, S is the "producer" and P and R are "consumers". Assume that any S has an a priori secure (eg confidential) channel with P and R. One goal is for provider P to securely and efficiently transmit data to receiver R using information provide...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention generally relates to management of cryptographic key generations in an information environment comprising a key-producing side generating and distributing key information to a key-consuming side. A basic concept of the invention is to define, by means of a predetermined one-way key derivation function, a relationship between generations of keys such that earlier generations of keys efficiently may be derived from later ones but not the other way around. A basic idea according to the invention is therefore to replace, at key update, key information of an older key generation by the key information of the new key generation on the key-consuming side. Whenever necessary, the key-consuming side iteratively applies the predetermined one-way key derivation function to derive key information of at least one older key generation from the key information of the new key generation. In this way, storage requirements on the key-consuming side can be significantly reduced.

Description

technical field [0001] The present invention relates to the management of cryptographic keys between entities in a communication system. Background technique [0002] Information security is a very important field in today's information technology society. [0003] Cryptographic key management plays a very fundamental role as the basis for many information security techniques including confidentiality, entity authentication, data integrity and digital signatures, among others. For an introduction to cryptography in general, and key management in particular, we refer to [1] and [5], respectively (Chapter 13). The following is an outline of key management relevant to this context, partly based on standard reference [5]. [0004] In general, a key relationship involves at least two roles: a "producer" and a "consumer" of key material. The goal of key management is to maintain key relationships and key material in a manner that combats related threats such as compromise of th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/08
CPCH04L9/0861H04L2209/38H04L9/0891H04L9/50H04L9/08H04L9/30H04L9/32
Inventor G·塞兰德F·林德霍尔姆马格纳斯·尼斯特罗姆
Owner TELEFON AB LM ERICSSON (PUBL)
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products