Message authentication
First Claim
1. Method for the authentication of data communicated from a originator to a destination, wherein a keyed hashing technique is used, according to which data to be authenticated is concatenated with a private key and then processed with a cryptographic hash function, and the data are transmitted together with the digest of the hash function from the originator to the destination, characterized in that the data comprises temporal validity information representing the temporal validity of the data.
2 Assignments
0 Petitions
Accused Products
Abstract
For the authentication of messages communicated in a distributed system from an originator to a destination a keyed-hashing technique is used according to which data to be authenticated is concatenated with a private (secret) key and then processed to the cryptographic hash function. The data are transmitted together with the digest of the hash function from the originator to the destination. The data comprises temporal validity information representing the temporal validity of the data. For example the setup key of a communication is therefore only valid within a given time interval that is dynamically defined by the communication originator. After the time interval is exceeded the setup key is invalid and cannot be reused again.
-
Citations
19 Claims
-
1. Method for the authentication of data communicated from a originator to a destination, wherein a keyed hashing technique is used, according to which data to be authenticated is concatenated with a private key and then processed with a cryptographic hash function, and the data are transmitted together with the digest of the hash function from the originator to the destination, characterized in that
the data comprises temporal validity information representing the temporal validity of the data.
-
5. Method for the authenticated transmission of messages, comprising the following communication setup steps:
-
generating a login key by a keyed-hashing method on the basis of random data, temporal validity information and a private key, transmitting the login key from an originator to a destination, and verifying the authenticity and the temporal validity of the login key on the basis of the keyed hashing digest on the destination side. - View Dependent Claims (6, 7, 8, 9)
-
-
11. Distributed system for communicating authenticated data from a originator to a destination, designed for a keyed hashing technique according to which data to be authenticated is concatenated with a private key and then processed with a cryptographic hash function, and the data are transmitted together with the digest of the hash function from the originator to the destination, characterized in that
the data comprises temporal validity information representing the temporal validity of the data.
-
15. Distributes system for the authenticated transmission of messages, comprising:
-
an originator designed to generate a login key by a keyed-hashing method on the basis of random data, temporal validity information and a private key, a network for transmitting the login key from the originator to a destination, wherein the destination is designed to verify the authenticity and the temporal validity of the login key on the basis of the keyed hashing digest. - View Dependent Claims (16, 17, 18, 19)
-
Specification