KEY EXCHANGE BASED ON DSA TYPE CERTIFICATES
First Claim
1. A method for generating a shared key comprising:
- providing a first certificate from a first peer to a second peer, the first certificate including a plurality of first parameters;
performing a first exponentiation operation to generate a first public key from the second peer using at least one parameter of the plurality of first parameters and a first private key from the second peer;
providing a second certificate and the first public key from the second peer to the first peer, the second certificate comprising a plurality of second parameters;
performing a second exponentiation operation to generate a shared secret key for the second peer using at least one parameter from the plurality of first parameters;
performing a third exponentiation operation to generate the shared secret key for the first peer using the first public key from the second peer and a private key from the first peer.
1 Assignment
0 Petitions
Accused Products
Abstract
A first certificate is provided from a first peer to a second peer. The first certificate includes a plurality of first parameters. A first exponentiation operation is performed to generate a first public key from the second peer using the plurality of first parameters and the first private key from the second peer. A second certificate and the first public key from the second peer are provided to the first peer. The second certificate comprises a plurality of second parameters. A second exponentiation operation is performed to generate a shared secret key for the second peer using at least one parameter from the plurality of first parameters. A third exponentiation operation is performed to generate the shared secret key for the first peer using the first public key from the second peer and a private key from the first peer.
38 Citations
32 Claims
-
1. A method for generating a shared key comprising:
-
providing a first certificate from a first peer to a second peer, the first certificate including a plurality of first parameters;
performing a first exponentiation operation to generate a first public key from the second peer using at least one parameter of the plurality of first parameters and a first private key from the second peer;
providing a second certificate and the first public key from the second peer to the first peer, the second certificate comprising a plurality of second parameters;
performing a second exponentiation operation to generate a shared secret key for the second peer using at least one parameter from the plurality of first parameters;
performing a third exponentiation operation to generate the shared secret key for the first peer using the first public key from the second peer and a private key from the first peer. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. An article of manufacture comprising:
-
a machine accessible medium including data that, when accessed by a machine, causes the machine to perform operations comprising;
providing a first certificate from a first peer to a second peer, the first certificate including a plurality of first parameters;
performing a first exponentiation operation to generate a first public key from the second peer using the plurality of first parameters and the first private key from the second peer;
providing a second certificate and the first public key from the second peer to the first peer, the second certificate comprising a plurality of second parameters;
performing a second exponentiation operation to generate a shared secret key for the second peer using at least one parameter from the plurality of first parameters;
performing a third exponentiation operation to generate the shared secret key for the first peer using the first public key from the second peer and a private key from the first peer. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16)
-
-
17. A system comprising:
-
a processor; and
a memory coupled to the processor, the memory containing program code that, when executed by the processor, causes the processor to;
provide a first certificate from a first peer to a second peer, the first certificate including a plurality of first parameters;
perform a first exponentiation operation to generate a first public key from the second peer using the plurality of first parameters and the first private key from the second peer;
provide a second certificate and the first public key from the second peer to the first peer;
the second certificate comprising a plurality of second parameters;
perform a second exponentiation operation to generate a shared secret key for the second peer using at least one parameter from the plurality of first parameters;
performing a third exponentiation operation to generate the shared secret key for the first peer using the first public key from the second peer and a private key from the first peer. - View Dependent Claims (18, 19, 20, 21, 22, 23, 24)
-
-
25. A method comprising:
-
receiving a first certificate including a plurality first parameters;
performing a first exponentiation operation to generate a first public key using at least one parameter of the plurality of first parameters and a first private key;
receiving a second certificate and the first public key, the second certificate including a plurality of second parameters;
performing a second exponentiation operation to generate a first shared secret key using at least one parameter from the plurality of first parameters;
performing a third exponentiation operation to generate a second shared secret key using the first public key and a private key. - View Dependent Claims (26, 27, 28, 29, 30, 31, 32)
-
Specification