Method of distributing encryption keys among nodes in mobile ad hoc network and network device using the same
First Claim
1. A method of distributing encryption keys among nodes in a mobile ad hoc network, comprising:
- creating a private key and a public key based on a first encryption method by a first node;
transmitting, by the first node, the created public key to a second node and receiving a ciphertext transmitted from the second node and decrypting the received ciphertext by using a private key of the first node; and
creating, by the first node, a private key and a public key based on a second encryption method by using the decrypted ciphertext, encrypting the public key based on the second encryption method with the public key based on the first encryption method, and then transmitting the encrypted public key to the second node.
1 Assignment
0 Petitions
Accused Products
Abstract
A method of distributing encryption keys among nodes in a mobile ad hoc network, and a network device using the same. In particular, e a method of distributing encryption keys, which guarantees the security of a ciphertext in the mobile ad hoc network. The method of distributing the encryption keys among nodes including a first node and a second node in the mobile ad hoc network include creating a private key and a public key based on a first encryption method by the first node; if the first node transmits the created public key to Node B, creating predetermined parameters operable to create a common key according to a second encryption method by the second node.
-
Citations
24 Claims
-
1. A method of distributing encryption keys among nodes in a mobile ad hoc network, comprising:
-
creating a private key and a public key based on a first encryption method by a first node;
transmitting, by the first node, the created public key to a second node and receiving a ciphertext transmitted from the second node and decrypting the received ciphertext by using a private key of the first node; and
creating, by the first node, a private key and a public key based on a second encryption method by using the decrypted ciphertext, encrypting the public key based on the second encryption method with the public key based on the first encryption method, and then transmitting the encrypted public key to the second node. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A method of distributing encryption keys among nodes in a mobile ad hoc network, comprising:
-
if a second node receives a public key of a first node based on a first encryption method from the first node, creating predetermined parameters operable to create a common key according to a second encryption method by the second node;
encrypting, by the second node, the created, predetermined parameters with the received public key of the first node and transmitting the encrypted parameters to the first node; and
receiving a ciphertext transmitted from a first node and decrypting the received ciphertext by using the private key of the second node. - View Dependent Claims (7, 8, 9, 10)
-
-
11. A method of distributing encryption keys among nodes in a mobile ad hoc network, comprising:
-
creating a private key and a public key based on a first encryption method by a first node;
if the first node transmits the created public key based on the first encryption method to a second node, creating predetermined parameters operable to create a common key according to a second encryption method by the second node;
if the second node encrypts the created, predetermined parameters with the public key based on the first encryption method and transmits the encrypted parameters as a ciphertext to the first node, decrypting the received ciphertext by using the private key of the first node by the first node;
creating, by the first node, a private key and a public key based on a second encryption method by using the decrypted ciphertext, encrypting the created public key based on the second encryption method and transmitting the encrypted public key as a ciphertext to the second node; and
receiving, by the second node, the ciphertext transmitted from the first node and decrypting the received ciphertext by using the private key of the second node. - View Dependent Claims (12, 13, 14)
-
-
15. A network device, comprising:
-
an encryption unit operable to transmit a public key of a first node based on a first encryption method to a second node in a mobile ad hoc network, decrypting a ciphertext transmitted from the second node by using a private key of the first node and the first node creating a private key and a public key based on a second encryption method by using the decrypted ciphertext, and encrypting the public key of the first node based on the second encryption method by using the public key based on the first encryption method and transmitting the encrypted public key to the second node; and
an information storage unit operable to store information required or created operable to perform encryption and decryption through the encryption unit. - View Dependent Claims (16, 17, 18, 19)
-
-
20. A network device, comprising:
-
an encryption unit operable to create predetermined parameters operable to be used in creating a common key according to a second encryption method when a public key based on a first encryption method is received from a first node in a mobile ad hoc network, encrypting the created parameters with the public key based on the first encryption method, transmitting the encrypted parameters to the first node, and decrypting a ciphertext transmitted from the first node by using the private key of the first node; and
an information storage unit operable to store information required or created operable to perform encryption and decryption through the encryption unit. - View Dependent Claims (21, 22, 23, 24)
-
Specification