×

Method and apparatus for geometric key establishment protocols based on topological groups

  • US 20060002562A1
  • Filed: 02/16/2004
  • Published: 01/05/2006
  • Est. Priority Date: 06/02/2003
  • Status: Abandoned Application
First Claim
Patent Images

1. A method of secure distribution of encryption/decryption keys among two communicating parties comprising of:

  • public (non-secret) selecting a natural number n;

    public (non-secret) selecting a natural number k;

    public (non-secret) selecting a k-tuple S=(S1, S2, . . . , Sk) of pairwise-commuting n×

    n matrices with integer coefficients;

    private (non-public) generating the polynomial p(x1, x2, . . . , xk) in k variables x1, x2, . . . , xk and with integer coefficients by the first communicating party;

    private (non-public) generating the polynomial q(x1, x2, . . . , xk) in k variables x1, x2, . . . , kk and with integer coefficients by the second communicating party;

    private (non-public) generating n×

    n matrix A with integer coefficients by the first communicating party according to the formula;


    A=p(S1, S2, . . . , Sk);

    private (non-public) generating n×

    n matrix B with integer coefficients by the second communicating party;


    B=q(S1S2, . . . , Sk), (therefore, A·

    B=B·

    A);

    public (non-secret) selecting a compact topological monoid G by both communicating parties;

    public (non-secret) selecting an n-tuple g=(g1, g2, . . . , gn) of pairwise commuting elements in G by both communicating parties;

    generating the n-tuple gA by the first communicating party by the formula;


    gA=(y1, y2, . . . , yn), where
    yj=g1A1,j·

    g
    2A2,j·

    . . . ·

    g
    nAn,j for j=1, 2, . . . , n, where each Aij is a corresponding matrix coefficient of the matrix A;

    generating the n-tuple gB by the second communicating party by the formula;


    gB=(z1, z2, . . . , zn),
    where
    zj=g1B1,j·

    g
    2B2,j·

    . . . ·

    g
    nBn,j for j=1, 2, . . . , n, where each Bij is a corresponding matrix coefficient of the matrix B;

    public (non-secret) transmitting the n-tuple gA from the first communicating party to the second communicating party;

    public (non-secret) transmitting the n-tuple gB from the second communicating party to the first communicating party;

    creating the shared secrete key g

    B
    by the communicating parties;

    generating the n-tuple (gA)B by the second communicating party and generating the n-tuple (gB)A by the first communicating party (since (gA)B=g

    B
    =g

    A
    =(gB)A, both communicating parties possess this n-tuple g

    B
    ).

View all claims
  • 0 Assignments
Timeline View
Assignment View
    ×
    ×