Key establishment method and system between wireless communication devices
First Claim
1. A key establishment method comprising:
- selecting a generator from elements of a finite field, and an arbitrary number less than a number of the elements of the finite field, generating a function value using the selected arbitrary number and the selected generator, hashing the function value, thereby generating a hashed value, sending the hashed value and the function value, and receiving another hashed value and another function value;
hashing the received other function value and determining whether the hashed other function value matches the received other hashed value; and
establishing a key using the received other function value and the selected arbitrary number when the hashed other function value matches the received other hashed value.
1 Assignment
0 Petitions
Accused Products
Abstract
A method for securely establishing a key against aggressive intervention of a third party. A first device generates a function value using a generator, which is selected from elements in a finite field, and an arbitrary number, which is less than a number of the elements of the finite field, hashes the function value, thereby generating a hashed value, and sends the hashed value and the function value to a second device. The second device hashes the received function value, and establishes a key using the received function value and another arbitrary number selected from the elements of the finite field when the hashed function value matches the received hashed value. Accordingly, it is possible to prevent a third device from intervening in their key establishment. Furthermore, a separate channel for the key establishment is not required because the key is established over a data communication channel.
3 Citations
20 Claims
-
1. A key establishment method comprising:
-
selecting a generator from elements of a finite field, and an arbitrary number less than a number of the elements of the finite field, generating a function value using the selected arbitrary number and the selected generator, hashing the function value, thereby generating a hashed value, sending the hashed value and the function value, and receiving another hashed value and another function value;
hashing the received other function value and determining whether the hashed other function value matches the received other hashed value; and
establishing a key using the received other function value and the selected arbitrary number when the hashed other function value matches the received other hashed value. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 19)
-
-
9. A key establishment system comprising:
-
a first device which generates a function value using a generator which is selected from elements in a finite field, and an arbitrary number which is less than a number of the elements of the finite field, hashes the function value, thereby generating a hashed value, and sends the hashed value and the function value to a second device; and
the second device which hashes the received function value, and establishes a key using the received function value and another arbitrary number selected from the elements of the finite field when the hashed function value matches the received hashed value. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16, 17, 18, 20)
-
Specification