MESSAGE AUTHENTICATION
First Claim
1. A method for the authentication of data communicated from an originator to a destination, comprising:
- using a keyed hashing technique according to which data to be authenticated is concatenated with a private key and then processed with a cryptographic hash function;
transmitting the data together with a digest of the hash function from the originator to the destination, wherein the data comprises temporal validity information representing the temporal validity of the data.
0 Assignments
0 Petitions
Accused Products
Abstract
For the authentication of messages communicated in a distributed system from an originator to a destination a keyed-hashing technique is used according to which data to be authenticated is concatenated with a private (secret) key and then processed to the cryptographic hash function. The data are transmitted together with the digest of the hash function from the originator to the destination. The data comprises temporal validity information representing the temporal validity of the data. For example the setup key of a communication is therefore only valid within a given time interval that is dynamically defined by the communication originator. After the time interval is exceeded the setup key is invalid and cannot be reused again.
-
Citations
8 Claims
-
1. A method for the authentication of data communicated from an originator to a destination, comprising:
-
using a keyed hashing technique according to which data to be authenticated is concatenated with a private key and then processed with a cryptographic hash function;
transmitting the data together with a digest of the hash function from the originator to the destination, wherein the data comprises temporal validity information representing the temporal validity of the data. - View Dependent Claims (2, 3, 4)
-
-
5. A distributed system comprising:
-
an originator configured to communicate authenticated data to a destination;
the system designed for a keyed hashing technique according to which data to be authenticated is concatenated with a private key and then processed with a cryptographic hash function, and the data are transmitted together with the digest of the hash function from the originator to the destination, wherein the data comprises temporal validity information representing the temporal validity of the data. - View Dependent Claims (6, 7, 8)
-
Specification