METHODS ESTABLISHING A SYMMETRIC ENCRYPTION KEY AND DEVICES THEREOF
First Claim
1. A method for establishing a symmetric encryption key, the method comprising:
- determining at one of a plurality of communication devices a first phase difference based on a first transmission from another one of the plurality of communication devices;
generating a first new encryption key based on the determined first phase difference at the one of the plurality of communication devices;
determining at the another one of the plurality of communication devices a second phase difference based on a second transmission from the one of the plurality of communication devices;
generating a second new encryption key based on the determined second phase difference at the another one of the plurality of communication devices;
determining authenticity of the generated first new encryption key and the generated second new encryption key; and
establishing communication between the one of the plurality of communication devices and the another one of the plurality of communication devices when the generated first new encryption key and the generated second new encryption key are determined to be authenticate.
1 Assignment
0 Petitions
Accused Products
Abstract
A method, computer readable medium, and an apparatus for establishing a symmetric encryption key includes determining at one of a plurality of communication devices a first phase difference based on a first transmission from another one of the plurality of communication devices. A first new encryption key is generated based on the determined first phase difference at the one of the plurality of communication devices. At another one of the plurality of communication devices a second phase difference is generated based on a second transmission from the one of the plurality of communication devices. A second new encryption key is generated based on the determined second phase difference at the another one of the plurality of communication devices. Authenticity of the generated first new encryption key and the generated second new encryption key is determined. Communication between the one of the plurality of communication devices and the another one of the plurality of communication devices is established when the generated first new encryption key and the generated second new encryption key are determined to be authenticated.
-
Citations
36 Claims
-
1. A method for establishing a symmetric encryption key, the method comprising:
-
determining at one of a plurality of communication devices a first phase difference based on a first transmission from another one of the plurality of communication devices; generating a first new encryption key based on the determined first phase difference at the one of the plurality of communication devices; determining at the another one of the plurality of communication devices a second phase difference based on a second transmission from the one of the plurality of communication devices; generating a second new encryption key based on the determined second phase difference at the another one of the plurality of communication devices; determining authenticity of the generated first new encryption key and the generated second new encryption key; and establishing communication between the one of the plurality of communication devices and the another one of the plurality of communication devices when the generated first new encryption key and the generated second new encryption key are determined to be authenticate. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A computer readable medium having stored thereon instructions for establishing a symmetric encryption key comprising machine executable code which when executed by at least one processor, causes the processor to perform steps comprising:
-
determining at one of a plurality of communication devices a first phase difference based on a first transmission from another one of the plurality of communication devices; generating a first new encryption key based on the determined first phase difference at the one of the plurality of communication devices; determining at the another one of the plurality of communication devices a second phase difference based on a second transmission from the one of the plurality of communication devices; generating a second new encryption key based on the determined second phase difference at the another one of the plurality of communication devices; determining authenticity of the generated first new encryption key and the generated second new encryption key; and establishing communication between the one of the plurality of communication devices and the another one of the plurality of communication devices when the generated first new encryption key and the generated second new encryption key are determined to be authenticate. - View Dependent Claims (14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24)
-
-
25. A secure communication system comprising:
-
a first phase determination device that determines at one of a plurality of communication devices a first phase difference based on a first transmission from another one of the plurality of communication devices; a second phase determination device that determines at the another one of the plurality of communication devices a second phase difference based on a second transmission from the one of the plurality of communication devices; a first key generation device that generates a first new encryption key based on the determined first phase difference at the one of the plurality of communication devices; a second key generation device that generates a second new encryption key based on the determined second phase difference at the another one of the plurality of communication devices; an authentication processing system that determines authenticity of the generated first new encryption key and the generated second new encryption key; and a communication system that establishes communication between the one of the plurality of communication devices and the another one of the plurality of communication devices when the generated first new encryption key and the generated second new encryption key are determined to be authenticate. - View Dependent Claims (26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36)
-
Specification