×

Method for Distributing Cryptographic Keys in a Communication Network

  • US 20110129090A1
  • Filed: 08/27/2008
  • Published: 06/02/2011
  • Est. Priority Date: 08/31/2007
  • Status: Active Grant
First Claim
Patent Images

1. A method making it possible to distribute elements for generating one or more cryptographic keys between at least two users A and B in a network comprising a number of nodes Ni interlinked by means of communication highways, the network implementing a routing protocol, comprising at least the following steps:

  • to communicate with B, A generates a public value that is sensitive to a malicious attack in which a third party seeks to pass himself off as a participant in the network, or “

    MIM”

    , and decomposes it using a mathematical transformation into m segments of redundancy o, that is to say that an information item can be recomposed from o segments, and transmits this concatenated information with a reference message Na over the network via k routing paths,to communicate with A, B generates a public value that is sensitive to an MIM attack and decomposes it using a mathematical transformation into m segments of redundancy o, that is to say that an information item can be recomposed from o segments, and transmits this concatenated information with a reference message Nb over the network via k routing paths,the two parties A and B regenerate the common secret by recalculating the inverse transform of all the combinations of o segments and by choosing the value that is statistically most represented;

    gab˜

    and g˜

    ab
    once the two secrets assumed to be common have been calculated, gab˜

    for A, and g˜

    ab
    for B, the party A sends a verification message corresponding to the reference message Nb from B encrypted with the common secret;

    gab˜

    and sends it to the party B;

    {Nb}gab˜

    ,
    B then decrypts the message from A with his key g˜

    ab
    and checks consistency with his reference message Nb, then refers to the acknowledgment message in the same way;

    {Na}g˜

    ab
    to validate the common secret between the two entities, and to use the common secret to encode a message.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×