×

Method and apparatus for authenticating messages

  • US 5,142,577 A
  • Filed: 12/17/1990
  • Issued: 08/25/1992
  • Est. Priority Date: 12/17/1990
  • Status: Expired due to Term
First Claim
Patent Images

1. A method for authenticating communications comprising the steps of:

  • generating;

    an encryption/decryption key pair consisting of key Es and Ds said keys being of a first order selected to provide a predetermined level of security;

    a set numbers of {a'"'"'} wherein numbers a'"'"' which are members of set {a'"'"'} are approximately of said first order, and have the property that when encrypted with said key Es resulting encrypted numbers Ds [a'"'"'] are of a second order substantially less than said first order;

    hashing function H for mapping number of said first order onto a third, smaller order; and

    ,an encrypting key Ki ;

    providing said key Es, said set {a'"'"'} said hashing function H and said key Ki to a first party;

    providing said key Ki to a second party;

    providing said key Ds and said hashing function H to a third party;

    said first party;

    selecting a particular one of said numbers a'"'"';

    encrypting said selected number a'"'"' with said key Es to obtain a particular value Es [a'"'"'];

    operating on said selected number a'"'"' with said hashing function H to obtain a second encrypting key Kj, equal to H(a'"'"');

    forming a first level message M1 including said encryption key Ki ;

    encrypting said first level message M1 with said second encrypting key Kj ;

    forming a second level message M2 including said encrypted first level message Kj [M1 ] and said particular value Es [a'"'"'];

    sending said second level message M2 to said second party;

    said second party then;

    encrypting information P with said key Kj ;

    combining said second level message M2 with said encrypted information Ki [P] to form a third level message M3; and

    sending a communication comprising said third level message M3 to said third party;

    said third party then;

    recovering said particular value Es [a'"'"'] from said second level message M2 comprised in said third level message M3;

    decrypting said particular value Es [a'"'"'] with said key Ds to obtain said selected number a'"'"';

    operating on said selected number a'"'"' with said hashing function H to obtain said second encryption key Kj ;

    recovering said encrypted first level message Kj [M1] from said second level message M2 and decrypting said encrypted first level message Kj [M1] with said second encryption key Kj to obtain said first level message M1;

    recovering said encrypted information Ki [P] from said third level message M3 and said encryption key Ki from said first level message M1; and

    decrypting said encrypted information Ki [P] with said encryption key Ki to obtain said information P;

    whereby said third party acquires a basis to believe that said information P is an authentic communication sent by said second party with the authorization of said first party.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×