×

System method and apparatus for authenticating an encrypted signal

  • US 5,351,293 A
  • Filed: 02/01/1993
  • Issued: 09/27/1994
  • Est. Priority Date: 02/01/1993
  • Status: Expired due to Term
First Claim
Patent Images

1. In a cryptographic communication system including first and second terminals, said first and second terminals being connected via a telecommunications link, a method for authenticating encrypted signals between said first and second terminals, wherein said first terminal stores a user secret key and wherein said second terminal includes a keyset library memory for storing said user secret key, said method comprising:

  • sending a first cryptographic challenge block including a first variable, from said second terminal to said first terminal;

    receiving said first cryptographic challenge block at said first terminal;

    responding to said first cryptographic challenge block by sending from said first terminal a first cryptographic challenge block response based on said first variable received in said first cryptographic challenge block and said user secret key stored in said first terminal;

    receiving said first cryptographic challenge block response at said second terminal;

    computing at said second terminal an expected first cryptographic challenge block response;

    comparing said received first cryptographic challenge block response to said expected first cryptographic challenge block response in said second terminal; and

    disconnecting said telecommunications link between said first and second terminals if said received first cryptographic challenge block response is not substantially equal to said expected first cryptographic challenge block response;

    whereby said first terminal authenticates to said second terminal responsive to said cryptographic challenge block that said first terminal stores the same secret key as said second terminal;

    sending a second cryptographic challenge block including a second variable, from said first terminal to said second terminal;

    receiving said second cryptographic challenge block including said second variable, at said second terminal;

    responding to said second cryptographic challenge block by sending from said second terminal a second cryptographic challenge block response based on said first variable in said first cryptographic challenge block, said received second variable in said second cryptographic challenge block and said user secret key stored in said keyset library of said second terminal;

    receiving said second cryptographic challenge block response at said first terminal;

    computing at said first terminal an expected second cryptographic challenge block response using said first variable received in said first cryptographic challenge block, said second variable in said second cryptographic challenge block and said user secret key stored in said first terminal;

    comparing said received second cryptographic challenge block response to said expected second cryptographic challenge block response in said first terminal; and

    disconnecting said telecommunications link between said second and first terminals if said received second cryptographic challenge block response is not substantially equal to said expected second cryptographic challenge block response;

    whereby said second terminal authenticates to said first terminal responsive to said second cryptographic challenge block that said second terminal stores the same user secret key as said first terminal.

View all claims
  • 3 Assignments
Timeline View
Assignment View
    ×
    ×