×

Secret key transfer method which is highly secure and can restrict the damage caused when the secret key is leaked or decoded

  • US 6,160,890 A
  • Filed: 12/22/1999
  • Issued: 12/12/2000
  • Est. Priority Date: 10/31/1996
  • Status: Expired due to Term
First Claim
Patent Images

1. A method of securing the transmission of information that is encrypted in a transmission apparatus and transferred to be decrypted in a reception apparatus, comprising the steps of:

  • storing a plurality of secret keys in the transmission apparatus and the reception apparatus;

    selecting one of the secret keys from the plurality of stored secret keys in the transmission apparatus;

    generating a message;

    encrypting the message with a first encryption algorithm using the selected secret key as an encryption key to produce a first cryptogram;

    encrypting the message with a second encryption algorithm using the message as an encryption key to produce a second cryptogram;

    transmitting the first cryptogram and the second cryptogram to the reception apparatus;

    decrypting the first cryptogram with a first secret key stored in the reception apparatus used as a decryption key to provide a first decrypted data;

    decrypting the second cryptogram with the first decrypted data of the first cryptogram used as a decryption key to provide a second decrypted data;

    comparing the first and second decrypted data to determine if they match and when they match, the secret key selected in the transmission apparatus is authenticated; and

    repeating the decrypting of the first cryptogram with successive stored secret keys and comparing the successive decrypted data until a match occurs, whereby upon completion of the comparing step a final determination of the use of an authenticated secret key can be made.

View all claims
  • 0 Assignments
Timeline View
Assignment View
    ×
    ×