×

Authenticated diffie-hellman key agreement protocol where the communicating parties share a secret key with a third party

  • US 6,766,453 B1
  • Filed: 04/28/2000
  • Issued: 07/20/2004
  • Est. Priority Date: 04/28/2000
  • Status: Expired due to Term
First Claim
Patent Images

1. A method of performing an authenticated Diffie-Hellman key agreement protocol over a network between a first communicator sharing a first secret key with an authentication resource (AR) and a second communicator sharing a second secret key with said AR, said method comprising the steps of:

  • a) generating a first message authentication code (MAC) of a first variable using said first secret key for said first communicator;

    b) generating a second MAC of a second variable using said second secret key for said second communicator;

    c) transmitting over said network to said AR said first variable, said second variable, a first identifier corresponding to said first communicator, a second identifier corresponding to said second communicator, said first MAC, and said second MAC, wherein said AR is configured for determining a secret key corresponding to an identifier transmitted over said network;

    d) generating a third MAC of said first variable using said first secret key determined by said AR from said first identifier and a fourth MAC of said second variable using said second secret key determined by said AR from said second identifier;

    e) if said first MAC matches said third MAC and said second MAC matches said fourth MAC, generating a fifth MAC of said second variable using said second secret key determined by said AR from said second identifier and a sixth MAC of said first variable using said first secret key determined by said AR from said first identifier;

    f) transmitting over said network to said second communicator said fifth MAC, said first variable, said second variable, and said first identifier;

    g) generating a seventh MAC of said second variable using said second secret key for said second communicator;

    h) transmitting over said network to said first communicator said sixth MAC, said first variable, said second variable, and said second identifier;

    i) generating an eighth MAC of said first variable using said first secret key for said first communicator; and

    j) if said fifth MAC matches said seventh MAC and said sixth MAC matches said eighth MAC, generating a shared secret key based on said first variable for said second communicator and said shared secret key based on said second variable for said first communicator, wherein said shared secret key facilitates encrypted communication between said first communicator and said second communicator.

View all claims
  • 8 Assignments
Timeline View
Assignment View
    ×
    ×