Verification protocol
First Claim
Patent Images
1. A method of establishing a session key between a pair of correspondents in a data communication system, each of said correspondents sharing secret information, said method comprising the steps of:
- a) one of said correspondents generating additional secret information and deriving therefrom a session key;
b) said one of said correspondents combining said secret information and said additional secret information in a signal algorithm to provide a first signature component;
c) said one of said correspondents deriving a second signature component from said secret information;
d) said one of said correspondents transferring said first and second signature components to the other of said correspondents;
e) said other of said correspondents using said secret information to obtain said additional secret information from said first signature component and generating a said session key from said secret information and said additional secret information; and
f) said other of said correspondents verifying said second signature component by operating upon said session key obtained at said other of said correspondents to obtain a value corresponding to said second signature component and comparing such value with said second signature component.
0 Assignments
0 Petitions
Accused Products
Abstract
A digital signature verification protocol utilises a pair of signature components incorporating a pair of private keys, one of which is a long term key and the other of which is a short term key.
The long term key is applied to one of the signature components to reveal the short term key.
The short tern key is then used to compute a value of a signature component contained in the signature. If the computed value and received values agree then authenticity is verified.
34 Citations
12 Claims
-
1. A method of establishing a session key between a pair of correspondents in a data communication system, each of said correspondents sharing secret information, said method comprising the steps of:
-
a) one of said correspondents generating additional secret information and deriving therefrom a session key; b) said one of said correspondents combining said secret information and said additional secret information in a signal algorithm to provide a first signature component; c) said one of said correspondents deriving a second signature component from said secret information; d) said one of said correspondents transferring said first and second signature components to the other of said correspondents; e) said other of said correspondents using said secret information to obtain said additional secret information from said first signature component and generating a said session key from said secret information and said additional secret information; and f) said other of said correspondents verifying said second signature component by operating upon said session key obtained at said other of said correspondents to obtain a value corresponding to said second signature component and comparing such value with said second signature component. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A method of establishing a session key between a first correspondent and a selected one of a plurality of second correspondents connected to said first correspondent, said method comprising providing each of said second correspondents a respective secret information;
- storing each said secret information at said first correspondent to associate each said stored secret information with a respective second correspondent;
said selected one of said second correspondents combing said secret information and additional secret information in a signature algorithm to provide a first signature component, said additional secret information being used by said selected correspondent to generate a session key;
said selected one of said second correspondents deriving a second signature component from said secret information;
said first correspondent receiving from said selected one of said second correspondents said first and second signature components;
said first correspondent retrieving said stored secret information associated with said selected one of said second correspondents and using said secret information to obtain said additional secret information and generating said session key from said secret information of said selected one of said second correspondents and said additional secret information; and
said first correspondent verifying said second signature component by operating upon said session key obtained at said first correspondent to obtain a value corresponding to said second signature component and comparing such value with said second signature component. - View Dependent Claims (9, 10, 11, 12)
- storing each said secret information at said first correspondent to associate each said stored secret information with a respective second correspondent;
Specification