×

Method and apparatus for cryptographic key establishment using an identity based symmetric keying technique

  • US 7,181,015 B2
  • Filed: 07/31/2001
  • Issued: 02/20/2007
  • Est. Priority Date: 07/31/2001
  • Status: Expired due to Term
First Claim
Patent Images

1. A method for establishing a cryptographic key between a first node and a second node, comprising:

  • sending a first message from the first node to the second node, wherein the first message requests establishing the cryptographic key;

    sending a second message from the second node to a key distribution center, wherein the second message includes a first node identifier for the first node, a second node identifier for the second node, and a message authentication code created using a second node key belonging to the second node;

    recreating the second node key at the key distribution center, wherein the second node key was previously created using the second node identifier and a secret key known only to the key distribution center;

    verifying at the key distribution center the message authentication code in the second message using the second node key; and

    if the message authentication code is verified,creating the cryptographic key at the key distribution center, andcommunicating the cryptographic key to the second node and the first node;

    wherein an update of a key distribution center database of shared keys is capable of being avoided when at least one of the nodes is unfamiliar;

    wherein communicating the cryptographic key to the second node and the first node includes;

    encrypting a hash value and the cryptographic key using the second node key to create a first encrypted key;

    recreating a first node key belonging to the first node, wherein the first node key was previously created using the secret key and the first node identifier;

    encrypting the hash value and the cryptographic key using the first node key to create a second encrypted key;

    sending a third message from the key distribution center to the second node, wherein the third message includes the first encrypted key and the second encrypted key;

    decrypting at the second node the first encrypted key from the third message to recover the hash value and the cryptographic key;

    verifying the hash value at the second node; and

    if the hash value is verified at the second node,sending a fourth message to the first node from the second node, wherein the fourth message includes the second encrypted key and a key confirmation value so that the first node can confirm that the cryptographic key has been established,decrypting at the first node the second encrypted key from the fourth message to recover the hash value and the cryptographic key,verifying the hash value at the first node,establishing at the first node that the second node has the cryptographic key, andif the hash value is verified at the first node and it is established at the first node that the second node has the cryptographic key,sending a fifth message to the second node from the first node so that the second node can confirm that the cryptographic key has been established;

    wherein the first message includes the first node identifier, the second node identifier, a third identifier for the key distribution center, and a first nonce, wherein a nonce is a random number selected for message confirmation purposes that has a statistically low probability of being reused;

    wherein the second message includes the third identifier, the second node identifier, the first node identifier, a second nonce, the first nonce, and the message authentication code, wherein the message authentication code is created from the third identifier, the second node identifier, the first node identifier, the second nonce, and the first nonce;

    wherein verifying the message authentication code includes;

    creating a test message authentication code from the third identifier, the second node identifier, the first node identifier, the second nonce, and the first nonce using the second node key; and

    comparing the test message authentication code with the message authentication code;

    wherein the hash value is created from the second node identifier, the first node identifier, the second nonce, and the first nonce;

    wherein the third message includes the second node identifier, the first node identifier, the second encrypted key, and the first encrypted key.

View all claims
  • 11 Assignments
Timeline View
Assignment View
    ×
    ×