Method and apparatus for the generation of cryptographic keys
First Claim
Patent Images
1. A method comprising:
- receiving, by a computing device, a key matrix having N rows and M columns of matrix keys, where N>
2 and M>
2;
for each column of the key matrix, performing, by the computing device, arithmetic operations utilizing matrix keys of at least two selected rows of the key matrix to produce a secret device key which is part of a first set of secret device keys;
producing in memory of the computing device, by the computing device, a shared secret key based on arithmetic operations on selected secret device keys of the first set of secret device keys, the selected secret device keys being a portion of the first set of secret device keys and being determined based on a first key selection vector received from a recipient digital platform; and
using the shared secret key to provide a secure communication channel between a first digital platform and a second digital platform.
1 Assignment
0 Petitions
Accused Products
Abstract
A method for formation of a shared secret key using a key matrix and a corresponding authentication protocol are described. The shared secret key formation scheme is a method in which sets of secret device keys are formed from arithmetic operations on matrix keys of a key matrix. The contents of the key matrix are held in confidence by the certification authority. The selection of which matrix keys to use is based on a key selection vector assigned by the certification authority. From the secret device keys, a shared secret key may be formed in accordance with a selected authentication protocol.
29 Citations
10 Claims
-
1. A method comprising:
-
receiving, by a computing device, a key matrix having N rows and M columns of matrix keys, where N>
2 and M>
2;for each column of the key matrix, performing, by the computing device, arithmetic operations utilizing matrix keys of at least two selected rows of the key matrix to produce a secret device key which is part of a first set of secret device keys; producing in memory of the computing device, by the computing device, a shared secret key based on arithmetic operations on selected secret device keys of the first set of secret device keys, the selected secret device keys being a portion of the first set of secret device keys and being determined based on a first key selection vector received from a recipient digital platform; and using the shared secret key to provide a secure communication channel between a first digital platform and a second digital platform. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
Specification