×

Extended authenticated key exchange

  • US 7,627,760 B2
  • Filed: 07/21/2005
  • Issued: 12/01/2009
  • Est. Priority Date: 07/21/2005
  • Status: Active Grant
First Claim
Patent Images

1. A computer-implemented method for extended authenticated key exchange using a mathematical group, via operations comprising:

  • initiating operations to execute extended authenticated key exchange between an initiator computing device and a responder computing device connected via a network;

    generating setup parameters on a computing device, the setup parameters comprising;

    a first fixed prime number,a second fixed prime number that is a divisor of the first fixed prime number minus 1,a key group from 1 to the second fixed prime number minus 1;

    an element from the 1 to the first fixed prime number minus 1, which has order of the second fixed prime number,an initiator long-term secret key selected from the key group,an initiator public key, in the mathematical group based on the initiator long-term secret key, wherein the initiator public key is registered with a public certificate authority;

    a responder long-term secret selected from the key group, and;

    a responder public key, in the mathematical group based on the responder long-term secret, wherein the responder public key is registered with public certificate authority;

    determining an initiator identity, wherein the initiator identity comprises a binary string based on context information of the initiator;

    determining a responder identity, wherein the responder identity comprises a binary string based on context information of the responder;

    the initiator generating an initiator ephemeral public key in the mathematical group based on an initiator ephemeral secret key, randomly selected from the key group, and sending the initiator ephemeral public key to the responder;

    the responder generating a responder ephemeral public key in the mathematical group based on a responder ephemeral secret randomly selected from the key group, and sending the responder ephemeral public key to the initiator;

    computing, a session key for the initiator and a corresponding session key for the responder, by hashing the concatenation of a first computed value, a second computed value, the initiator identity, and the responder identity such that;

    by the initiator, for the session key the first value is computed in the mathematical group based on the responder ephemeral public key and the initiator long-term secret key, and the second value is computed in the mathematical group based on the responder public key and the initiator ephemeral secret key;

    by the responder, for the corresponding session key the first value is computed in the mathematical group based on the initiator public key and the responder ephemeral secret key, and the second value is computed in the mathematical group based on the initiator ephemeral public key and the responder long-term secret key; and

    the session key and the corresponding session key, if equal, providing for secure exchange of data between the initiator and the responder.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×