×

Method for distributing cryptographic keys in a communication network

  • US 8,345,878 B2
  • Filed: 08/27/2008
  • Issued: 01/01/2013
  • Est. Priority Date: 08/31/2007
  • Status: Expired due to Fees
First Claim
Patent Images

1. A method making it possible to distribute elements for generating one or more cryptographic keys between at least two users A and B in a network comprising a number of nodes Ni interlinked by means of communication highways, the network implementing a routing protocol, comprising at least the following steps:

  • to communicate with B, A generates a public value that is sensitive to a malicious attack in which a third party seeks to pass himself off as a participant in the network, or “

    MIM”

    , and decomposes it using a mathematical transformation into m segments of redundancy o, that is to say that an information item can be recomposed from o segments, and transmits this concatenated information with a reference message Na over the network via k routing paths,to communicate with A, B generates a public value that is sensitive to an MIM attack and decomposes it using the mathematical transformation into m segments of redundancy o, that is to say that an information item can be recomposed from o segments, and transmits this concatenated information with a reference message Nb over the network via k routing paths,the two parties A and B regenerate the common secret by recalculating the inverse calculation of the mathematical transformation of all the combinations of o segments and by choosing the value that is statistically most represented;

    gab˜

    for A and g˜

    ab
    for B,once the two secrets assumed to be common have been calculated, gab˜

    for A, and g˜

    ab
    for B, the party A sends a verification message corresponding to the reference message Nb from B encrypted with the common secret;

    gab˜

    and sends it to the party B;

    {Nb}gab˜

    , B then decrypts the message from A with his key g˜

    ab
    and checks consistency with his reference message Nb , then refers to the acknowledgment message in the same way;

    {Na}g˜

    ab
    to validate the common secret between the two entities, and to use the common secret to encode a message,wherein the step for regenerating the common secret comprises the following steps;

    in the case of the party A, the following calculation applies;


    gab˜



    max(M

    1
    (gyigyi+1gyi+2 . . . gy+o),with gyi belonging to [gbi ,gfi], wherein [gbi ,gfi] are segments recovered by party A, with gbi being unmodified segments belonging to the m segments transmitted by B, and with gfi being segments modified from the m segments transmitted by B, wherein M

    1
    (gyi gyi+1 gyi+2 . . . gy+o) calculates values of the inverse calculation of the mathematical transformation of all the combinations of o segments from [gbi ,gfi], and wherein max( )chooses the statistically most represented value from the values calculated by M

    1
    (gyi gyi+1 gyi+2 . . . gy+o); and

    in the case of the party B, the following calculation applies;


    g˜

    ab


    max(M

    1
    (gyigyi+1gyi+2 . . . gy+o),with gyi belonging to [gai ,ghi], wherein [gai ,ghi] are segments recovered by party B, with gai being unmodified segments belonging to the m segments transmitted by party A, and with ghi being modified from the m segments transmitted by party A, wherein M

    1
    (gyi gyi+1 gyi+2 . . . gy+o) calculates values of the inverse calculation of the mathematical transformation of all the combinations of o segments from [gai ,ghi ], and wherein max( )chooses the statistically most represented value from the values calculated by M

    1
    (gyi gyi+1 gyi+2 . . . gy+o).

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×