Method and system for secure communication using hash-based message authentication codes
First Claim
Patent Images
1. A method for secure communication using hash-based message authentication codes, comprising:
- generating by a server a shared secret, a first counter value and a second counter value;
generating by an encryption module executed on a computing device a first hash-based message authentication code from said shared secret and said first counter value stored in storage of said computing device;
generating by said encryption module executed on said computing device a second hash-based message authentication code from said shared secret and said second counter value;
deriving by said encryption module executed on said computing device an encryption key from a first function of said first hash-based message authentication code and said second hash-based message authentication code;
wherein said first function includes at least a portion of a concatenation of said first and second hash-based message authentication codes; and
encrypting by said encryption module executed on said computing device a message using said encryption key; and
communicating said encrypted message via a network interface of said computing device.
9 Assignments
0 Petitions
Accused Products
Abstract
A system and method for secure communication is provided. A first hash-based message authentication code is generated from a shared secret and a first counter value stored in storage of a computing device. A second hash-based message authentication code is generated from such shared secret and a second counter value. An encryption key is derived from a function of the first hash-based message authentication code and the second hash-based message authentication code. A message is encrypted using the encryption key, and communicated via a network interface of the computing device.
-
Citations
8 Claims
-
1. A method for secure communication using hash-based message authentication codes, comprising:
-
generating by a server a shared secret, a first counter value and a second counter value; generating by an encryption module executed on a computing device a first hash-based message authentication code from said shared secret and said first counter value stored in storage of said computing device; generating by said encryption module executed on said computing device a second hash-based message authentication code from said shared secret and said second counter value; deriving by said encryption module executed on said computing device an encryption key from a first function of said first hash-based message authentication code and said second hash-based message authentication code;
wherein said first function includes at least a portion of a concatenation of said first and second hash-based message authentication codes; andencrypting by said encryption module executed on said computing device a message using said encryption key; and
communicating said encrypted message via a network interface of said computing device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
Specification