Encryption key distribution system
First Claim
1. An encryption key distribution system comprising:
- a first node;
a second node; and
an authentication server configured to create a session key used for encryption communication between said first node and said second node,wherein said first node and said authentication server are configured to retain a first secret key used for encryption communication between said first node and said authentication server,said second node and said authentication server being configured to retain a second secret key used for encryption communication between said second node and said authentication server,said first node being configured to create a first nonce and sends the created first nonce,said second node being configured to create a second nonce and sends the created second nonce,said authentication server being configured tonewly create the session key in response to receiving the first nonce and the second nonce, andcalculate a first message authentication code value by use of the first secret key from a first message including the received first nonce, the newly created session key, and predetermined first additional information, andcreate a first encryption message by encrypting the received first nonce, the newly created session key, and the first additional information with the first secret key, andsend the first encryption message and the first message authentication code value, andcalculate a second message authentication code value by use of the second secret key from a second message including the received second nonce, the newly created session key, and predetermined second additional information, andcreate a second encryption message by encrypting the received second nonce, the newly created session key, and the second additional information with the second secret key, andsend the second encryption message and the second message authentication code value,said first node being configured toin response to receiving the first encryption message and the first message authentication code value, obtain the session key and the first additional information by decrypting the first encryption message with the first secret key, andcalculate the first message authentication code value by use of the first nonce stored in said first node, the session key and the first additional information obtained by decrypting the first encryption message, and the first secret key, andauthenticate the session key received from the authentication server by judging whether or not the first message authentication code value calculated by said first node is equal to the first message authentication code value received from said authentication server, andsaid second node being configured toin response to receiving the second encryption message and the second message authentication code value, obtain the session key and the second additional information by decrypting the second encryption message with the second secret key, andcalculate the second message authentication code value by use of the second nonce stored in said second node, the session key and the second additional information obtained by decrypting the second encryption message, and the second secret key, andauthenticate the session key received from said authentication server by judging whether or not the second message authentication code value calculated by said second node is equal to the second message authentication code value received from said authentication server.
2 Assignments
0 Petitions
Accused Products
Abstract
The encryption key distribution system includes a node A, a node B, and an authentication server S. Upon receiving a first nonce created by the node A and a second nonce created by the node B, the authentication server S creates a session key. The authentication server S sends a first message authentication code value and a first encryption message to the node A. The first encryption message is created by encrypting the first nonce, the session key, and first additional information with a first secret key. The authentication server S sends a second message authentication code value and a second encryption message to the node B. The second encryption message is created by encrypting the second nonce, the session key, and second additional information with a second secret key. The node A decrypts the first encryption message with the first secret key, thereby obtaining the session key and the first additional information. Further, the node A authenticates the session key by use of the first message authentication code value. The node B decrypts the second encryption message with the second secret key, thereby obtaining the session key and the second additional information. Further, the node B authenticates the session key by use of the second message authentication code value.
12 Citations
7 Claims
-
1. An encryption key distribution system comprising:
-
a first node; a second node; and an authentication server configured to create a session key used for encryption communication between said first node and said second node, wherein said first node and said authentication server are configured to retain a first secret key used for encryption communication between said first node and said authentication server, said second node and said authentication server being configured to retain a second secret key used for encryption communication between said second node and said authentication server, said first node being configured to create a first nonce and sends the created first nonce, said second node being configured to create a second nonce and sends the created second nonce, said authentication server being configured to newly create the session key in response to receiving the first nonce and the second nonce, and calculate a first message authentication code value by use of the first secret key from a first message including the received first nonce, the newly created session key, and predetermined first additional information, and create a first encryption message by encrypting the received first nonce, the newly created session key, and the first additional information with the first secret key, and send the first encryption message and the first message authentication code value, and calculate a second message authentication code value by use of the second secret key from a second message including the received second nonce, the newly created session key, and predetermined second additional information, and create a second encryption message by encrypting the received second nonce, the newly created session key, and the second additional information with the second secret key, and send the second encryption message and the second message authentication code value, said first node being configured to in response to receiving the first encryption message and the first message authentication code value, obtain the session key and the first additional information by decrypting the first encryption message with the first secret key, and calculate the first message authentication code value by use of the first nonce stored in said first node, the session key and the first additional information obtained by decrypting the first encryption message, and the first secret key, and authenticate the session key received from the authentication server by judging whether or not the first message authentication code value calculated by said first node is equal to the first message authentication code value received from said authentication server, and said second node being configured to in response to receiving the second encryption message and the second message authentication code value, obtain the session key and the second additional information by decrypting the second encryption message with the second secret key, and calculate the second message authentication code value by use of the second nonce stored in said second node, the session key and the second additional information obtained by decrypting the second encryption message, and the second secret key, and authenticate the session key received from said authentication server by judging whether or not the second message authentication code value calculated by said second node is equal to the second message authentication code value received from said authentication server. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
Specification