Master key encryption functions for transmitter-receiver pairing as a countermeasure to thwart key recovery attacks
First Claim
Patent Images
1. A method operational on a receiver device for exchanging and/or generating security keys, comprising:
- receiving a first encrypted master key Km from a transmitter device, the first encrypted master key Km secured by a receiver public key Kpub-rx;
decrypting the first encrypted master key Km with a receiver private key Kpri-rx to obtain the master key Km; and
encrypting the master key Km using a block cipher that applies a receiver secret key Kh in a non-self-inverting operation to obtain a second encrypted master key.
1 Assignment
0 Petitions
Accused Products
Abstract
A method operational on a receiver device for exchanging and/or generating security keys is provided. A first encrypted master key Km is received at the receiver device from a transmitter device, the first encrypted master key Km secured by a receiver public key Kpub-rx. The first encrypted master key Km may be decrypted with a receiver private key Kpri-rx to obtain the master key Km. The master key Km may be encrypted using a block cipher that applies a receiver secret key Kh to obtain a second encrypted master key.
29 Citations
39 Claims
-
1. A method operational on a receiver device for exchanging and/or generating security keys, comprising:
-
receiving a first encrypted master key Km from a transmitter device, the first encrypted master key Km secured by a receiver public key Kpub-rx; decrypting the first encrypted master key Km with a receiver private key Kpri-rx to obtain the master key Km; and encrypting the master key Km using a block cipher that applies a receiver secret key Kh in a non-self-inverting operation to obtain a second encrypted master key. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A receiver device, comprising:
-
a communication circuit for communicating with a transmitter device; and a processing circuit coupled to the communication circuit, the processing circuit adapted to; receive a first encrypted master key Km from the transmitter device, the first encrypted master key Km secured by a receiver public key Kpub-rx; decrypt the first encrypted master key Km with a receiver private key Kpri-rx to obtain the master key Km; and encrypt the master key Km using a block cipher that applies a receiver secret key Kh in a non-self-inverting operation to obtain a second encrypted master key. - View Dependent Claims (13, 14, 15, 16, 17, 18)
-
-
19. A receiver device, comprising
means for receiving a first encrypted master key Km from a transmitter device, the first encrypted master key Km secured by a receiver public key Kpub-rx; -
means for decrypting the first encrypted master key Km with a receiver private key Kpri-rx to obtain the master key Km; and means for encrypting the master key Km using a block cipher that applies a receiver secret key Kh in a non-self-inverting operation to obtain a second encrypted master key. - View Dependent Claims (20, 21)
-
-
22. A non-transitory machine-readable storage medium having instructions stored thereon which when executed by at least one processor causes the at least one processor to:
-
receive a first encrypted master key Km from a transmitter device, the first encrypted master key Km secured by a receiver public key Kpub-rx; decrypt the first encrypted master key Km with a receiver private key Kpri-rx to obtain the master key Km; and encrypt the master key Km using a block cipher that applies a receiver secret key Kh in a non-self-inverting operation to obtain a second encrypted master key. - View Dependent Claims (23)
-
-
24. A method operational on a receiver device for exchanging and/or generating security keys, comprising:
-
transmitting a receiver nonce rrx to a transmitter device; receiving a transmitter nonce rtx from the transmitter device; receiving a first encrypted master key Km and a master nonce m from the transmitter device, wherein the first encrypted master key Km is secured by a receiver public key Kpub-rx, and the master nonce m is a function of both the transmitter nonce rtx and the receiver nonce rrx; decrypting the first encrypted master key Km with a receiver private key Kpri-rx to obtain the master key Km; and encrypting the master key Km in a non-self-inverting operation using a receiver secret key Kh and the master nonce m within an Advanced Encryption Standard (AES) block cipher to obtain a second encrypted master key. - View Dependent Claims (25, 26, 27, 28, 29, 30, 31, 32)
-
-
33. A receiver device, comprising:
-
a communication circuit for communicating with a transmitter device; and a processing circuit coupled to the communication circuit, the processing circuit adapted to; transmit a receiver nonce rrx to a transmitter device; receive a transmitter nonce rtx from the transmitter device; receive a first encrypted master key Km and a master nonce m from the transmitter device, wherein the first encrypted master key Km is secured by a receiver public key Kpub-rx, and the master nonce m is a function of both the transmitter nonce rtx and the receiver nonce rrx; decrypt the first encrypted master key Km with a receiver private key Kpri-rx to obtain the master key Km; and encrypt the master key Km in a non-self-inverting operation using a receiver secret key Kh and the master nonce m within an Advanced Encryption Standard (AES) block cipher to obtain a second encrypted master key. - View Dependent Claims (34, 35, 36)
-
-
37. A receiver device, comprising:
-
means for transmitting a receiver nonce rrx to a transmitter device; means for receiving a transmitter nonce rtx from the transmitter device; means for receiving a first encrypted master key Km and a master nonce m from the transmitter device, wherein the first encrypted master key Km is secured by a receiver public key Kpub-rx, and the master nonce m is a function of both the transmitter nonce rtx and the receiver nonce rrx; means for decrypting the first encrypted master key Km with a receiver private key Kpri-rx to obtain the master key Km; and means for encrypting the master key Km in a non-self-inverting operation using a receiver secret key Kh and the master nonce m within an Advanced Encryption Standard (AES) block cipher to obtain a second encrypted master key. - View Dependent Claims (38)
-
-
39. A non-transitory machine-readable storage medium having instructions stored thereon which when executed by at least one processor causes the at least one processor to:
-
transmit a receiver nonce rrx to a transmitter device; receive a transmitter nonce rtx from the transmitter device; receive a first encrypted master key Km and a master nonce m from the transmitter device, wherein the first encrypted master key Km is secured by a receiver public key Kpub-rx, and the master nonce m is a function of both the transmitter nonce rtx and the receiver nonce rrx; decrypt the first encrypted master key Km with a receiver private key Kpri-rx to obtain the master key Km; and encrypt the master key Km in a non-self-inverting operation using a receiver secret key Kh and the master nonce m within an Advanced Encryption Standard (AES) block cipher to obtain a second encrypted master key.
-
Specification