Method for algorithm independent cryptographic key management
First Claim
1. A method for establishing a secure communications link between first and second terminals, wherein the terminals follow a procedure including the steps of:
- exchanging a first message containing information on encryption devices and communications modes available within the terminals;
selecting in at least one terminal a common key generation and ciphering method and a common data rate;
exchanging a second message containing user authentication information;
exchanging a third message for providing data to form traffic keys;
exchanging a fourth message for synchronizing secure communications; and
initiating secure communication.
3 Assignments
0 Petitions
Accused Products
Abstract
An apparatus for secure communications contains a controller for automatically selecting one of several data ciphering means utilizing one of a plurality of ciphering algorithms common to transmitting and receiving terminals. A transmitting means for transmitting encrypted data, and a receiving means for receiving encrypted data are coupled to the plurality of ciphering means. The control means automatically determines which of the ciphering means to employ for any given secure communication. The method for establishing a secure communications link includes the steps of exchanging a first message for determining a common key generation and ciphering method and comparing a further shared message for validation of communications terminal security. Additionally, the steps of trading a still further message for providing data to form traffic keys to initialize key generators, interchanging an additional message for synchronizing and verifying synchronization of secure communications between secure communications terminals, and initiating secure communication are used.
201 Citations
15 Claims
-
1. A method for establishing a secure communications link between first and second terminals, wherein the terminals follow a procedure including the steps of:
-
exchanging a first message containing information on encryption devices and communications modes available within the terminals; selecting in at least one terminal a common key generation and ciphering method and a common data rate; exchanging a second message containing user authentication information; exchanging a third message for providing data to form traffic keys; exchanging a fourth message for synchronizing secure communications; and initiating secure communication. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A method for establishing a secure communications link, between terminals wherein each terminal follows a procedure comprising the steps of:
-
exchanging an Access Domain and Capabilities Message comprising ciphering and deciphering capabilities; trading Authentication Messages comprising certified user authentication data, a certified user public key; transmitting a first Random Component Message including a first random number receiving a second Random Component Message including a second random number, and forming a traffic key; interchanging Cryptographic Synchronization messages; and initiating a secure information interchange. - View Dependent Claims (9, 10, 11, 12, 13, 14, 15)
-
Specification