Method and apparatus for providing peer authentication for an internet key exchange
First Claim
1. A method, comprising:
- an initiator sending a responder a message claiming an identity associated with a secret key;
providing an authentication field and a random number field from the responder to the initiator;
the initiator authenticating the responder based at least in part on the authentication field derived from the secret key without revealing the secret key; and
the responder authenticating the initiator based at least in part on a result field derived from the secret key without revealing the secret key;
wherein the secret key and the identity are provided out-of-band to both the initiator and at least one other entity, whereby the identity is associated with the secret key.
1 Assignment
0 Petitions
Accused Products
Abstract
A protocol for use as a phase 1 authentication (and key agreement) IKE protocol, similar to IKE phase 1 authentication with public key encryption, but using the IMS AKA trust infrastructure instead of the PKI trust infrastructure. The invention thus allows an initiator (11) having a secret long-term key stored on a smart cart (11a), to authenticate a responder (12), the responder (12) having in some cases a trusted interface with a Home Subscriber Server (14) that has a copy (14a) of the initiator'"'"'s long-term key (and in other cases having itself access to the initiator'"'"'s long-term key). The protocol includes a Diffie-Hellman exchange, and by authenticating the initiator (11) and responder (12), the protocol authenticates the exchange.
20 Citations
24 Claims
-
1. A method, comprising:
-
an initiator sending a responder a message claiming an identity associated with a secret key; providing an authentication field and a random number field from the responder to the initiator; the initiator authenticating the responder based at least in part on the authentication field derived from the secret key without revealing the secret key; and the responder authenticating the initiator based at least in part on a result field derived from the secret key without revealing the secret key; wherein the secret key and the identity are provided out-of-band to both the initiator and at least one other entity, whereby the identity is associated with the secret key. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14)
-
-
15. An apparatus comprising:
-
a card for providing a message claiming an identity associated with a secret key for transmission; a receiver for receiving an authentication field and a random number field from a device in communication with the apparatus; and a module for performing authentication of the device in communication with the apparatus based on the authentication field which is derived from the secret key without revealing the secret key; wherein the secret key and identity are provided out-of-band to the apparatus and at least one other entity. - View Dependent Claims (16, 17, 18, 19, 20, 21, 22)
-
-
23. An apparatus comprising:
-
means for providing a message claiming an identity associated with a secret key for transmission; means for receiving an authentication field and a random number field from a device in communication with the apparatus, and means for performing authentication of the device in communication with the apparatus based on the authentication field which is derived from the secret key without revealing the secret key; wherein the secret key and identity are provided out-of-band to the apparatus and at least one other entity. - View Dependent Claims (24)
-
Specification