METHOD FOR COMMUNICATION
    1.
    发明专利

    公开(公告)号:JP2001313634A

    公开(公告)日:2001-11-09

    申请号:JP2001071600

    申请日:2001-03-14

    Abstract: PROBLEM TO BE SOLVED: To provide a mutual network authentication protocol whose security can be proved and which is safe and is based only on a password. SOLUTION: Shared secret gxy is generated between two parties A and B involved in sharing a password through a data network by using Diffie-Hellman type key exchange related to a specific group. The symbol g represents a group generating element that is already known to both parties involved, the symbol x represents an exponent that is known to one party A involved (e.g. client) and the symbol y represents an exponent that is known to the other party B involved (e.g. server). The party A generates a parameter m by performing a group operation with respect to gx and at least a password function H1 and transmits the parameter m to the party B. This, the party B performs an inverse group operation of the parameter m and the function H1 to extract the secrecy gx and can further calculates the shared secrecy gxy from the party B and can generate the shared secret gxy.

    SECURE MUTUAL NETWORK AUTHENTICATION AND KEY EXCHANGE PROTOCOL

    公开(公告)号:CA2335172A1

    公开(公告)日:2001-09-17

    申请号:CA2335172

    申请日:2001-02-09

    Abstract: Secure communication protocols are disclosed in which two parties genera te a shared secret which may be used as a secure session key for communication between the parties. The protocols are based on Diffie-Hellman type key exchange in which a Diffie-Hellman value is combined with a function of at least a password using the group operation such that the Diffie-Hellman value may be extracte d by the other party using the inverse group operation and knowledge of the password. In one embodiment, each of the parties explicitly authenticates the other party, while in another embodiment, the parties utilize implicit authentication relying o n the generation of an appropriate secret session key to provide the implicit authentication. Typically, the parties will be a client computer and a serve r computer. In accordance with other embodiments of the invention, in order to protect against a security compromise at the server, the server is not in possession of the password, but instead is provided with, and stores, a so-called password verifier which is a function of the password and where the password itself cannot be determined from the value of the password verifier.

    3.
    发明专利
    未知

    公开(公告)号:DE60001630D1

    公开(公告)日:2003-04-17

    申请号:DE60001630

    申请日:2000-10-23

    Abstract: Secure communication protocols are disclosed in which two parties generate a shared secret which may be used as a secure session key for communication between the parties. The protocols are based on Diffie-Hellman type key exchange in which a Diffie-Hellman value is combined with a function of at least a password using the group operation such that the Diffie-Hellman value may be extracted by the other party using the inverse group operation and knowledge of the password. In one embodiment, each of the parties explicitly authenticates the other party, while in another embodiment, the parties utilize implicit authentication relying on the generation of an appropriate secret session key to provide the implicit authentication. Typically, the parties will be a client computer and a server computer. In accordance with other embodiments of the invention, in order to protect against a security compromise at the server, the server is not in possession of the password, but instead is provided with, and stores, a so-called password verifier which is a function of the password and where the password itself cannot be determined from the value of the password verifier.

    SECURE MUTUAL NETWORK AUTHENTICATION AND KEY EXCHANGE PROTOCOL

    公开(公告)号:CA2335172C

    公开(公告)日:2005-04-12

    申请号:CA2335172

    申请日:2001-02-09

    Abstract: Secure communication protocols are disclosed in which two parties genera te a shared secret which may be used as a secure session key for communication between the parties. The protocols are based on Diffie-Hellman type key exchange in which a Diffie-Hellman value is combined with a function of at least a password using the group operation such that the Diffie-Hellman value may be extracte d by the other party using the inverse group operation and knowledge of the password. In one embodiment, each of the parties explicitly authenticates the other party, while in another embodiment, the parties utilize implicit authentication relying o n the generation of an appropriate secret session key to provide the implicit authentication. Typically, the parties will be a client computer and a serve r computer. In accordance with other embodiments of the invention, in order to protect against a security compromise at the server, the server is not in possession of the password, but instead is provided with, and stores, a so-called password verifier which is a function of the password and where the password itself cannot be determined from the value of the password verifier.

    5.
    发明专利
    未知

    公开(公告)号:DE60001630T2

    公开(公告)日:2003-12-18

    申请号:DE60001630

    申请日:2000-10-23

    Abstract: Secure communication protocols are disclosed in which two parties generate a shared secret which may be used as a secure session key for communication between the parties. The protocols are based on Diffie-Hellman type key exchange in which a Diffie-Hellman value is combined with a function of at least a password using the group operation such that the Diffie-Hellman value may be extracted by the other party using the inverse group operation and knowledge of the password. In one embodiment, each of the parties explicitly authenticates the other party, while in another embodiment, the parties utilize implicit authentication relying on the generation of an appropriate secret session key to provide the implicit authentication. Typically, the parties will be a client computer and a server computer. In accordance with other embodiments of the invention, in order to protect against a security compromise at the server, the server is not in possession of the password, but instead is provided with, and stores, a so-called password verifier which is a function of the password and where the password itself cannot be determined from the value of the password verifier.

Patent Agency Ranking