COMMUNICATION METHOD
    1.
    发明专利

    公开(公告)号:JP2002335238A

    公开(公告)日:2002-11-22

    申请号:JP2002083199

    申请日:2002-03-25

    Abstract: PROBLEM TO BE SOLVED: To provide a secure password-only mutual network authentication protocol which is provably secure. SOLUTION: Between two parties A and B sharing a password through a data network, a shared secret key g is generated by using Diffie-Hellman type key exchange concerning a specified group. In such a case, (g) is a group generator known by both the parties, (x) is an index known to one party (client, for example) A and (y) is an index known to the other party (server, for example) B. The party A generates a parameter (m) by applying group operation to g and a function H1 of the password at least and transmits (m) to the party B. In the result of the function H1 , the part outside the group is made random. Thus, the person B applies inverse group operation to be (m) and the function H1 , extracts g by removing the randomization of any portion outside the group in the result of the function H1 and further can calculate the shared secret g .

    METHOD FOR COMMUNICATION
    2.
    发明专利

    公开(公告)号:JP2001313634A

    公开(公告)日:2001-11-09

    申请号:JP2001071600

    申请日:2001-03-14

    Abstract: PROBLEM TO BE SOLVED: To provide a mutual network authentication protocol whose security can be proved and which is safe and is based only on a password. SOLUTION: Shared secret gxy is generated between two parties A and B involved in sharing a password through a data network by using Diffie-Hellman type key exchange related to a specific group. The symbol g represents a group generating element that is already known to both parties involved, the symbol x represents an exponent that is known to one party A involved (e.g. client) and the symbol y represents an exponent that is known to the other party B involved (e.g. server). The party A generates a parameter m by performing a group operation with respect to gx and at least a password function H1 and transmits the parameter m to the party B. This, the party B performs an inverse group operation of the parameter m and the function H1 to extract the secrecy gx and can further calculates the shared secrecy gxy from the party B and can generate the shared secret gxy.

    METHODS AND APPARATUS FOR PROVIDING EFFICIENT PASSWORD-AUTHENTICATED KEY EXCHANGE

    公开(公告)号:CA2376947C

    公开(公告)日:2007-07-10

    申请号:CA2376947

    申请日:2002-03-15

    Abstract: A secure protocol is provided which uses a Diffie-Hellman type shared secret , but modified such that the two parties may authenticate each other using a share d password. In accordance with the invention, a party generates the DiiTie-Hellman value gx and combines it with a function of at least the password using a group operation , wherein any portion of a result associated with the function that is outside the group i s randomized. The resulting value is transmitted to the other party: The group operation is defined for the particular group being used. Every group has a group operation and a corresponding inverse group operation. Upon receipt of the value, the other party performs the inverse group operation on the received value and the function of at least the password, and removes the randomization of any portion of the result associated with the function that is outside the group, to extract e such that the other party may then generate the shared secret g''' using its knowledge ofy.

    METHODS AND APPARATUS FOR PROVIDING EFFICIENT PASSWORD-AUTHENTICATED KEY EXCHANGE

    公开(公告)号:CA2376947A1

    公开(公告)日:2002-10-05

    申请号:CA2376947

    申请日:2002-03-15

    Abstract: A secure protocol is provided which uses a Diffie-Hellman type shared secret , but modified such that the two parties may authenticate each other using a share d password. In accordance with the invention, a party generates the Diffie-Hellman value g x and combines it with a function of at least the password using a group operation , wherein any portion of a result associated with the function that is outside the group i s randomized. The resulting value is transmitted to the other party. The group operation is defined for the particular group being used. Every group has a group operation and a corresponding inverse group operation. Upon receipt of the value, the other party performs the inverse group operation on the received value and the function of at least the password, and removes the randomization of any portion of the result associated with the function that is outside the group, to extract g x such that the other party may then generat e the shared secret g xy using its knowledge of y.

Patent Agency Ranking