Efficient key derivation for end-to-end network security with traffic visibility

    公开(公告)号:US09832015B2

    公开(公告)日:2017-11-28

    申请号:US14557125

    申请日:2014-12-01

    Abstract: Both end-to-end security and traffic visibility may be achieved by a system using a controller that derives a cryptographic key that is different for each client based on a derivation key and a client identifier that is conveyed in each data packet. The controller distributes the derivation key to information technology monitoring devices and a server to provide traffic visibility. For large key sizes, the key may be derived using a derivation formula as follows: client_key_MSB=AES128(base_key_1, client_ID),  (1) client_key_LSB=AES128(base_key_2, client_ID+pad), and  (2) client_key=client_key_MSB∥client_key_LSB, where (1) and (2) are executed in parallel. The client key and a client identifier may be used so that end-to-end security may be achieved.

    Efficient key derivation for end-to-end network security with traffic visibility
    54.
    发明授权
    Efficient key derivation for end-to-end network security with traffic visibility 有权
    针对具有流量可见性的端到端网络安全性的高效密钥导出

    公开(公告)号:US08903084B2

    公开(公告)日:2014-12-02

    申请号:US13916027

    申请日:2013-06-12

    Abstract: Both end-to-end security and traffic visibility may be achieved by a system using a controller that derives a cryptographic key that is different for each client based on a derivation key and a client identifier that is conveyed in each data packet. The controller distributes the derivation key to information technology monitoring devices and a server to provide traffic visibility. For large key sizes, the key may be derived using a derivation formula as follows: client_key_MSB=AES128(base_key_1,client_ID),  (1) client_key_LSB=AES128(base_key_2,client_ID+pad),and  (2) client_key=client_key_MSB∥client_key_LSB, where (1) and (2) are executed in parallel. The client key and a client identifier may be used so that end-to-end security may be achieved.

    Abstract translation: 端到端安全性和流量可见性可以由使用控制器的系统来实现,所述控制器基于在每个数据分组中传送的导出密钥和客户端标识符来导出每个客户端不同的密码密钥。 控制器将派生密钥分发到信息技术监控设备和服务器,以提供流量可视性。 对于较大的密钥大小,可以使用如下的推导公式来导出密钥:client_key_MSB = AES128(base_key_1,client_ID),(1)client_key_LSB = AES128(base_key_2,client_ID + pad)和(2)cli​​ent_key =client_key_MSB‖client_key_LSB, 其中(1)和(2)并行执行。 可以使用客户端密钥和客户端标识符,以便可以实现端到端的安全性。

Patent Agency Ranking