FIELD: cryptography; distribution of keys; building key distribution system resistant to desired number of compromises of personal keys of users to ensure confidential communication between any of their pairs. SUBSTANCE: confidential key is formed by selecting coefficients of symmetrical polynomials fi(x1,x2) on the basis of random-number sensor, generation of personal confidential key for user by substituting user identifier in polynomials fi(x1,x2), formation of session key by substituting user identifier in personal key. EFFECT: simplified hardware-software implementation basing on single standard microprocessor of high-speed session key formation system, reduced failure probability during input of personal key, simplified storage of key, improved resistance to external mechanical and electromagnetic effects. 2 tbl
Title | Year | Author | Number |
---|---|---|---|
METHOD FOR FORMING KEY OF ENCRYPTION/DECRYPTION | 2017 |
|
RU2642806C1 |
METHOD OF GENERATING SHARED SECRET KEY IN GROUP OF SUBSCRIBERS | 2019 |
|
RU2719634C1 |
METHOD FOR AUTHENTICATING OBJECTS | 2000 |
|
RU2184390C1 |
METHOD FOR CRYPTOPROTECTION OF TELECOMMUNICATION KNOW-HOW SYSTEMS | 1995 |
|
RU2077113C1 |
METHOD OF DELIVERING KEY WITH VERIFICATION OF RADIO NETWORK CORRESPONDENT AUTHENTICITY | 2016 |
|
RU2654122C2 |
METHOD FOR GENERATION OF ENCRYPTION/DECRYPTION KEY | 2005 |
|
RU2295199C1 |
METHOD AND DEVICE FOR CIPHERING/DECIPHERING MESSAGES BY HASHING FUNCTION | 1998 |
|
RU2138126C1 |
OBJECT AUTHENTICATION METHOD | 2000 |
|
RU2183348C2 |
METHOD FOR FORMATION OF CODING/DECODING KEY | 2007 |
|
RU2356168C2 |
METHOD FOR SECURE COMMUNICATION IN NETWORK, COMMUNICATION DEVICE, NETWORK AND COMPUTER PROGRAMME THEREFOR | 2010 |
|
RU2534944C2 |
Authors
Dates
1997-09-10—Published
1994-07-18—Filed