SECURED CHANNEL WITH AUTHENTICATION Russian patent published in 2009 - IPC H04L9/08 

Abstract RU 2359416 C2

FIELD: physics, computer engineering.

SUBSTANCE: invention is related to the field of cryptography, mainly, to protected channel with authentication, and in particular, for calculation of session keys for creation of such channels to protect digital content. For the purpose the first single-range device selects the first short-term session key x and calculates the first corresponding short-term open key gx, which is sent to the second single-range device. The second single-range device calculates the second short-term open key gy in similar manner and short-term key (KePh) for collective use, determines hash-value for gy, Keph, Kperm and its identifier, and sends gy and hash-value to the first from single-range devices. The first single-range device calculates Keph, verifies hash-value and determines hash-value for gx, Keph, Kperm and its identifier and sends it to the second single-range device so that it verifies this hash-value. Afterwards both single-range devices receive session key with the help of hash coding of Keph. Devices may later use session key for establishment of protected channel with authentication (SAC).

EFFECT: increased cryptographic security of channel with authentication.

6 cl, 1 dwg

Similar patents RU2359416C2

Title Year Author Number
SECURE AUTHENTICATED CHANNEL 2009
  • Andro Zhan P'Er
  • Djuran Alan
  • Sirven Tomas
RU2488226C2
METHOD FOR PROTECTED REMOTE ACCESS TO INFORMATION RESOURCES 2013
  • Tsibulja Aleksej Nikolaevich
  • Shugurov Dmitrij Evgen'Evich
  • Markin Dmitrij Olegovich
  • Gromej Dmitrij Dmitrievich
RU2530691C1
METHOD FOR GENERATION AND AUTHENTICATION OF ELECTRONIC DIGITAL SIGNATURE THAT CERTIFIES ELECTRONIC DOCUMENT 2007
  • Moldovjan Dmitrij Nikolaevich
  • Moldovjan Nikolaj Andreevich
RU2369974C1
OBJECT AUTHENTICATION METHOD 2000
  • Moldovjan A.A.
  • Moldovjan N.A.
  • Nikitin V.N.
  • Fokin A.O.
RU2183348C2
INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING METHOD AND PROGRAM 2012
  • Sakumoto Kojti
  • Siraj Tajdzo
  • Khivatari Kharunaga
  • Kamio Kadzuya
RU2595924C2
METHOD AND APPARATUS FOR BASE STATION SELF-CONFIGURATION 2007
  • Van Piter S.
  • Guchchione Luis Dzh.
  • Miller Dzhejms M.
  • Olvera-Ehrnandes Julizis
RU2424634C2
PROTECTED DATA LOADING AND STORAGE IN DATA PROCESSING DEVICE 2005
  • Germann Kristian
  • Smets Bernard
RU2408071C2
METHOD AND SYSTEM FOR TRUSTED THIRD PARTY-BASED TWO-WAY OBJECT IDENTIFICATION 2008
  • Te Man'Sja
  • Tsao Tszjun'
  • Laj Sjaolun
  • Pan Ljaotszjun'
  • Khuan Chzhehnkhaj
RU2458481C2
METHOD AND APPARATUS FOR PSEUDONYM GENERATION AND AUTHENTICATION 2009
  • Li Khuehj
  • Tsjuj Tszin'
RU2512139C2
FORMING THE KEY DEPENDING ON THE PARAMETER 2017
  • Roth Gregory B.
  • Behm Bradley Jeffery
  • Crahen Eric D.
  • Ilac Cristian M.
  • Fitch Nathan R.
  • Brandwine Eric Jason
  • O'Neill Kevin Ross
RU2670778C9

RU 2 359 416 C2

Authors

Andro Zhan P'Er

Djuran Alan

Sirven Tomas

Dates

2009-06-20Published

2004-10-29Filed