METHOD FOR FORMING KEY OF ENCRYPTION/DECRYPTION Russian patent published in 2018 - IPC H04L9/08 

Abstract RU 2642806 C1

FIELD: physics.

SUBSTANCE: method is carried out through the formation of a confidential key of the key distribution center, which is carried out on the basis of the sensor by selecting random numbers of coefficients of the symmetric polynomials {ƒi{x1, x2)}, over the field GF(264), the personal confidential key of the user is produced in the form of ratios of polynomials {gA,i (x)}, obtained by substituting the YA identifier in the polynomials {ƒi(x1, x2)}, instead of one of the arguments: gA,i(x)=ƒi(x, YA)=ƒi(YA, x)mod(264), the session key KAB is obtained usinga lookup in a personal confidential key {gA,i(x)}, of the correspondent identifier: KAB,i=g(YB)mod(264), while the session key with a length of n bits is a concatenation of the values of polynomials over the field GF (264) KAB=KAB,0||KAB,1||…||KAB,r-1 i.e. it can be calculated using the formula KAB=KAB.0+KAB,1⋅(264)+KAB.2⋅(264)2+KAB, r-1⋅(264)r-1.

EFFECT: reducing the time required to complete the procedures for obtaining personal and session keys.

1 cl

Similar patents RU2642806C1

Title Year Author Number
ENCRYPTION-DECRYPTION KEY FORMING TECHNIQUE 1994
  • Korzhik V.I.
  • Merinovich Ju.V.
RU2090006C1
METHOD OF GENERATING SHARED SECRET KEY IN GROUP OF SUBSCRIBERS 2019
  • Kolybelnikov Aleksandr Ivanovich
RU2719634C1
METHOD OF TRANSMISSION OF ENCRYPTION/DECRYPTION KEY BY FIBER OPTIC LINE OF UNLIMITED LENGTH 2017
  • Kulish Olga Aleksandrovna
  • Khisamov Frangiz Gilfanetdinovich
  • Chernukha Yurij Vladimirovich
  • Sharifullin Sergej Ravilevich
  • Pshenichnyj Igor Sergeevich
RU2661287C1
METHOD FOR AUTHENTICATING OBJECTS 2000
  • Nikitin V.N.
  • Moldovjan A.A.
  • Moldovjan N.A.
  • Fokin A.O.
RU2184390C1
METHOD FOR SECURE COMMUNICATION IN NETWORK, COMMUNICATION DEVICE, NETWORK AND COMPUTER PROGRAMME THEREFOR 2010
  • Garsija Morchon Oskar
  • Ehrdmann Bozhena
  • Kurzave Klaus
RU2534944C2
KEY JOINT USAGE DEVICE AND THE SYSTEM FOR ITS CONFIGURATION 2013
  • Garsiya Morchon Oskar
  • Tolkhejzen Lyudovikus Marinus Gerardus Mariya
  • Guterres Khajme
  • Kumar Sandip Shankaran
  • Gomes Domingo
RU2621182C1
METHOD OF DELIVERING KEY WITH VERIFICATION OF RADIO NETWORK CORRESPONDENT AUTHENTICITY 2016
  • Burnashev Rustam Umidovich
  • Razikov Vladimir Nikolaevich
  • Kozlovtsev Viktor Vladimirovich
  • Zharkov Vladimir Evgenevich
RU2654122C2
METHOD FOR GENERATION AND AUTHENTICATION OF ELECTRONIC DIGITAL SIGNATURE THAT VERIFIES ELECTRONIC DOCUMENT 2008
  • Moldovjan Nikolaj Andreevich
RU2392736C1
WEBER FUNCTION CYCLE-BASED QUANTUM ATTACK-SECURE ENCRYPTION METHOD 2013
  • Rostovtsev Aleksandr Grigor'Evich
RU2541938C1
METHOD OF PROTECTING INFORMATION IN CLOUD COMPUTING USING HOMOMORPHIC ENCRYPTION 2017
  • Krendelev Sergej Fedorovich
  • Tormasov Aleksandr Gennadevich
RU2691874C2

RU 2 642 806 C1

Authors

Khisamov Frangiz Gilfanetdinovich

Chernukha Yurij Vladimirovich

Pshenichnyj Igor Sergeevich

Zhuk Arsenij Sergeevich

Dates

2018-01-26Published

2017-03-27Filed