Claims
- 1. A method of authenticating a pair of correspondents A,B to permit exchange of information therebetween, each of said correspondents having a respective private key a,b and a public key p.sub.A,p.sub.B derived from a generator .alpha. and respective ones of said private keys a,b, said method including the steps of
- i) a first of said correspondents A selecting a first random integer x and exponentiating a function f(.alpha.) including said generator to a power g.sup.(x) to provide a first exponentiated function f(.alpha.).sup.g(x) ;
- ii) said first correspondent A generating a first signature s.sub.A from said random integer x and said exponentiated function f(.alpha.).sup.g(x) ;
- iii) said first correspondent A forwarding to a second correspondent B a message including said first exponentiated function f(.alpha.).sup.g(x) ;
- iv) said correspondent B selecting a second random integer y and exponentiating a function f'(.alpha.) including said generator to a power g.sup.(y) to provide a second exponentiated function f'(.alpha.).sup.g(y) and generating a signature S.sub.B obtained from said second integer y and said second exponentiated function f'(.alpha.).sup.g(y) ;
- v) said second correspondent B forwarding a message to said first correspondent A including said second exponential function f'(.alpha.).sup.g(y) ;
- vi) each of said correspondents constructing a session key K by exponentiating information made public by another correspondent with information that is private to themselves.
- 2. A method of claim 1 wherein said message forwarded by said first correspondent includes an identification of the first correspondent.
- 3. A method according to claim 1 wherein said message forwarded by said second correspondent includes an identification of said second correspondent.
- 4. A method according to claim 3 wherein said message forwarded by said first correspondent includes an identification of the first correspondent.
- 5. A method according to claim 1 wherein said first function including said generator f(.alpha.) is said generator itself.
- 6. A method according to claim 1 wherein said second function f(.alpha.) including said generator is said generator itself.
- 7. A method according to claim 6 wherein said first function f(.alpha.) including said generator is said generator itself.
- 8. A method according to claim 1 wherein said first function including said generator f(.alpha.) includes the public key p.sub.S of said second correspondent.
- 9. A method according to claim 1 wherein said second f unction including said generator f'.alpha. includes the public key p.sub.A of said first correspondent.
- 10. A method according to claim 1 wherein said signature generated by a respective one of the correspondents cosine the random integer, exponentiated function and private key of that one correspondent.
- 11. A method according to claim 10 wherein said signature of correspondent A is of the form x-r.sub.A a.alpha..sup.a mod (p-1).
- 12. A method according to claim 11 wherein said correspondent A selects a second integer x.sub.1 and forwards r.sub.A.sbsb.1 to correspondent B where r.sub.A.sbsb.1 =.alpha..sup.x.sbsp.1 and said correspondent B selects a second random integer y.sub.1 and sends r.sub.B.sbsb.1 to correspondent A, where r.sub.B.sbsb.1 =.alpha..sup.y.sbsp.1 each of said correspondents computing a pair of keys k.sub.1,k.sub.2 equivalent to .alpha..sup.xy and .alpha..sup.x.sbsp.1.sup.y.sbsp.1 respectively, said session key K being generated by XORing k.sub.1 and k.sub.2.
- 13. A method according to claim 10 wherein said signature of correspondent A is of the form x+a.alpha..sup.a (p.sub.B).sup.x mod (p-1).
- 14. A method according to claim 10 wherein said signature of correspondent A is of the form xr.sub.x.sbsb.1 -(r.sub.A).sup.r.sbsp.x.sbsp.1 a mod (p-1) where x.sub.1 is a second random integer selected by A and r.sub.x.sbsb.1 =.alpha..sup.x.sbsp.1.
- 15. A method according to claim 10 wherein said signature of correspondent B is of the form y.sub.B -r.sub.B b.alpha..sup.b mod (p-1).
- 16. A method according to claim 10 wherein said signature of correspondent B is of the form y+b.alpha..sup.b (p.sub.A).sup.y mod (p-1).
- 17. A method according to claim 10 wherein said signature of correspondent B is of the form yr.sub.y.sbsb.1 -(r.sub.B).sup.r.sbsp.y.sbsp.1 b mod (p-1) where y.sub.1 is a second integer selected by correspondent B and r.sub.y.sbsb.1 =.alpha..sup.y.sbsp.1.
REFERENCE TO RELATED APPLICATIONS
This is a continuation-in-part of U.S. application Ser. No. 08/442,833, filed May 17, 1995, now U.S. Pat. No. 5,761,305, entitled "Key Agreement and Transport Protocol with Implicit Signatures".
US Referenced Citations (11)
Continuation in Parts (1)
|
Number |
Date |
Country |
Parent |
442833 |
May 1995 |
|