Claims
- 1. A method of authenticating a pair of correspondents A,B to permit exchange of information therebetween, each of said correspondents having a s respective private key a,b and a public key pA,pB derived from a generator a and respective ones of said private keys a,b, said method including the steps of
i) a first of said correspondents A selecting a first random integer x and exponentiating a function f(a) including said generator to a power g(x) to provide a first exponentiated function f(α)g(x); ii) said first correspondent A forwarding to a second correspondent B a message ii including said first exponentiated function f(α)g(x); iii) said correspondent B selecting a second random integer y and exponentiating a function f(α) including said generator to a power g(y) to provide a second exponentiated function f(α)g(y); iv) said second correspondent B constructing a session key K from information is made public by said first correspondent A and information that is private to said second correspondent B. said session key K also being constructible by said first correspondent A for information made public by B and information that is private to said first correspondent A; v) said second correspondent B generating a value h of a function F[δ,K] where F[δ,K] denotes a cryptographic function applied conjointly to δ and K and where δ is a subset of the public information provided by B thereby to bind the values of δ and K; vi) said second of said correspondents B forwarding a message to said first correspondent A including said second exponential function f(α)g(y) and said value h of said cryptographic function F[δ,K]; vii) said first correspondent receiving said message and computing a session key K′ from information made public by said second correspondent B and private to said first correspondent A; viii) said first correspondent A computing a value h′ of a cryptographic function F[δ,K′]; and ix) comparing said values obtained from said cryptographic functions F to confirm their correspondence.
- 2. A method of claim 1 wherein said message forwarded by said first correspondent includes an identification of the first correspondent.
- 3. A method according to claim 1 wherein said message forwarded by said second correspondent includes an identification of said second correspondent.
- 4. A method according to claim 3 wherein said message forwarded by said first correspondent includes an identification of the first correspondent.
- 5. A method according to claim 1 wherein said first function f(α) including said generator is said generator itself.
- 6. A method according to claim 1 wherein said second function f(α) including said generator is said generator itself.
- 7. A method according to claim 6 wherein said first function f(α) including said generator is said generator itself.
- 8. A method according to claim 1 wherein said first function including said generator f(α) includes said public key pB of said second correspondent.
- 9. A method according to claim 1 wherein said second function including said generator fα includes said public key pA of said first correspondent.
- 10. A method according to claim 1 wherein said cryptographic functions F are hashes of δ and K.
- 11. A method of transporting a key between a pair of correspondents A,B to permit exchange of information therebetween, each of said correspondents having a respective private key ab and a public key pA,pB derived from a generator a and respective ones of said private keys a,b, said method including the steps of
i) a first of said correspondents A selecting a first random integer x and exponentiating a function f(α) including said generator to a power g(x) to provide a first exponentiated function f(α)g(x); ii) said first correspondent A forwarding to a second correspondent B a message including said first exponentiated function f(α)g(x); iii) said second correspondent B constructing a session key K from information made public by said first correspondent A and information that is private to said second correspondent B, said session key K also being constructible by said first correspondent A from information made public by B and information that is private to said first correspondent A; iv) both of said first correspondent A and said second correspondents B computing a respective value h,h′ of function F[δ,K] where F[δ,K] denotes a cryptographic function applied to δ and K and where δ is a subset of the public information provided by one of said correspondents; v) at least one of said correspondents comparing said values h,h′ obtained from said cryptographic function F to confirm their correspondence;
- 12. A method of claim 11 wherein said message forwarded by said first correspondent includes an identification of the first correspondent.
- 13. A method according to claim 11 wherein said message forwarded by said first correspondent includes said value obtained from said cryptographic function by said first correspondent.
- 14. A method according to claim 11 wherein said values obtained from said cryptographic functions are obtained from a hash of said public information and said session key K.
- 15. A method according to claim 11 wherein said first correspondent s selects a pair of random integers x and t and generates a session key K as f(α)g(t), and generates a value r from said first exponentiated function f(α)g(x) which includes a factor exponentiating said public key pB of said second correspondent B with said random integer t to be of the form pBE(t)αg(x).
- 16. A method according to claim 15 wherein said first correspondent A generates a value S from a combination of said random integer x and said private key a and forwards said value of r and said value of s to said second correspondent B to permit said second correspondent B to recover said session key K using the private key b of said second correspondent B.
- 17. A method according to claim 16 wherein said random integer x and said private key a are combined to produce s such that s=x−ra mod (p−1).
- 18. A method according to claim 17 wherein said cryptographic function F is a hash of said public information δ and said session key K.
- 19. A method according to claim 18 wherein said public information δ is the public key pA of said first correspondent A.
Parent Case Info
[0001] This application is a continuation-in-part of U.S. application Ser. No. 98/426,090.
Continuation in Parts (1)
|
Number |
Date |
Country |
Parent |
08426090 |
Apr 1995 |
US |
Child |
10092972 |
Mar 2002 |
US |