At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
|United States Patent||5,535,276|
|Ganesan||July 9, 1996|
In a system, such as a system utilizing a Kerberos protocol, system users each have an associated asymmetric crypto-key. The security of communications over the system is enhanced by a first user generating a temporary asymmetric crypto-key having a first temporary key portion and an associated second temporary key portion. The second temporary key portion is encrypted by the first user with the first private key portion of the first user crypto-key to form a first encrypted message. Another user, preferably an authentication server, applies the second private key portion and the public key portion of the first user crypto-key to the first encrypted message to decrypt the second temporary key portion and thereby authenticate the first user to the security server. The authentication server then encrypts the first encrypted message with the second private key portion of the first user crypto-key to form a second encrypted message. The first user next applies the public key portion of the first user crypto-key to decrypt the second encrypted message and obtain the second temporary key portion, thereby authenticating the security server to the first user.
|Inventors:||Ganesan; Ravi (Arlington, VA)|
Bell Atlantic Network Services, Inc.
|Filed:||November 9, 1994|
|Current U.S. Class:||713/155 ; 380/46; 713/156; 713/171|
|Current International Class:||H04L 9/32 (20060101); H04L 9/08 (20060101); H04L 9/28 (20060101); H04L 9/30 (20060101); H04K 001/00 ()|
|Field of Search:||380/23,25,4,46,49,21|
|4200770||April 1980||Hellman et al.|
|4218582||August 1980||Hellman et al.|
|4405829||September 1983||Rivest et al.|
|4424414||January 1984||Hellman et al.|
R L. Rivest, A. Shamir & L. Adleman, "A Method for Obtaining Digital Signatures and Public-key Cryptosystems", CACM, vol. 21, pp. 120-126, Feb. 1978. .
M. J. Weiner, "Cryptanalysis of Short RSA Secret Exponents", IEEE Transaction on Information Theory, vol. 36, No. 3, pp. 553-558. .
C. Boyd, Cryptography and Coding: "Digital Multisignatures", 15-17 Dec. 1986, pp. 241-246. .
Kohl, John et al., "The Kerberos.TM. Network Authentication Service (V5)", Internet-Draft, Sep. 1, 1992, pp. 1-69. .
Bellovin, Steven M. et al., "Encrypted Key Exchange: Password-Based Protocols Secure Against Dictionary Attacks", IEE, 1992, pp. 72-84. .
Schneier, B., "Applied Cryptography, Protocols, Algorithms and Source Code in C", pp. 428-436, John Wiley & Sons, NY 1994 (re Kent, S., Privacy Enhancement for Internet Electronic Mail: Part II: Certificate Based Key Management, Internet RFC 1422, Feb. 1993). .
Schneier, B., "Applied Cryptography Protocols, Algorithms and Source Code in C", p. 424, John Wiley & Sons NY 1994 (re Kohl, J. T., The Evolution of the Kerberos Authentication Service, EurOpen Conference Proceedings, May 1991)..