首页> 外国专利> Method and apparatus for a key-management scheme for internet protocols

Method and apparatus for a key-management scheme for internet protocols

机译:用于互联网协议的密钥管理方案的方法和设备

摘要

A first data processing device (node I) is coupled to a private network which is in turn coupled to the Internet. A second data processing device (node J) is coupled to the same, or to a different network, which is also coupled to the Internet, such that node I communicates to node J using the Internet protocol. Node I is provided with a secret value i, and a public value &agr;.sup.i mod p. Node J is provided with a secret value j, and a public value &agr;.sup.j mod p. Data packets (referred to as "datagrams") are encrypted using the teachings of the present invention to enhance network security. A source node I obtains a Diffie-Helman (DH) certificate for node J, (either from a local cache, from a directory service, or directly from node J), and obtains node J's public value &agr;.sup.j mod p from the DH certificate. Node I then computes the value of &agr;.sup.ij mod p, and derives a key K. sub.ij from the value &agr;.sup.ij mod p. A transient key K.sub.p is then generated at random, and K.sub.p is used to encrypt the datagram to be sent by node I. K.sub.p is then encrypted with key K.sub.ij. Upon receipt of the encrypted datagram by the receiving node J, the node J obtains a DH certificate for node I, (either from a local cache, from a directory service, or directly from node J), and obtains the public value &agr;.sup. i mod p. Node I then computes the value of &agr;.sup.ij mod p and derives the key K.sub.ij. Node J utilizes the key K.sub.ij to decrypt the transient key K.sub.p, and using the decrypted transient key K.sub.p, node J decrypts the datagram packet, thereby resulting in the original data in unencrypted form.
机译:第一数据处理设备(节点I)耦合到专用网络,该专用网络又耦合到因特网。第二数据处理设备(节点J)耦合到相同或不同的网络,该网络也耦合到Internet,以便节点I使用Internet协议与节点J通信。节点I具有一个秘密值i和一个公共值&agr..sup.i mod p。节点J被提供了一个秘密值j和一个公共值。使用本发明的教导对数据分组(称为“数据报”)进行加密以增强网络安全性。源节点I(从本地缓存,目录服务或直接从节点J)获得节点J的Diffie-Helman(DH)证书,并获得节点J的公共值&agr; .sup.j mod p从DH证书。然后,节点I计算&agr..sup.ij mod p的值,并从值&agr..sup.ij mod p得出密钥K.sub.ij。然后随机生成一个瞬态密钥Kp,并且Kp被用于加密要由节点I发送的数据报。然后,Kp被密钥Kij加密。接收节点J收到加密的数据报后,节点J(从本地缓存,目录服务或直接从节点J)获得节点I的DH证书,并获得公共值&agr;。一口我mod p。节点I然后计算&sup.ij mod p的值,并得出密钥K.sub.ij。节点J利用密钥Kij来解密瞬时密钥Kp,并且节点J利用解密的瞬时密钥Kp对数据报分组进行解密,从而得到未加密形式的原始数据。

著录项

  • 公开/公告号US5633933A

    专利类型

  • 公开/公告日1997-05-27

    原文格式PDF

  • 申请/专利权人 SUN MICROSYSTEMS INC.;

    申请/专利号US19960680438

  • 发明设计人 ASHAR AZIZ;

    申请日1996-07-15

  • 分类号H04L9/30;

  • 国家 US

  • 入库时间 2022-08-22 03:10:02

相似文献

  • 专利
  • 外文文献
  • 中文文献
获取专利

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号