摘要:
A method and system for providing secure authenticated cryptographic key distribution in a communication system has properties very similar to a Two-Party Authentication Protocol. A new group key is distributed by a server to a selected group of users in the system. A braided structure of the meassages sent by the server to each user allows achieving authentication and, at the same time, secure and secret key distribution. Moreover, the braided structure makes it possible to construct minimal-length protocol messages.
摘要:
A robust and secure password (or key) change method between a user and an authentication server in a distributed communication network is disclosed. The protocol requires the exchange of only two messages between the user desiring the key change and the server, the user's request including, at least partly encrypted, an identification of the sending user, old and new keys, and two nonces, at least one including a time indication. The authentication server's response includes a possibly encrypted accept/reject indication and the regularly encrypted request from the user.
摘要:
A robust and secure password (or key) change method between a user and an authentication server in a distributed communication network is disclosed. The protocol requires the exchange of only two messages between the user desiring the key change and the server, the user's request including, at least partly encrypted, an identification of the sending user, old and new keys, and two nonces, at least one including a time indication. The authentication server's response includes a possibly encrypted accept/reject indication and the regularly encrypted request from the user.
摘要:
A method and system for providing secure authenticated cryptographic key distribution in a communication system has properties very similar to a Two-Party Authentication Protocol. A new group key is distributed by a server to a selected group of users in the system. A braided structure of the meassages sent by the server to each user allows achieving authentication and, at the same time, secure and secret key distribution. Moreover, the braided structure makes it possible to construct minimal-length protocol messages.