Communication protocol for secure communications systems
    1.
    发明授权
    Communication protocol for secure communications systems 有权
    用于安全通信系统的通信协议

    公开(公告)号:US08650404B2

    公开(公告)日:2014-02-11

    申请号:US13406610

    申请日:2012-02-28

    IPC分类号: H04L29/00

    摘要: A method and apparatus for authenticating a key management message within a secure communication system is provided herein. During operation, a digital signature for message authentication of a Project 25 Key Management Message (KMM) is utilized. In particular, the digital signature will be used to authenticate the KMM in scenarios where there is no Message Authentication Code (MAC). The MAC will be utilized to authenticate the KMM when available. Because authentication of KMMs take place, even when no MAC is available, it becomes increasingly more difficult to tamper or spoof the delivery of encryption keys.

    摘要翻译: 本文提供了一种在安全通信系统内验证密钥管理消息的方法和装置。 在操作期间,利用了一个用于项目25密钥管理消息(KMM)的消息认证的数字签名。 特别地,在不存在消息认证码(MAC)的情况下,数字签名将用于认证KMM。 当可用时,MAC将用于认证KMM。 由于KMM的认证发生,即使没有MAC可用,变得越来越难以篡改或欺骗加密密钥的传送。

    Communication protocol for secure communications systems
    2.
    发明授权
    Communication protocol for secure communications systems 有权
    用于安全通信系统的通信协议

    公开(公告)号:US09143321B2

    公开(公告)日:2015-09-22

    申请号:US13416468

    申请日:2012-03-09

    摘要: A method and apparatus for transmitting encryption keys in a secure communication system is provided herein. During rekeying of a device, a key encryption key (KEK) is utilized to wrap (encrypt) the traffic encryption key (TEK) when the KEK is available to the device. If unavailable, the TEK will be wrapped using public key encryption with the recipient device's public key. The receiving device will then be able to unwrap the TEK using public key decryption with its own private key. Because TEKs are always transmitted in a secure manner, secure and efficient rekeying of devices on foreign networks can occur.

    摘要翻译: 本发明提供一种用于在安全通信系统中发送加密密钥的方法和装置。 在设备的密钥更新期间,当KEK可用于设备时,利用密钥加密密钥(KEK)来包裹(加密)流量加密密钥(TEK)。 如果不可用,TEK将使用公钥加密与收件人设备的公钥进行包装。 接收设备将能够使用其自己的私钥使用公钥解密来解开TEK。 由于TEK始终以安全的方式传输,因此可能会发生外部网络上设备的安全高效的密钥密钥。