Abstract:
A system for generating symmetric cryptographic keys for communications between hosts. Hosts use associated devices to generate secret keys. Each key is generated based on a static seed and a dynamic seed. The dynamic seed is created from sensor data or auxiliary data. The secret key allows host machines to encrypt, or decrypt, plaintext messages sent to, or received from, other host machines.
Abstract:
In an aspect, a network supporting client devices includes one or more network nodes implementing network functions. Such network functions enable a client device to apply a security context to communications with the network when the client device is not in a connected mode. The client device obtains a user plane key shared with a user plane network function implemented at a first network node and/or a control plane key shared with a control plane network function implemented at a second network node. The client device protects a data packet with the user plane key or a control packet with the control plane key. The data packet includes first destination information indicating the first network node and the control packet includes second destination information indicating the second network node. The client device transmits the data packet or control packet.
Abstract:
A computer-implemented method for establishing a secure communication tunnel between a device and a server is provided. The method comprises the server receiving a session request from the device to establish a secure tunnel. A handshake procedure is carried out to set up an encryption/decryption key for the secure tunnel. The handshake procedure uses a first communication channel from the server to the device. The method also includes sending a component of the handshake procedure to the device via a second communication channel. This component is required by the device to continue the handshake procedure or to commencing use of the secure tunnel established by the handshake procedure.
Abstract:
Method, network element, user equipment (UE) and system are disclosed for securing device-to-device (D2D) communication in a wireless network. The wireless network has a first UE in an idle mode, a second UE in a connected mode, and a network element. The method comprises: encrypting the second UE's identification (ID) by using a first key which is known to the network element and the first UE and which is unknown to the second UE; sending the encrypted second UE's ID from the network element to the first UE via the second UE; and verifying the second UE's ID by using the encrypted second UE's ID. According to some embodiments, the method further comprises: deriving a D2D key for D2D communication between the first and second UEs, based on a random number and a second key which is known to the network element and the first UE; encrypting the D2D key based at least in part on a third key which is shared between the network element and the second UE and which is unknown to any other UE in the wireless network; and sending the encrypted D2D key from the network element to the second UE.
Abstract:
A User Equipment (UE) device or network system facilitates a Circuit Switched Fallback (CSFB) procedure to enable fallback from a Long Term Evolution (LTE) network to a circuit switched domain network. A network device or a UE can operate to skill skip an authentication procedure during CSFB procedures and shorten a call setup time. A key access security management entity (K ASME ) is acquired. An extended service request message is communicated, or received, to originate the CSFB process from a first network of a first network device to a second network of a second network device in response to a mobile originating call or a mobile terminating call. A plurality of circuit switched (CS) key parameters is derived from the K ASME, and the CSFB procedure is generated based on the plurality of CS key parameters.
Abstract:
Systems and methods are provided for generating subsequent encryption keys by a client device (131)as one of a plurality of client devices (131 -134) across a network (1 10). Each client device (131 -134) is provided with the same key generation information and the same key setup information from an authentication server(120). Each client device (131 -134) maintains and stores its own key generation information and key setup information. Using its own information, each client device (131 -134) generates subsequent encryption keys that are common or the same across devices (131 -134). These subsequent encryption keys are generated and maintained the same across devices (131 -134)without any further instruction or information from the authentication server (120)or any other client device. Additionally, client devices (131 -134)can recover the current encryption key by synchronizing information with another client device.
Abstract:
In described examples, an example apparatus (206) includes a data handler (302) having a first input to receive object data and a first output to output an object notation key -value pair for the object data; a string processor (304) having a second input coupled to the first output and a second output to convey the object notation key-value pair without string literals; and a hashing and encryption handler (306) having a third input coupled to the second output and a third output to convey the key-value pair signed with a private key, to convey the key-value pair encrypted with a public key, and to convey an indication that the encrypted key-value pair is encrypted in a key of the encrypted key -value pair.