Patent number 8774410 is assigned to
The following quote was obtained by the news editors from the background information supplied by the inventors: "In many applications, it is desirable for one computer, server, mobile telephone,
"For example, a conventional pairing protocol that relies on breakable ciphers is disclosed in G. T. Amariucai et al., 'An Automatic, Time-Based, Secure Pairing Protocol for Passive RFID,' RFIDSec, 2011, which is incorporated by reference herein. This known pairing protocol is referred to as an 'adopted pet' or AP protocol. In the AP protocol, an
"The AP protocol leaks the secret key through a key stream generated by a cryptographically weak pseudorandom number generator (PRNG), such as a linear-feedback shift register (LFSR), seeded by the secret key. By harvesting enough contiguous key stream data, a reader can break the PRNG and recover the secret key. However, this reliance on breakable ciphers has a number of significant drawbacks. For example, breakable ciphers can be difficult to implement in practice, and their security level is difficult to calibrate. Also, requiring the use of breakable ciphers means that the AP protocol will not work with strong, standard ciphers such as the Advanced Encryption Standard (AES). Furthermore, the AP protocol does not permit a flexible range of security policies."
In addition to the background information obtained for this patent, VerticalNews journalists also obtained the inventor's summary information for this patent: "Illustrative embodiments of the present invention provide improved sharing of keys or other secret values between cryptographic devices without requiring the use of breakable ciphers as in the above-described conventional AP protocol.
"In one embodiment, a first cryptographic device generates plaintext information characterizing at least one key or other secret value associated with that device. The first cryptographic device releases portions of the plaintext information to a second cryptographic device over respective time intervals. The portions of the plaintext information are configured by the first cryptographic device such that the second cryptographic device must receive at least a designated minimum number of the portions in order to determine the secret value from those received portions.
"By way of example, the portions of the plaintext information may be wirelessly transmitted by the first cryptographic device, such that the second cryptographic device must be in wireless contact with the first cryptographic device for at least a designated minimum amount of time in order to receive the designated minimum number of portions required to determine the secret value.
"Accordingly, in one or more of the illustrative embodiments, secret shares may be disclosed using controlled release of over a plaintext channel, in a manner that is compatible with AES and other strong, standard ciphers, while also permitting a flexible range of security policies.
"These and other features and advantages of embodiments of the present invention will become more readily apparent from the accompanying drawings and the following detailed description."
URL and more information on this patent, see: Juels, Ari. Secret Sharing in Cryptographic Devices via Controlled Release of Plaintext Information. U.S. Patent Number 8774410, filed
Keywords for this news article include:
Our reports deliver fact-based news of research and discoveries from around the world. Copyright 2014, NewsRx LLC
Most Popular Stories
- Michael Jackson, Freddie Mercury on Previously Unreleased Queen Cut
- 10 Things to Know About Alibaba
- Five Steps to Protect Yourself from Data Breaches
- Concur Sold to SAP for $8.3B
- Chrysler Recalls Nearly 189,000 SUVs
- Intruder Gets into White House
- Federal Probe Finds Christie Did Not Order 'Bridgegate'
- HCL America Adding 1,200 IT Jobs
- Medical Mfg. Jobs Coming to Dayton
- Longtime Unemployed to Get Help in Las Vegas