Processing

Please wait...

Settings

Settings

Goto Application

1. WO2008152302 - OBTAINING DERIVED VALUES DEPENDING ON A SECRET MASTER VALUE

Publication Number WO/2008/152302
Publication Date 18.12.2008
International Application No. PCT/FR2008/050930
International Filing Date 28.05.2008
IPC
H04L 9/26 2006.01
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
9Arrangements for secret or secure communication
18Encryption by serially and continuously modifying data stream elements, e.g. stream cipher systems
20Pseudorandom key sequence combined element-for-element with data sequence
22with particular pseudorandom sequence generator
26producing a nonlinear pseudorandom sequence
CPC
H04L 9/0662
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
9Cryptographic mechanisms or cryptographic; arrangements for secret or secure communication
06the encryption apparatus using shift registers or memories for block-wise ; or stream; coding, e.g. DES systems ; or RC4; Hash functions; Pseudorandom sequence generators
065Encryption by serially and continuously modifying data stream elements, e.g. stream cipher systems, RC4, SEAL or A5/3
0656Pseudorandom key sequence combined element-for-element with data sequence, e.g. one-time-pad [OTP] or Vernam's cipher
0662with particular pseudorandom sequence generator
H04L 9/083
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
9Cryptographic mechanisms or cryptographic; arrangements for secret or secure communication
08Key distribution ; or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
083involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP]
Applicants
  • FRANCE TELECOM [FR]/[FR] (AllExceptUS)
  • PHAN, Duong Hieu [VN]/[FR] (UsOnly)
  • BILLET, Olivier [FR]/[FR] (UsOnly)
Inventors
  • PHAN, Duong Hieu
  • BILLET, Olivier
Agents
  • MUSTAKI, Daniel
Priority Data
075542101.06.2007FR
Publication Language French (FR)
Filing Language French (FR)
Designated States
Title
(EN) OBTAINING DERIVED VALUES DEPENDING ON A SECRET MASTER VALUE
(FR) OBTENTION DE VALEURS DÉRIVÉES DÉPENDANT D'UNE VALEUR MAÎTRESSE SECRÈTE
Abstract
(EN)
The invention relates to a method of obtaining through a first entity a derived value Kr. on the basis of an input parameter r. Said method comprises the following steps: the determination, as a function of said input parameter r, of a list of indices (i1,i2,..., iu), where u ≥ l, in a predetermined list of indices, by means of a predetermined function for selecting indices E(r); and obtaining the said derived value Kr by applying, as a function of said input parameter r, a predetermined combining function Fr. to a set of blocks (Ti1,Ti2,...,Tiu) read from a predetermined table T of blocks Ti, where each of said blocks Ti has been generated by a second entity by means of a pseudo-random construction function GS(i) parameterized by a master value S that is not disclosed to said first entity. Application to encryption and authentication.
(FR)
L'invention concerne un procédé d'obtention par une première entité d'une valeur dérivée Kr. à partir d'un paramètre d'entrée r. Ledit procédé comprend les étapes suivantes : la détermination, en fonction dudit paramètre d'entrée r, d'une liste d'indices ( i1,i2,..., iu ), où u ≥ l, dans une liste prédéterminée d'indices, au moyen d'une fonction de sélection d'indices prédéterminée E(r); et l'obtention de ladite valeur dérivée Kr en appliquant, en fonction dudit paramètre d'entrée r, une fonction de combinaison prédéterminée Fr. à un ensemble de blocs ( Ti1,Ti2,...,Tiu ) lus dans une table prédéterminée T de blocs Ti, où chacun desdits blocs Ti a été engendré par une seconde entité au moyen d'une fonction de construction pseudo-aléatoire GS(i) paramétrée par une valeur maîtresse S non divulguée à ladite première entité. Application au chiffrement et à l'authentification.
Also published as
Latest bibliographic data on file with the International Bureau