KR20090012248A - 암호 키의 조작방지 생성 방법 및 시스템 - Google Patents
암호 키의 조작방지 생성 방법 및 시스템 Download PDFInfo
- Publication number
- KR20090012248A KR20090012248A KR1020087028789A KR20087028789A KR20090012248A KR 20090012248 A KR20090012248 A KR 20090012248A KR 1020087028789 A KR1020087028789 A KR 1020087028789A KR 20087028789 A KR20087028789 A KR 20087028789A KR 20090012248 A KR20090012248 A KR 20090012248A
- Authority
- KR
- South Korea
- Prior art keywords
- node
- air interface
- nodes
- generation
- key
- Prior art date
Links
- 238000000034 method Methods 0.000 title claims description 52
- 238000004891 communication Methods 0.000 claims abstract description 101
- 238000012544 monitoring process Methods 0.000 claims description 49
- 230000006870 function Effects 0.000 description 14
- 238000010586 diagram Methods 0.000 description 10
- 230000015556 catabolic process Effects 0.000 description 3
- 238000006731 degradation reaction Methods 0.000 description 3
- 238000004519 manufacturing process Methods 0.000 description 3
- 238000012795 verification Methods 0.000 description 3
- 239000000872 buffer Substances 0.000 description 2
- 230000005540 biological transmission Effects 0.000 description 1
- 238000004364 calculation method Methods 0.000 description 1
- 238000012790 confirmation Methods 0.000 description 1
- 238000010276 construction Methods 0.000 description 1
- 230000007547 defect Effects 0.000 description 1
- 230000001934 delay Effects 0.000 description 1
- 238000001514 detection method Methods 0.000 description 1
- 230000007274 generation of a signal involved in cell-cell signaling Effects 0.000 description 1
- 238000007689 inspection Methods 0.000 description 1
- 230000003993 interaction Effects 0.000 description 1
- 238000003032 molecular docking Methods 0.000 description 1
- 230000008447 perception Effects 0.000 description 1
- 238000000060 site-specific infrared dichroism spectroscopy Methods 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
- H04L63/061—Network architectures or network communication protocols for network security for supporting key management in a packet data network for key exchange, e.g. in peer-to-peer networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/04—Key management, e.g. using generic bootstrapping architecture [GBA]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0838—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
- H04L9/0841—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/04—Key management, e.g. using generic bootstrapping architecture [GBA]
- H04W12/041—Key generation or derivation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/04—Key management, e.g. using generic bootstrapping architecture [GBA]
- H04W12/047—Key management, e.g. using generic bootstrapping architecture [GBA] without using a trusted network node as an anchor
- H04W12/0471—Key exchange
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/80—Wireless
- H04L2209/805—Lightweight hardware, e.g. radio-frequency identification [RFID] or sensor
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computing Systems (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Mobile Radio Communication Systems (AREA)
- Small-Scale Networks (AREA)
Abstract
Description
Claims (13)
- 무선 인터페이스(3)를 통한 두 노드들(2-1, 2-2) 사이의 공통 암호 키의 조작-방지 생성 방법으로서,상기 두 노드들(2-1, 2-2) 중 적어도 하나는 공통 암호 키(S)의 생성 동안에, 제3 노드(9)가 생성 기간 내에서 상기 두 노드들(2-1, 2-2) 중 하나와 상기 무선 인터페이스(3)를 통해 통신하고 있는지의 여부를 모니터링하는,조작-방지 생성 방법.
- 제 1 항에 있어서,모니터링 노드(2-2)는, 제3 노드(9)가 상기 두 노드들(2-1, 2-2) 중 하나와 상기 무선 인터페이스(3)를 통해 통신하고 있는 것을 상기 모니터링 노드(2-2)가 검출하는 경우, 다른 노드(2-1)와의 공통 암호 키(S) 생성을 중단하는,조작-방지 생성 방법.
- 제 1 항에 있어서,모니터링 노드(2-2)는, 제3 노드(9)가 상기 무선 인터페이스(3)를 통해 상기 두 노드들(2-1, 2-2) 중 하나와 통신하고 있을 경우, 다른 노드(2-1)와의 공통 암호 키 생성을 중단하지 않고 상기 생성된 암호 키(S)를 비안전 암호 키로서 저장하는,조작-방지 생성 방법.
- 제 2 항 또는 제 3 항에 있어서,상기 모니터링 노드(2-2)는, 제3 노드(9)가 무선 인터페이스(3)를 통해 두 노드들 중 하나(2-2)와 생성 기간 내에서 통신하는 경우, 에러 경고 메시지를 추가로 송신하는,조작-방지 생성 방법.
- 제 1 항에 있어서,모니터링 노드(2-2)는 상기 무선 인터페이스(3)의 하나 이상의 무선 채널들을 모니터링하는,조작-방지 생성 방법.
- 제 1 항에 있어서,상기 두 노드들(2-1, 2-2)은 키 협상 프로토콜에 따라 미리 정의된 키 협상 메시지들을 상기 무선 인터페이스(3)의 적어도 하나의 무선 채널을 통해 교환함으로써 공통 암호 키를 생성하는,조작-방지 생성 방법.
- 제 6 항에 있어서,모니터링 노드(2-2)는 키 협상 메시지들이 제3 노드(9)에 의하여 상기 두 노드들(2-1, 2-2) 중 하나에 무선 인터페이스(3)를 통해 송신되고 있는지의 여부를 모니터링하는,조작-방지 생성 방법.
- 제 1 항에 있어서,모니터링 노드(2-2)는 에러 경고 메시지가 다른 노드(9)로부터 송신되고 있는지의 여부를 모니터링하는,조작-방지 생성 방법.
- 제 1 항에 있어서,모니터링 노드(2-2)는 무선 채널 품질이 암호 키 생성 동안에 저하되는지의 여부를 생성 기간 내에서 모니터링하는,조작-방지 생성 방법.
- 제 1 항에 있어서,모니터링 노드(2-2)는 제3 노드(9)가 상기 두 노드들(2-1, 2-2) 중 하나와 무선 인터페이스(3)를 통해 생성 기간 전후의 가드 타임들 동안에 통신하고 있는지의 여부를 추가로 모니터링하는,조작-방지 생성 방법.
- 제 1 항에 있어서,상기 노드들(2-1, 2-2)은 근거리 통신 장치들(2)로서 구현되는,조작-방지 생성 방법.
- 무선 인터페이스(3)를 통해 서로 통신하는 다수의 근거리 통신 장치들(2)을 갖는 근거리 통신 시스템(1)으로서,공통 암호 키(S)가 상기 근거리 통신 시스템(1)의 두 개의 근거리 통신 장치들(2-1, 2-2) 사이에서 생성될 때, 상기 두 개의 근거리 통신 장치들(2-1, 2-2) 중 적어도 하나는, 추가의 근거리 통신 장치(9)가 상기 두 개의 근거리 통신 장치들(2-1, 2-2) 중 하나와 암호 키(S) 생성 동안에 무선 인터페이스(3)를 통해 통신하고 있는지의 여부를 생성 기간 내에서 상기 무선 인터페이스(3)를 통해 모니터링하는,근거리 통신 시스템.
- 근거리 통신 장치(2)로서,무선 인터페이스(3)를 통해 다른 근거리 통신 장치(2)와의 공통 암호 키(S) 생성시, 상기 공통 암호 키(S) 생성 동안에 제3 근거리 통신 장치(9)가 두 개의 근거리 통신 장치들(2-1, 2-2) 중 하나와 상기 무선 인터페이스(3)를 통해 통신하고 있는지에 관한 조작을 검출하기 위하여 상기 무선 인터페이스(3)를 모니터링하는,근거리 통신 장치.
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
DE102006019466.7 | 2006-04-26 | ||
DE102006019466A DE102006019466B4 (de) | 2006-04-26 | 2006-04-26 | Verfahren und System zum manipulationssicheren Einrichten eines kryptographischen Schlüssels |
PCT/EP2007/051191 WO2007124965A1 (de) | 2006-04-26 | 2007-02-08 | Verfahren und system zum manipulationssicheren einrichten eines kryptographischen schlüssels |
Publications (2)
Publication Number | Publication Date |
---|---|
KR20090012248A true KR20090012248A (ko) | 2009-02-02 |
KR101476995B1 KR101476995B1 (ko) | 2015-01-06 |
Family
ID=38174801
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
KR1020087028789A KR101476995B1 (ko) | 2006-04-26 | 2007-02-08 | 암호 키의 조작방지 생성 방법 및 시스템 |
Country Status (10)
Country | Link |
---|---|
US (1) | US9614820B2 (ko) |
EP (1) | EP2011302B1 (ko) |
JP (1) | JP5595036B2 (ko) |
KR (1) | KR101476995B1 (ko) |
CN (2) | CN105120459A (ko) |
AT (1) | ATE556549T1 (ko) |
DE (1) | DE102006019466B4 (ko) |
ES (1) | ES2386040T3 (ko) |
RU (1) | RU2445746C2 (ko) |
WO (1) | WO2007124965A1 (ko) |
Families Citing this family (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
DE102006019466B4 (de) | 2006-04-26 | 2009-07-30 | Siemens Ag | Verfahren und System zum manipulationssicheren Einrichten eines kryptographischen Schlüssels |
JP5039146B2 (ja) * | 2007-11-07 | 2012-10-03 | 日本電信電話株式会社 | 共通鍵設定方法、中継装置、及びプログラム |
DE102008008237B4 (de) | 2008-02-08 | 2021-06-02 | Volkswagen Ag | Verfahren und System zur Erfassung der Drehbewegung eines Fahrzeugrades |
US8068011B1 (en) | 2010-08-27 | 2011-11-29 | Q Street, LLC | System and method for interactive user-directed interfacing between handheld devices and RFID media |
US9088552B2 (en) * | 2011-11-30 | 2015-07-21 | Motorola Solutions, Inc. | Method and apparatus for key distribution using near-field communication |
KR101785964B1 (ko) * | 2011-12-16 | 2017-10-18 | 삼성전자주식회사 | 근접장을 이용하여 풀 듀플렉스 통신 방식에 따라 통신하는 제1 노드 및 제2 노드의 통신 보안 방법 및 장치 |
DE102014212488B4 (de) * | 2014-06-27 | 2016-02-18 | Siemens Aktiengesellschaft | Gesichertes Bereitstellen eines Replika-Pseudo-Zufallsrauschcodes an eine Empfängereinheit |
CN104780537A (zh) * | 2015-04-09 | 2015-07-15 | 天津大学 | 一种无线局域网wlan身份验证方法 |
Family Cites Families (22)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5450493A (en) * | 1993-12-29 | 1995-09-12 | At&T Corp. | Secure communication method and apparatus |
US5604806A (en) * | 1995-01-20 | 1997-02-18 | Ericsson Inc. | Apparatus and method for secure radio communication |
US6705323B1 (en) * | 1995-06-07 | 2004-03-16 | Conceptus, Inc. | Contraceptive transcervical fallopian tube occlusion devices and methods |
US7047404B1 (en) * | 2000-05-16 | 2006-05-16 | Surety Llc | Method and apparatus for self-authenticating digital records |
US7516325B2 (en) * | 2001-04-06 | 2009-04-07 | Certicom Corp. | Device authentication in a PKI |
JP2003229847A (ja) | 2001-11-28 | 2003-08-15 | Yun-Factory:Kk | 鍵交換装置、方法、プログラムおよび該プログラムを記録した記録媒体 |
RU2230438C2 (ru) * | 2001-12-27 | 2004-06-10 | Воронежский государственный технический университет | Способ формирования ключа шифрования-дешифрования |
US7376624B2 (en) * | 2002-02-27 | 2008-05-20 | Imagineer Software, Inc. | Secure communication and real-time watermarking using mutating identifiers |
US20030232598A1 (en) * | 2002-06-13 | 2003-12-18 | Daniel Aljadeff | Method and apparatus for intrusion management in a wireless network using physical location determination |
US6986161B2 (en) * | 2002-08-12 | 2006-01-10 | Harris Corporation | Mobile ad-hoc network with intrusion detection features and related methods |
US7398550B2 (en) | 2003-06-18 | 2008-07-08 | Microsoft Corporation | Enhanced shared secret provisioning protocol |
DE10358987A1 (de) * | 2003-11-11 | 2005-06-16 | Siemens Ag | Verfahren zur Sicherung des Datenverkehrs zwischen einem ersten Endgerät und einem ersten Netz sowie einem zweiten Endgerät und einem zweiten Netz |
WO2005046157A2 (de) * | 2003-11-11 | 2005-05-19 | Siemens Aktiengesellschaft | Verfahren zur sicherung des datenverkehrs zwischen einem ersten endgerät und einem ersten netz sowie einem zweiten endgerät und einem zweiten netz |
US7002943B2 (en) | 2003-12-08 | 2006-02-21 | Airtight Networks, Inc. | Method and system for monitoring a selected region of an airspace associated with local area networks of computing devices |
CA2564909C (en) | 2004-04-30 | 2011-06-28 | Research In Motion Limited | Systems and methods to securely generate shared keys |
ATE415772T1 (de) * | 2004-06-29 | 2008-12-15 | Koninkl Philips Electronics Nv | System und verfahren zur effizienten authentifikation von knoten eines medizinischen drahtlosen ad-hoc-netzwerks |
JP2006025374A (ja) * | 2004-07-09 | 2006-01-26 | Fujitsu Ltd | ワイヤレス通信不正使用検証システム |
US7644276B2 (en) * | 2004-08-03 | 2010-01-05 | Hewlett-Packard Development Company, L.P. | Method for verifying a secure association between devices |
US7375616B2 (en) | 2004-09-08 | 2008-05-20 | Nokia Corporation | Electronic near field communication enabled multifunctional device and method of its operation |
JP2006108977A (ja) * | 2004-10-04 | 2006-04-20 | Matsushita Electric Ind Co Ltd | ワイヤレス監視システム |
US8082443B2 (en) * | 2006-01-09 | 2011-12-20 | Bbnt Solutions Llc. | Pedigrees for quantum cryptography |
DE102006019466B4 (de) | 2006-04-26 | 2009-07-30 | Siemens Ag | Verfahren und System zum manipulationssicheren Einrichten eines kryptographischen Schlüssels |
-
2006
- 2006-04-26 DE DE102006019466A patent/DE102006019466B4/de active Active
-
2007
- 2007-02-08 KR KR1020087028789A patent/KR101476995B1/ko active IP Right Grant
- 2007-02-08 WO PCT/EP2007/051191 patent/WO2007124965A1/de active Application Filing
- 2007-02-08 US US12/298,694 patent/US9614820B2/en active Active
- 2007-02-08 EP EP07704444A patent/EP2011302B1/de active Active
- 2007-02-08 JP JP2009507005A patent/JP5595036B2/ja not_active Expired - Fee Related
- 2007-02-08 CN CN201510602197.0A patent/CN105120459A/zh active Pending
- 2007-02-08 ES ES07704444T patent/ES2386040T3/es active Active
- 2007-02-08 CN CNA2007800146904A patent/CN101427545A/zh active Pending
- 2007-02-08 AT AT07704444T patent/ATE556549T1/de active
- 2007-02-08 RU RU2008146501/08A patent/RU2445746C2/ru not_active IP Right Cessation
Also Published As
Publication number | Publication date |
---|---|
KR101476995B1 (ko) | 2015-01-06 |
DE102006019466B4 (de) | 2009-07-30 |
CN101427545A (zh) | 2009-05-06 |
JP5595036B2 (ja) | 2014-09-24 |
RU2445746C2 (ru) | 2012-03-20 |
ES2386040T3 (es) | 2012-08-07 |
ATE556549T1 (de) | 2012-05-15 |
RU2008146501A (ru) | 2010-06-10 |
DE102006019466A1 (de) | 2007-10-31 |
JP2009534964A (ja) | 2009-09-24 |
EP2011302B1 (de) | 2012-05-02 |
CN105120459A (zh) | 2015-12-02 |
WO2007124965A1 (de) | 2007-11-08 |
US20090103733A1 (en) | 2009-04-23 |
US9614820B2 (en) | 2017-04-04 |
EP2011302A1 (de) | 2009-01-07 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9692595B2 (en) | Quantum key distribution | |
CN102571748B (zh) | 物理不可复制功能的注册 | |
US9107069B2 (en) | Addressable radio device | |
KR101476995B1 (ko) | 암호 키의 조작방지 생성 방법 및 시스템 | |
JP5877623B2 (ja) | 送信端末、受信端末および情報配信システム | |
CN111914291A (zh) | 消息处理方法、装置、设备及存储介质 | |
US20220417015A1 (en) | Key update method and related apparatus | |
Singh et al. | On the IEEE 802.11 i security: a denial‐of‐service perspective | |
Tahir et al. | Lightweight and secure multi-factor authentication scheme in VANETs | |
US7698556B2 (en) | Secure spontaneous associations between networkable devices | |
CN111726346A (zh) | 数据安全传输方法、装置及系统 | |
KR102008670B1 (ko) | 멀티캐스트 그룹을 모니터링하는 장치 | |
JP2023535474A (ja) | アソシエーション制御方法及び関連装置 | |
KR101517909B1 (ko) | 유헬스케어 무선 센서 네트워크를 위한 상호 인증 방법 | |
CN110808827A (zh) | 基于量子加密的空中发证方法及系统 | |
KR20090124741A (ko) | 무선 네트워크 환경에서의 리플레이어택 방지 방법 | |
CN117240486A (zh) | 一种认证方法和通信装置 | |
CN117858079B (zh) | 一种楼宇对讲系统的安全控制方法 | |
JP7433620B1 (ja) | 通信方法、通信装置及びコンピュータプログラム | |
de Vito et al. | A Novel Secure Communication Scheme for Bluetooth Low Energy Devices | |
Tsai¹ et al. | LoRaWAN Network Server Session Keys | |
CN115766055A (zh) | 一种用于通信报文验证的方法和装置 | |
CN118984224A (zh) | 一种端到端加密数据传输与隐私安全保护方法 | |
KR101628467B1 (ko) | 일방향 데이터 전송 장치 및 그 방법 | |
CN117896061A (zh) | 物联网设备加密通信方法 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PA0105 | International application |
Patent event date: 20081125 Patent event code: PA01051R01D Comment text: International Patent Application |
|
PG1501 | Laying open of application | ||
A201 | Request for examination | ||
PA0201 | Request for examination |
Patent event code: PA02012R01D Patent event date: 20120208 Comment text: Request for Examination of Application |
|
E902 | Notification of reason for refusal | ||
PE0902 | Notice of grounds for rejection |
Comment text: Notification of reason for refusal Patent event date: 20130430 Patent event code: PE09021S01D |
|
E902 | Notification of reason for refusal | ||
PE0902 | Notice of grounds for rejection |
Comment text: Notification of reason for refusal Patent event date: 20140307 Patent event code: PE09021S01D |
|
E701 | Decision to grant or registration of patent right | ||
PE0701 | Decision of registration |
Patent event code: PE07011S01D Comment text: Decision to Grant Registration Patent event date: 20140925 |
|
GRNT | Written decision to grant | ||
PR0701 | Registration of establishment |
Comment text: Registration of Establishment Patent event date: 20141222 Patent event code: PR07011E01D |
|
PR1002 | Payment of registration fee |
Payment date: 20141223 End annual number: 3 Start annual number: 1 |
|
PG1601 | Publication of registration | ||
FPAY | Annual fee payment |
Payment date: 20181109 Year of fee payment: 5 |
|
PR1001 | Payment of annual fee |
Payment date: 20181109 Start annual number: 5 End annual number: 5 |
|
PC1903 | Unpaid annual fee |
Termination category: Default of registration fee Termination date: 20201002 |