[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Aissi et al., 2004 - Google Patents

Proposal for enhancing Bluetooth security using an improved pairing mechanism

Aissi et al., 2004

View PDF
Document ID
18350770044198767044
Author
Aissi S
Gehrmann C
Nyberg K
Publication year
Publication venue
bluetooth architecture review board at the bluetooth all-hands meeting

External Links

Snippet

Utilizes an initial secret (passkey or PIN) At the pairing occasion, the user is asked to enter a PIN into the devices The PIN is then used to calculate an initialization key Using the initialization key, a common link key is derived This shared link key is used to protect …
Continue reading at 195.238.226.35 (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0838Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
    • H04L9/0841Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols
    • H04L9/0844Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols with user authentication or key authentication, e.g. ElGamal, MTI, MQV-Menezes-Qu-Vanstone protocol or Diffie-Hellman protocols using implicitly-certified keys
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0435Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0852Quantum cryptography
    • H04L9/0858Details about key distillation or coding, e.g. reconciliation, error correction, privacy amplification, polarisation coding or phase coding
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)

Similar Documents

Publication Publication Date Title
US7607012B2 (en) Method for securing a communication
EP2416524B1 (en) System and method for secure transaction of data between wireless communication device and server
Nyang et al. Improvement of Das's two-factor authentication protocol in wireless sensor networks
JP4550736B2 (en) Secure communication
US6611913B1 (en) Escrowed key distribution for over-the-air service provisioning in wireless communication networks
EP0651533B1 (en) Method and apparatus for privacy and authentication in a mobile wireless network
CN101238677B (en) Cryptographic authentication, and/or establishment of shared cryptographic keys, using a signing key encrypted with a non-one-time-pad encryption, including (but not limited to) techniques with improved safety
Mirzadeh et al. Secure device pairing: A survey
US20050044365A1 (en) Method of protecting digest authentication and key agreement (AKA) against man-in-the-middle (MITM) attack
Nyangaresi Terminal independent security token derivation scheme for ultra-dense IoT networks
JP2005515715A (en) Data transmission link
TW201014314A (en) Techniques for secure channelization between UICC and a terminal
CN110020524B (en) Bidirectional authentication method based on smart card
Nyangaresi et al. A formally verified message validation protocol for intelligent IoT E-health systems
Chatterjee An improved authentication protocol for wireless body sensor networks applied in healthcare applications
Madhusudhan A secure and lightweight authentication scheme for roaming service in global mobile networks
Cheikhrouhou et al. A lightweight user authentication scheme for wireless sensor networks
Niu et al. A novel user authentication scheme with anonymity for wireless communications
Di Pietro et al. A two-factor mobile authentication scheme for secure financial transactions
Truong et al. Robust mobile device integration of a fingerprint biometric remote authentication scheme
Nyangaresi et al. Anonymity preserving lightweight authentication protocol for resource-limited wireless sensor networks
CN114978481A (en) Anti-quantum computing communication method and system based on post-quantum cryptography CA
Tseng et al. A robust user authentication scheme with self‐certificates for wireless sensor networks
Aissi et al. Proposal for enhancing Bluetooth security using an improved pairing mechanism
Yazdanpanah et al. A secure and improved authentication scheme for heterogeneous wireless sensor networks in the internet of things environment