Aissi et al., 2004 - Google Patents
Proposal for enhancing Bluetooth security using an improved pairing mechanismAissi et al., 2004
View PDF- Document ID
- 18350770044198767044
- Author
- Aissi S
- Gehrmann C
- Nyberg K
- Publication year
- Publication venue
- bluetooth architecture review board at the bluetooth all-hands meeting
External Links
Snippet
Utilizes an initial secret (passkey or PIN) At the pairing occasion, the user is asked to enter a PIN into the devices The PIN is then used to calculate an initialization key Using the initialization key, a common link key is derived This shared link key is used to protect …
- 230000002708 enhancing 0 title description 2
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0838—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
- H04L9/0841—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols
- H04L9/0844—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols with user authentication or key authentication, e.g. ElGamal, MTI, MQV-Menezes-Qu-Vanstone protocol or Diffie-Hellman protocols using implicitly-certified keys
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0435—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0852—Quantum cryptography
- H04L9/0858—Details about key distillation or coding, e.g. reconciliation, error correction, privacy amplification, polarisation coding or phase coding
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US7607012B2 (en) | Method for securing a communication | |
EP2416524B1 (en) | System and method for secure transaction of data between wireless communication device and server | |
Nyang et al. | Improvement of Das's two-factor authentication protocol in wireless sensor networks | |
JP4550736B2 (en) | Secure communication | |
US6611913B1 (en) | Escrowed key distribution for over-the-air service provisioning in wireless communication networks | |
EP0651533B1 (en) | Method and apparatus for privacy and authentication in a mobile wireless network | |
CN101238677B (en) | Cryptographic authentication, and/or establishment of shared cryptographic keys, using a signing key encrypted with a non-one-time-pad encryption, including (but not limited to) techniques with improved safety | |
Mirzadeh et al. | Secure device pairing: A survey | |
US20050044365A1 (en) | Method of protecting digest authentication and key agreement (AKA) against man-in-the-middle (MITM) attack | |
Nyangaresi | Terminal independent security token derivation scheme for ultra-dense IoT networks | |
JP2005515715A (en) | Data transmission link | |
TW201014314A (en) | Techniques for secure channelization between UICC and a terminal | |
CN110020524B (en) | Bidirectional authentication method based on smart card | |
Nyangaresi et al. | A formally verified message validation protocol for intelligent IoT E-health systems | |
Chatterjee | An improved authentication protocol for wireless body sensor networks applied in healthcare applications | |
Madhusudhan | A secure and lightweight authentication scheme for roaming service in global mobile networks | |
Cheikhrouhou et al. | A lightweight user authentication scheme for wireless sensor networks | |
Niu et al. | A novel user authentication scheme with anonymity for wireless communications | |
Di Pietro et al. | A two-factor mobile authentication scheme for secure financial transactions | |
Truong et al. | Robust mobile device integration of a fingerprint biometric remote authentication scheme | |
Nyangaresi et al. | Anonymity preserving lightweight authentication protocol for resource-limited wireless sensor networks | |
CN114978481A (en) | Anti-quantum computing communication method and system based on post-quantum cryptography CA | |
Tseng et al. | A robust user authentication scheme with self‐certificates for wireless sensor networks | |
Aissi et al. | Proposal for enhancing Bluetooth security using an improved pairing mechanism | |
Yazdanpanah et al. | A secure and improved authentication scheme for heterogeneous wireless sensor networks in the internet of things environment |