Secure seed generation protocol

作者: William M. Duane , Magnus Nyström , Peter Röstin

DOI:

关键词: Computer scienceComputer networkProtocol (object-oriented programming)String (computer science)CryptographyEncryptionKey (cryptography)Computer security

摘要: Techniques for secure generation of a seed use in performing one or more cryptographic operations, utilizing protocol carried out by client (110c) and server (110s). The (110s) provides first string to the (110c). generates second string, encrypts key (216), sends encrypted as function at leas string. decrypts (222) independently least an

参考文章(17)
Victor Boyko, Philip MacKenzie, Sarvar Patel, Provably secure password-authenticated key exchange using Diffie-Hellman theory and application of cryptographic techniques. pp. 156- 171 ,(2000) , 10.1007/3-540-45539-6_12
Antti Huima, An authentication method ,(2000)
Alfred J Menezes, Paul C van Oorschot, Scott A Vanstone, Handbook of Applied Cryptography ,(1996)
Martin E. Hellman, Bailey W. Diffie, Ralph C. Merkle, Cryptographic apparatus and method ,(1977)
Michael David Day, Network discovery system and method ,(1997)