Sign In to Follow Application
View All Documents & Correspondence

Method For Generating Cryptographic Half Keys, And Associated System

Abstract: The present invention relates to a method for generating cryptographic half-keys. The method makes it possible to generate n pairs (Ki1, Ki2), 1

Get Free WhatsApp Updates!
Notices, Deadlines & Correspondence

Patent Information

Application #
Filing Date
23 February 2012
Publication Number
30/2013
Publication Type
INA
Invention Field
COMMUNICATION
Status
Email
Parent Application
Patent Number
Legal Status
Grant Date
2022-04-11
Renewal Date

Applicants

THALES
45, RUE DE VILLIERS, F-92200 NEUILLY SUR SEINE

Inventors

1. ADRIEN DUPREZ
87, RUE POUCHET, F-75017 PARIS
2. PAUL GOMPEL
53 RUE DU GENERAL DESLESTRAIND, F-75016 PARIS
3. PHILIPPE PAINCHAULT
160, BOULEVARD DE VALMY, BP. 82, F-92704 COLOMBES CEDEX

Specification

Method for generating cryptographic half-keys, and associated system The present invention relates to a method for generating cryptographic half-keys and its implementation system. It applies notably to the creation of several keys for access to a secure apparatus. An apparatus designed for handling sensitive information may be made secure by encrypting this information with the aid of a cryptographic key composed of several distinct elements. Such a key is thus conventionally defined by a pair of half-keys stored separately from one another. For example, a first half-key is stored within the secure apparatus while a second half-key is recorded on a medium external to the apparatus. When this external medium is connected to the apparatus, the two half-keys are combined to form the access key for the apparatus and thus allow its use. An example of such a securing method is designated by the acronym CIK for "Crypto Ignition Key". The acronym CIK designates in a general manner the principle of use of a cryptographic key allowing the booting of a cryptographic apparatus. With a view to simplification, a recording medium external to the secure apparatus and able to store a CIK half-key will be designated by the expression "CIK plug". A CIK plug may be allocated to a particular user or to a group of users and thus, in addition to allowing the unlocking of the secure apparatus, make it possible to identify a user, and to identify his role (administrator, maintenance agent, operator, etc.). Conventionally, the complete initialization of a CIK plug necessitates its connection to the apparatus, the creation of a pair of half-keys, one of which is stored solely on the apparatus and the other of which is transmitted and recorded on the CIK plug, and then a configuration phase, for example to configure the access rights in respect of the user for whom the CIK plug is intended. Hence, when several users need to use a secure apparatus, it becomes necessary to initialize several CIK plugs, for example one plug per user, sometimes with different configurations from one CIK plug to another. The initialization of a series of CIK plugs therefore requires the execution of multiple cycles of connection / configuration / disconnection which render the manipulations lengthy and repetitive, and consequently also sources of errors, more particularly when the apparatus has no ergonomic means for transmitting instructions to it, for example no man-machine interface, no screen, no keyboard and no mouse. Moreover, the apparatus may be placed in a cramped space, for example on board a vehicle or an aircraft, thus making it difficult to access the connectors of the apparatus that are designed to receive the plugs, yet further complicating the task of the operator responsible for initialization, and immobilizing the vehicle for a certain period. A first solution for simplifying the initialization of these media consists in installing on the apparatus to be secured a graphical interface and means of interaction with a user such as, for example, a keyboard. However, the apparatuses to be secured do not always lend themselves to the setting up of a graphical interface or to the connecting of user input/output means. For example, an onboard facility for encrypted radio communications is not designed to accommodate such upgrades. Moreover, a keyboard may not be usable within certain contexts of employment (notably with the use of gloves or mittens). Likewise, for example, a back-lit screen cannot be employed at night when it is desired to maintain a certain discreetness of use. A second solution for simplifying the procedure for initializing the CIK plugs is to use a generic key-setup system. However, this type of system is very complex to implement, therefore very expensive. An aim of the invention is to propose an inexpensive scheme making it possible to initialize CIK plugs readily, in particular when the latter are employed on apparatuses having no ergonomic man-machine interface. For this purpose, the subject of the invention is a method for generating n pairs (K'i, K'2), 1

Documents

Application Documents

# Name Date
1 1646-CHENP-2012 PCT OTHERS 23-02-2012.pdf 2012-02-23
2 1646-CHENP-2012 PCT OTHERS 23-02-2012...pdf 2012-02-23
3 1646-CHENP-2012 FORM-5 23-02-2012.pdf 2012-02-23
4 1646-CHENP-2012 FORM-3 23-02-2012.pdf 2012-02-23
5 1646-CHENP-2012 FORM-2 23-02-2012.pdf 2012-02-23
6 1646-CHENP-2012 FORM-1 23-02-2012.pdf 2012-02-23
7 1646-CHENP-2012 ENGLISH TRANSLATION 23-02-2012.pdf 2012-02-23
8 1646-CHENP-2012 DRAWINGS 23-02-2012.pdf 2012-02-23
9 1646-CHENP-2012 DESCRIPTION (COMPLETE) 23-02-2012.pdf 2012-02-23
10 1646-CHENP-2012 CORRESPONDENCE OTHERS 23-02-2012.pdf 2012-02-23
11 1646-CHENP-2012 CLAIMS 23-02-2012.pdf 2012-02-23
12 1646-CHENP-2012 ABSTRACT 23-02-2012.pdf 2012-02-23
13 1646-CHENP-2012 CORRESPONDENCE OTHERS 07-08-2012.pdf 2012-08-07
14 1646-CHENP-2012 POWER OF ATTORNEY 07-08-2012.pdf 2012-08-07
15 1646-CHENP-2012 ENGLISH TRANSLATION 07-08-2012.pdf 2012-08-07
16 1646-CHENP-2012 FORM-3 17-08-2012.pdf 2012-08-17
17 1646-CHENP-2012 CORRESPONDENCE OTHERS 17-08-2012.pdf 2012-08-17
18 abstract1646-CHENP-2012.jpg 2013-04-12
19 1646-CHENP-2012 FORM-18 20-06-2013.pdf 2013-06-20
20 1646-CHENP-2012 CORRESPONDENCE OTHERS 20-06-2013.pdf 2013-06-20
21 1646-CHENP-2012-FORM 3 [12-08-2017(online)].pdf 2017-08-12
22 1646-CHENP-2012-FORM 3 [20-03-2019(online)].pdf 2019-03-20
23 1646-CHENP-2012-FER.pdf 2019-09-05
24 1646-CHENP-2012-FORM 3 [10-01-2020(online)].pdf 2020-01-10
25 1646-CHENP-2012-Retyped Pages under Rule 14(1) [02-03-2020(online)].pdf 2020-03-02
26 1646-CHENP-2012-Proof of Right [02-03-2020(online)].pdf 2020-03-02
27 1646-CHENP-2012-PETITION UNDER RULE 137 [02-03-2020(online)].pdf 2020-03-02
28 1646-chenp-2012-OTHERS [02-03-2020(online)].pdf 2020-03-02
29 1646-chenp-2012-FER_SER_REPLY [02-03-2020(online)].pdf 2020-03-02
30 1646-chenp-2012-DRAWING [02-03-2020(online)].pdf 2020-03-02
31 1646-chenp-2012-COMPLETE SPECIFICATION [02-03-2020(online)].pdf 2020-03-02
32 1646-CHENP-2012-2. Marked Copy under Rule 14(2) [02-03-2020(online)].pdf 2020-03-02
33 1646-CHENP-2012-Form1_Proof of Right_20-03-2020.pdf 2020-03-20
34 1646-CHENP-2012-Correspondence-20-03-2020.pdf 2020-03-20
35 1646-CHENP-2012-FORM 3 [08-10-2020(online)].pdf 2020-10-08
36 1646-CHENP-2012-PatentCertificate11-04-2022.pdf 2022-04-11
37 1646-CHENP-2012-IntimationOfGrant11-04-2022.pdf 2022-04-11

Search Strategy

1 1646searchstrategy_22-08-2019.pdf

ERegister / Renewals

3rd: 25 May 2022

From 04/08/2012 - To 04/08/2013

4th: 25 May 2022

From 04/08/2013 - To 04/08/2014

5th: 25 May 2022

From 04/08/2014 - To 04/08/2015

6th: 25 May 2022

From 04/08/2015 - To 04/08/2016

7th: 25 May 2022

From 04/08/2016 - To 04/08/2017

8th: 25 May 2022

From 04/08/2017 - To 04/08/2018

9th: 25 May 2022

From 04/08/2018 - To 04/08/2019

10th: 25 May 2022

From 04/08/2019 - To 04/08/2020

11th: 25 May 2022

From 04/08/2020 - To 04/08/2021

12th: 25 May 2022

From 04/08/2021 - To 04/08/2022

13th: 25 May 2022

From 04/08/2022 - To 04/08/2023

14th: 24 Jul 2023

From 04/08/2023 - To 04/08/2024

15th: 23 Jul 2024

From 04/08/2024 - To 04/08/2025

16th: 17 Jul 2025

From 04/08/2025 - To 04/08/2026