Browse Prior Art Database

KEY POINTER REKEYING

IP.com Disclosure Number: IPCOM000007480D
Original Publication Date: 1995-Jul-01
Included in the Prior Art Database: 2002-Mar-29
Document File: 1 page(s) / 79K

Publishing Venue

Motorola

Related People

Paul Wadzinske: AUTHOR

Abstract

The invention being described is a new method to rekey a radio. This method is different than cur- rent OIAR implementation since the key(s) are never sent over the air. The subscribers will be given a longer "superkey" which will be used to store shorter traffic and key encryption keys. For example, a 128 key superkey will be stored in the subscriber and individual keys will be selected from the superkey to be used by the subscriber. The KMC will send start and end pointers over the air during rekeying, giving the new key location and the key location to be replaced.

This text was extracted from a PDF file.
At least one non-text object (such as an image or picture) has been suppressed.
This is the abbreviated version, containing approximately 50% of the total text.

Page 1 of 1

0 M

MOlVROLA Technical Developments

KEY POINTER REKEYING

by Paul Wadzinske

1 .O THE INVENTION traffic and key encryption keys. For example, a 128 key superkey will be stored in the subscriber and The invention being described is a new method individual keys will be selected from the superkey to rekey a radio. This method is different than cur- to be used by the subscriber. The KMC will send rent OIAR implementation since the key(s) are never start and end pointers over the air during rekeying, sent over the air. The subscribers will be given a giving the new key location and the key location to longer "superkey" which will be used to store shorter be replaced.

"Superkey" I New Keys Common Keys

tt Key Poinlcrs

  The pointer positions sent over the air will also be encrypted by a special key, similar to the KEK of today, However, even ifan adversary is able to deter- mine the pointer positions, they will not be able to know the actual key.

  The same superkey will be stored in all subscrib- ers and will be manually inserted in the subscribers at system install or as new subscribers enter the sys- tem. It is possible that the superkey could be bro- ken up into two sets. As different subscribers are brought in over a short period of time to be manually rekeyed, a small subset of the superkey would be identical in both the old and new superkeys so that while all the subscribers are being rekeyed, encrypted interoperability between subscribers will not be lost.

  Once a key within the superkey is used, it will not be allowed to be reused. Periodic updating of the superkey will be necessary depending on the frequency of key changes.

used often will need to be replaced instead of replacing an entire keyset...