Browse Prior Art Database

Encrypted Data Transmission with Dynamic Key Renewal

IP.com Disclosure Number: IPCOM000109185D
Original Publication Date: 1992-Aug-01
Included in the Prior Art Database: 2005-Mar-23
Document File: 2 page(s) / 85K

Publishing Venue

IBM

Related People

Merkx, H: AUTHOR

Abstract

Disclosed is a method of encrypting data transmissions between a central site, e.g., a host computer, and a decentral site, e.g., a terminal, by means of an encryption and decryption algorithm involving an encryption/decryption key. The key is dynamically changed, and a new key is exchanged in an encrypted manner using the previously generated key. In the present method, the new keys are generated by the decentral site.

This text was extracted from an ASCII text file.
This is the abbreviated version, containing approximately 52% of the total text.

Encrypted Data Transmission with Dynamic Key Renewal

       Disclosed is a method of encrypting data transmissions
between a central site, e.g., a host computer, and a decentral site,
e.g., a terminal, by means of an encryption and decryption algorithm
involving an encryption/decryption key.  The key is dynamically
changed, and a new key is exchanged in an encrypted manner using the
previously generated key.  In the present method, the new keys are
generated by the decentral site.

      Encryption of data transmissions is a well-known technique in
data communication networks, generally for preventing unauthorized
use of information exchanged between sites connected to the network.
In order to obtain a high degree of secrecy, the
encryption/decryption key has to be changed periodically.

      To this end, a method is proposed comprising the steps of
generating a new key in the decentral site; encrypting the new key in
the decentral site using the previously generated key; storing the
new key in the decentral site in place of the previously generated
key; transmitting the encrypted new key to the central site;
decrypting the encrypted new key received in the central site using
the previously generated key, and storing the decrypted new key in
the central site in place of the previously generated key.

      In order to prevent discovery of the encryption key by
monitoring historical data exchanges, these steps are preferably
repeated for each data transmission.  When a plurality of decentral
sites is connected to a central site, e.g. as a star network, a high
degree of secrecy can be obtained by u...