|
|
|
|
|
|
|
|
| ( 1 of 1 ) |
| United States Patent | 5,416,842 |
| Aziz | May 16, 1995 |
The present invention includes a first data processing device (node I) coupled to a first private network and to a firewall server (FWA). Firewall server FWA is in turn coupled to a public network, such as the Internet. A second data processing device (node J) is coupled to a second private network which is coupled to the Internet through a firewall server (FWB). Node I provides a data packet including IP data and a destination address for the intended receiving node J to firewall FWA. Firewall FWA is provided with a secret value a, and a public value .varies..sup.a mod p. Similarly, firewall FWB is provided with a secret value b and a public value .varies..sup.b mod p. The firewall FWA obtains a Diffie-Hellman (DH) certificate for firewall FWB and determines the public value .varies..sup.b mod p from the DH certificate. Firewall FWA then computes the value of .varies..sup.ab mod p, and derives a key K.sub.ab from the value .varies..sup.ab mod p. A transient key K.sub.p is randomly generated and is used to encrypt the data packet to be transmitted by firewall FWA to firewall FWB. The encrypted data packet is then encapsulated in a transmission packet by the firewall FWA. The transmission packet includes an unencrypted destination address for the firewall FWB. Firewall FWA then sends the transmission packet to firewall FWB over the Internet. Upon receipt of the transmission packet from firewall FWA, firewall FWB obtains a DH certificate for firewall FWA, and determines the public value of .varies..sup.a mod p from the DH certificate. Firewall FWB computes the value of .varies..sup.ab mod p, and derives the key K.sub.ab. Firewall B utilizes the key K.sub.ab to decrypt the transient key K.sub.p, and using the decrypted transient key K.sub.p, firewall FWB decrypts the encrypted data packet received from FWA, thereby resulting in the recovery of the original data sent by node I in unencrypted form to the firewall FWA. The firewall FWB then transmits the decrypted data packet to the receiving node J over the second private network.
| Inventors: | Aziz; Ashar (Fremont, CA) |
|---|---|
| Assignee: |
Sun Microsystems, Inc.
(Mountain View,
CA)
|
| Family ID: | 22980161 |
| Appl. No.: | 08/258,344 |
| Filed: | June 10, 1994 |
| Current U.S. Class: | 380/30; 380/285; 713/151; 713/156 |
| Current CPC Class: | H04L 29/06 (20130101); H04L 63/0435 (20130101); H04L 63/0442 (20130101); H04L 63/061 (20130101); H04L 63/0823 (20130101); H04L 63/083 (20130101); H04L 9/0844 (20130101) |
| Current International Class: | H04L 12/18 (20060101); H04L 9/08 (20060101); H04L 29/06 (20060101); H04L 009/30 (); H04L 009/08 (); H04L 009/00 () |
| Field of Search: | ;380/4,21,23,25,30,46,49,50 ;371/68.3 |
| 4916704 | April 1990 | Bruckert et al. |
Whitfield Diffie, "The First Ten Years of Public-Key Cryptography", (Proceedings of the IEEE, vol. 76, No. 5, May 1988). . Paul Fahn, "Answers to Frequently Asked Questions About Today's Cryptography", (RSA Laboratories, 1992). . "Part I: Message Encryption and Authentication Procedures", (Privacy Enhancement for Internet Electronic Mail, J. Linn (Network Working Group), Feb., 1993. . "Part II: Certificate-Based Key Management", (Privacy Enhancement for Internet Electronic Mail, S. Kent (Network Working Group), Feb., 1993. . "Part III: Algorithms, Modes, and Identifiers", (Privacy Enhancement for Internet Electronic Mail), D. Balenson (Network Working Group), Feb., 1993. . "Part IV: Key Certification and Related Services" (Privacy Enhancement for Internet Electronic Mail), B. Kaliski (Network Working Group), Feb., 1993. . Whitfield Diffie, Paul C. Van Oorschoot and Michael J. Wiener, "Authentication and Authenticated Key Exchanges" (Designs, Codes and Cryptography, 2-107-125 (1992), Kluwer Academic Publishers). . "The MD5 Message-Digest Algorithm"; MIT Laboratory for Computer Science and RSA Data Security, Inc. (1992), R. Rivest (Network Working Group). . RSA Data Security, Inc. Technology Bulletin, copy undated.. |
|
|