摘要 |
PROBLEM TO BE SOLVED: To suggest a method for establishing a safe security key with respect to aggressive intervention of a third party. SOLUTION: A first device which calculates a function value, using a generator selected from elements constituting a finite field and an arbitrary number less than a number of the elements of the finite field, performs a hash operation to the calculated function value and sends a hashed value of the hash operation and the calculated function value to a second device is proposed. In addition, the second device which performs the hash operation to the function value, received from the first device and establishes the security key using the received function value and another arbitrary number selected by itself less than the number of elements constituting the finite field when the hashed value of the hash operation matches the hashed value received from the first device, is proposed. COPYRIGHT: (C)2006,JPO&NCIPI
|