Method and device for performing a cryptographic operation

Cryptography – Key management – Having particular key generator

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C713S176000, C713S192000, C708S105000, C708S209000, C708S212000, C708S523000, C708S620000

Reexamination Certificate

active

07822199

ABSTRACT:
A method and device for performing a cryptographic operation by a device controlled by a security application executed outside thereof in which a cryptographic value (y) is produced a calculation comprising at least one multiplication between first and second factors containing a security key (s) associated with the device and a challenge number (c) provided by the security application. The first multiplication factor comprises a determined number of bits (L) in a binary representation and the second factor is constrained in such a way that it comprises, in a binary representation, several bits at 1 with a sequence of at least L−1 bits at 0 between each pair of consecutive bits to 1 while the multiplication is carried out by assembling the binary versions of the first factor shifted according to positions of the bits at 1 of the second factor, respectively.

REFERENCES:
patent: 4338675 (1982-07-01), Palmer et al.
patent: 4878027 (1989-10-01), Carp et al.
patent: 4995082 (1991-02-01), Schnorr
patent: 5309382 (1994-05-01), Tamura et al.
patent: 5745398 (1998-04-01), Monier
patent: 6064740 (2000-05-01), Curiger et al.
patent: 6298442 (2001-10-01), Kocher et al.
patent: 6510518 (2003-01-01), Jaffe et al.
patent: 7062043 (2006-06-01), Solinas
patent: 7330549 (2008-02-01), Girault
patent: 2003/0093671 (2003-05-01), Owlett
patent: 2003/0159038 (2003-08-01), Gilbert et al.
patent: 2005/0084098 (2005-04-01), Brickell
patent: 2006/0072743 (2006-04-01), Naslund et al.
patent: 2826531 (2002-12-01), None
patent: WO 0171675 (2001-09-01), None
Poupard and Stern, Security Analysis of a Practical “on the fly” Authentication and Signature Generation, 1998, Springer Verlag, LNCS 1403, pp. 422-436.
Girault et al., “Some Modes of Use of the GPS Identification Scheme”, 2002, Third NESSIE Workshop.
Baudron et al., “GPS, an asymmetric identification scheme for on the fly authentication of low cost smart cards”, Oct. 12, 2001, NESSIE Project 2001.
J. Stern and J. Stern. Cryptanalysis of the OTM signature scheme from FC'02. In Proceedings of the 7th Financial Cryptography Conference, 2003, 11 pages.
I. Vajda and L. Buttyan. Lightweight Authentication Protocols for Low-Cost RFID Tags. In Second Workshop on Security in Ubiquitous Computing, Ubicomp 2003, 10 pages.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Method and device for performing a cryptographic operation does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Method and device for performing a cryptographic operation, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method and device for performing a cryptographic operation will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-4209487

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.