Cryptography – Key management – Having particular key generator
Reexamination Certificate
2005-02-24
2010-10-26
Korzuch, William R (Department: 2431)
Cryptography
Key management
Having particular key generator
C713S176000, C713S192000, C708S105000, C708S209000, C708S212000, C708S523000, C708S620000
Reexamination Certificate
active
07822199
ABSTRACT:
A method and device for performing a cryptographic operation by a device controlled by a security application executed outside thereof in which a cryptographic value (y) is produced a calculation comprising at least one multiplication between first and second factors containing a security key (s) associated with the device and a challenge number (c) provided by the security application. The first multiplication factor comprises a determined number of bits (L) in a binary representation and the second factor is constrained in such a way that it comprises, in a binary representation, several bits at 1 with a sequence of at least L−1 bits at 0 between each pair of consecutive bits to 1 while the multiplication is carried out by assembling the binary versions of the first factor shifted according to positions of the bits at 1 of the second factor, respectively.
REFERENCES:
patent: 4338675 (1982-07-01), Palmer et al.
patent: 4878027 (1989-10-01), Carp et al.
patent: 4995082 (1991-02-01), Schnorr
patent: 5309382 (1994-05-01), Tamura et al.
patent: 5745398 (1998-04-01), Monier
patent: 6064740 (2000-05-01), Curiger et al.
patent: 6298442 (2001-10-01), Kocher et al.
patent: 6510518 (2003-01-01), Jaffe et al.
patent: 7062043 (2006-06-01), Solinas
patent: 7330549 (2008-02-01), Girault
patent: 2003/0093671 (2003-05-01), Owlett
patent: 2003/0159038 (2003-08-01), Gilbert et al.
patent: 2005/0084098 (2005-04-01), Brickell
patent: 2006/0072743 (2006-04-01), Naslund et al.
patent: 2826531 (2002-12-01), None
patent: WO 0171675 (2001-09-01), None
Poupard and Stern, Security Analysis of a Practical “on the fly” Authentication and Signature Generation, 1998, Springer Verlag, LNCS 1403, pp. 422-436.
Girault et al., “Some Modes of Use of the GPS Identification Scheme”, 2002, Third NESSIE Workshop.
Baudron et al., “GPS, an asymmetric identification scheme for on the fly authentication of low cost smart cards”, Oct. 12, 2001, NESSIE Project 2001.
J. Stern and J. Stern. Cryptanalysis of the OTM signature scheme from FC'02. In Proceedings of the 7th Financial Cryptography Conference, 2003, 11 pages.
I. Vajda and L. Buttyan. Lightweight Authentication Protocols for Low-Cost RFID Tags. In Second Workshop on Security in Ubiquitous Computing, Ubicomp 2003, 10 pages.
Girault Marc
Lefranc David
Drinker Biddle & Reath LLP
France Telecom
Korzuch William R
Vaughan Michael R
LandOfFree
Method and device for performing a cryptographic operation does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Method and device for performing a cryptographic operation, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method and device for performing a cryptographic operation will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-4209487