Method of transferring a secret, by the exchange of two certific

Cryptography – Particular algorithmic function encoding – Nbs/des algorithm

Patent

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

380 25, H04K 100

Patent

active

052186377

ABSTRACT:
According to the invention, the chip card issues a first certificate comprising its letter of credentials (Crc), an exponential (X), an optional message (M), these quantities being signed. The security module verifies the signature and in return issues a second certificate containing its letter of credentials (Crm), an exponential (Y), an optional message (M'), a cryptogram (C), these quantities being signed. A common secret key is constituted between the card and the security module by the exponentials and allows the card to interpret the cryptogram addressed to it and to act in accordance therewith.

REFERENCES:
patent: 4405829 (1983-09-01), Rivest et al.
patent: 4947428 (1990-08-01), Guillou et al.
patent: 5140634 (1992-08-01), Guillou et al.
"The Knowledge Complexity of Interactive Proof-Systems", by Shafi Goldwasser, Silvio Micali and Charles Rackoff, 17th STOC, ACM Symposium on Theory of Computing, pp. 291-304.
"A Practical Zero-Knowledge Protocol Fitted to Security Microprocessor Minimizing Both Transmission and Memory" by Guillou et al, Proceedings of Eurocrypt 1988, Lecture Notes in Computer Sciences, pp. 123-128.
"New Directions in Crytography", IEEE Transactions on Information Theory, Nov. 1976, vol. IT-22, pp. 644-654.
ISO/CEI 9796, "Information Technology--Security Techniques--Digital Signature Scheme Giving Message Recovery", Mar. 15, 1990, pp. 1-8.
ISO/CEI 7816-2, "Identification Cards--Integrated Circuit(s) Cards With Contacts, Part 2-Dimensions and location of the contacts", May 15, 1988, pp. 1-7.
ISO/CEI 7816-3, "Identification Cards--Integrated Circuit(s) Cards With Contacts, Part 3-Electronic signals & transmission protocols", Sep. 15, 1989, pp. 1-14.
"Des procedes d'authentification bases sur une publication de problemes complexes et personnalises dont les solutions maintenues secretes constituent autant d'accreditations", by Guillou et al, Proceedings de Securicom 1989, Paris, Mar. 1989, pp. 149-158.
"A `Paradoxical ` Identity-Based Signature Scheme Resulting from Zero-Knowledge", Guillou et al, Proceedings of Crypto 1988 Lecture Notes in Computer Sciences, vol. 403, pp. 216-231.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Method of transferring a secret, by the exchange of two certific does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Method of transferring a secret, by the exchange of two certific, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method of transferring a secret, by the exchange of two certific will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-1947832

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.