AR047012A1 - Procedimiento criptografico de clave publica para la proteccion de una plaqueta electronica contra el fraude - Google Patents

Procedimiento criptografico de clave publica para la proteccion de una plaqueta electronica contra el fraude

Info

Publication number
AR047012A1
AR047012A1 ARP040100213A ARP040100213A AR047012A1 AR 047012 A1 AR047012 A1 AR 047012A1 AR P040100213 A ARP040100213 A AR P040100213A AR P040100213 A ARP040100213 A AR P040100213A AR 047012 A1 AR047012 A1 AR 047012A1
Authority
AR
Argentina
Prior art keywords
platelet
application
authentication value
key
random
Prior art date
Application number
ARP040100213A
Other languages
English (en)
Original Assignee
France Telecom
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by France Telecom filed Critical France Telecom
Publication of AR047012A1 publication Critical patent/AR047012A1/es

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F7/00Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
    • G07F7/08Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
    • G07F7/10Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data
    • G07F7/1008Active credit-cards provided with means to personalise their use, e.g. with PIN-introduction/comparison system
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/34Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
    • G06Q20/341Active cards, i.e. cards including their own processing means, e.g. including an IC or chip
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/36Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes
    • G06Q20/367Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes involving electronic purses or money safes
    • G06Q20/3674Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes involving electronic purses or money safes involving authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/409Device specific authentication in transaction processing
    • G06Q20/4097Device specific authentication in transaction processing using mutual authentication between devices and transaction partners
    • G06Q20/40975Device specific authentication in transaction processing using mutual authentication between devices and transaction partners using encryption therefor
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/065Encryption by serially and continuously modifying data stream elements, e.g. stream cipher systems, RC4, SEAL or A5/3
    • H04L9/0656Pseudorandom key sequence combined element-for-element with data sequence, e.g. one-time-pad [OTP] or Vernam's cipher
    • H04L9/0662Pseudorandom key sequence combined element-for-element with data sequence, e.g. one-time-pad [OTP] or Vernam's cipher with particular pseudorandom sequence generator
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • H04L9/3066Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/56Financial cryptography, e.g. electronic payment or e-cash

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Signal Processing (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • Finance (AREA)
  • Computing Systems (AREA)
  • Algebra (AREA)
  • Mathematical Analysis (AREA)
  • Mathematical Optimization (AREA)
  • Mathematical Physics (AREA)
  • Pure & Applied Mathematics (AREA)
  • Microelectronics & Electronic Packaging (AREA)
  • Storage Device Security (AREA)

Abstract

La presente se refiere a un procedimiento criptográfico asimétrico contra el fraude de una plaqueta electronica, en transacciones entre una aplicacion y la plaqueta electronica, que consiste en calcular en la plaqueta electronica un valor V de autentificacion a partir de parámetros de entrada. El procedimiento comprende las etapas que consisten en: producir (1) por medio de la plaqueta un numero seudo-aleatorio denominado clave aleatoria r propia de la transaccion por medio de un generador seudo-aleatorio serie incluido en la plaqueta; transmitir (2) de la plaqueta a la aplicacion un parámetro x calculado por la aplicacion previamente a la transaccion, relacionado con la clave aleatoria r a través de una relacion matemática y almacenado en memoria de datos de la plaqueta; calcular (3) por la plaqueta un parámetro y por medio de una funcion serie que tiene como parámetros de entrada al menos la clave aleatoria r propia de la transaccion y una clave s privada que pertenece a un par de claves asimétricas (s, p), constituyendo este parámetro y todo o parte del valor de autentificacion V; transmitir (4) el valor de autentificacion V de la plaqueta a la aplicacion, y verificar (5) por la aplicacion el citado valor de autentificacion V por medio de la funcion de verificacion cuyos parámetros de entrada consisten exclusivamente en parámetros publicos, que contienen al menos la clave p publica.
ARP040100213A 2003-01-24 2004-01-23 Procedimiento criptografico de clave publica para la proteccion de una plaqueta electronica contra el fraude AR047012A1 (es)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
FR0301108A FR2850479B1 (fr) 2003-01-24 2003-01-24 Procede cryptographique a cle publique pour la protection d'une puce contre la fraude

Publications (1)

Publication Number Publication Date
AR047012A1 true AR047012A1 (es) 2006-01-04

Family

ID=32525020

Family Applications (1)

Application Number Title Priority Date Filing Date
ARP040100213A AR047012A1 (es) 2003-01-24 2004-01-23 Procedimiento criptografico de clave publica para la proteccion de una plaqueta electronica contra el fraude

Country Status (11)

Country Link
US (1) US7590846B2 (es)
EP (1) EP1441313B1 (es)
JP (1) JP4659149B2 (es)
KR (1) KR101142656B1 (es)
CN (1) CN100566246C (es)
AR (1) AR047012A1 (es)
AT (1) ATE431603T1 (es)
DE (1) DE602004021047D1 (es)
FR (1) FR2850479B1 (es)
MX (1) MXPA04000700A (es)
TW (1) TWI336864B (es)

Families Citing this family (27)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
BRPI0204744B1 (pt) * 2001-03-29 2017-04-11 Matsushita Electric Ind Co Ltd método de atribuição de chave predeterminada para geração e distribuição chaves de encriptação de dados e chaves de decriptação de dados
JP4612461B2 (ja) * 2004-06-24 2011-01-12 株式会社東芝 マイクロプロセッサ
WO2006076804A1 (en) * 2005-01-21 2006-07-27 Certicom Corp. Elliptic curve random number generation
TW200708027A (en) * 2005-04-29 2007-02-16 Sean O'neil Process of and apparatus for hashing
US7613915B2 (en) 2006-11-09 2009-11-03 BroadOn Communications Corp Method for programming on-chip non-volatile memory in a secure processor, and a device so programmed
US9767319B2 (en) 2007-04-17 2017-09-19 Avago Technologies General Ip (Singapore) Pte. Ltd. Method and apparatus of secure authentication for system on chip (SoC)
EP2251813A1 (en) 2009-05-13 2010-11-17 Nagravision S.A. Method for authenticating access to a secured chip by a test device
DE102009022233A1 (de) * 2009-05-20 2010-11-25 Feustel, Dietmar Verwendung einer Zeichenkette in Sytemen der Kryptographie, der Statistik, der Simulation, der Randomisierung, von Spielautomaten und dgl.
US8923519B2 (en) * 2009-05-29 2014-12-30 Alcatel Lucent Method of efficient secure function evaluation using resettable tamper-resistant hardware tokens
DE102010010950A1 (de) * 2010-03-10 2011-09-15 Giesecke & Devrient Gmbh Verfahren zum Authentisieren eines portablen Datenträgers
EP2720167A1 (en) 2012-10-11 2014-04-16 Nagravision S.A. Method and system for smart card chip personalization
US11625694B2 (en) 2016-02-23 2023-04-11 Nchain Licensing Ag Blockchain-based exchange with tokenisation
MX2018009355A (es) 2016-02-23 2018-12-19 Nchain Holdings Ltd Almacenamiento y transferencia seguros resistentes a perdida de multiples partes de claves criptograficas para sistemas a base de cadena de bloques en conjunto con un sistema de administracion de billetera.
EP4087178A1 (en) 2016-02-23 2022-11-09 nChain Licensing AG A method and system for the secure transfer of entities on a blockchain
EP3420669B1 (en) 2016-02-23 2021-03-24 Nchain Holdings Limited Cryptographic method and system for secure extraction of data from a blockchain
JP6528008B2 (ja) 2016-02-23 2019-06-12 エヌチェーン ホールディングス リミテッドNchain Holdings Limited 秘密共有のための楕円曲線暗号化を利用したパーソナルデバイスセキュリティ
CN109155036B (zh) 2016-02-23 2023-05-23 区块链控股有限公司 用于经由区块链控制资产有关的动作的系统及方法
IL278834B2 (en) 2016-02-23 2023-09-01 Nchain Holdings Ltd Automatic registration and management method for smart contracts based on 'block chain'
US11182782B2 (en) 2016-02-23 2021-11-23 nChain Holdings Limited Tokenisation method and system for implementing exchanges on a blockchain
US11347838B2 (en) 2016-02-23 2022-05-31 Nchain Holdings Ltd. Blockchain implemented counting system and method for use in secure voting and distribution
DK3268914T3 (en) 2016-02-23 2018-10-08 Nchain Holdings Ltd DETERMINING A COMMON SECRET FOR SECURE EXCHANGE OF INFORMATION AND Hierarchical, Deterministic cryptographic keys
EP3420674B1 (en) 2016-02-23 2021-03-24 Nchain Holdings Limited Blockchain-implemented method for control and distribution of digital content
KR20180114942A (ko) 2016-02-23 2018-10-19 엔체인 홀딩스 리미티드 분산형 해시 테이블 및 블록체인을 사용하여 컴퓨터 소프트웨어를 보호하기 위한 방법 및 시스템
AU2017223127B2 (en) 2016-02-23 2023-01-05 nChain Holdings Limited Universal tokenisation system for blockchain-based cryptocurrencies
MX2018010058A (es) 2016-02-23 2019-01-21 Nchain Holdings Ltd Metodo y sistema para la transferencia eficiente de criptomoneda asociada con un pago de nomina en una cadena de bloques que lleva a un metodo y sistema de pago de nomina automatico con base en contratos inteligentes.
CN109361509A (zh) * 2018-10-25 2019-02-19 杭州隐知科技有限公司 一种随机数生成方法、装置和存储介质
CN109471610B (zh) * 2018-10-25 2021-03-19 北京链化未来科技有限公司 一种串行随机数生成方法、装置和存储介质

Family Cites Families (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4926480A (en) * 1983-08-22 1990-05-15 David Chaum Card-computer moderated systems
US4933970A (en) * 1988-01-19 1990-06-12 Yeda Research And Development Company Limited Variants of the fiat-shamir identification and signature scheme
EP0383985A1 (de) * 1989-02-24 1990-08-29 Claus Peter Prof. Dr. Schnorr Verfahren zur Identifikation von Teilnehmern sowie zur Generierung und Verifikation von elektronischen Unterschriften in einem Datenaustauschsystem
JP2993275B2 (ja) * 1992-05-25 1999-12-20 三菱電機株式会社 認証方法
FR2716058B1 (fr) * 1994-02-04 1996-04-12 France Telecom Procédé de signature numérique et d'authentification de messages utilisant un logarithme discret.
FR2717286B1 (fr) * 1994-03-09 1996-04-05 Bull Cp8 Procédé et dispositif pour authentifier un support de données destiné à permettre une transaction ou l'accès à un service ou à un lieu, et support correspondant.
EP0723251A3 (en) * 1995-01-20 1998-12-30 Tandem Computers Incorporated Method and apparatus for user and security device authentication
US6226383B1 (en) 1996-04-17 2001-05-01 Integrity Sciences, Inc. Cryptographic methods for remote authentication
DE19820422A1 (de) * 1998-05-07 1999-11-11 Giesecke & Devrient Gmbh Verfahren zur Authentisierung einer Chipkarte innerhalb eines Nachrichtenübertragungs-Netzwerks
TW536672B (en) 2000-01-12 2003-06-11 Hitachi Ltd IC card and microcomputer
JP3864675B2 (ja) * 2000-03-09 2007-01-10 株式会社日立製作所 共通鍵暗号装置
GB0102516D0 (en) * 2001-01-31 2001-03-21 Hewlett Packard Co Trusted gateway system
FR2826531B1 (fr) * 2001-06-26 2003-10-24 France Telecom Procede cryptographique pour la protection d'une puce electronique contre la fraude
FR2828780B1 (fr) 2001-08-20 2004-01-16 France Telecom Procede de realisation d'une unite cryptographique pour un systeme de cryptographie asymetrique utilisant une fonction logarithme discret
FR2829645A1 (fr) * 2001-09-10 2003-03-14 St Microelectronics Sa Protocole d'authentification a verification d'integrite de memoire
FR2834403B1 (fr) 2001-12-27 2004-02-06 France Telecom Systeme cryptographique de signature de groupe
US7353395B2 (en) * 2002-03-21 2008-04-01 Ntt Docomo Inc. Authenticated ID-based cryptosystem with no key escrow

Also Published As

Publication number Publication date
TWI336864B (en) 2011-02-01
KR20040068472A (ko) 2004-07-31
EP1441313A1 (fr) 2004-07-28
EP1441313B1 (fr) 2009-05-13
JP2004229308A (ja) 2004-08-12
DE602004021047D1 (de) 2009-06-25
CN100566246C (zh) 2009-12-02
JP4659149B2 (ja) 2011-03-30
CN1518270A (zh) 2004-08-04
TW200511136A (en) 2005-03-16
KR101142656B1 (ko) 2012-05-11
US20040193890A1 (en) 2004-09-30
FR2850479B1 (fr) 2005-04-29
MXPA04000700A (es) 2004-08-03
US7590846B2 (en) 2009-09-15
ATE431603T1 (de) 2009-05-15
FR2850479A1 (fr) 2004-07-30

Similar Documents

Publication Publication Date Title
AR047012A1 (es) Procedimiento criptografico de clave publica para la proteccion de una plaqueta electronica contra el fraude
CN102546181B (zh) 基于密钥池的云存储加解密方法
MY146687A (en) Cryptographic key generation
CN111211910B (zh) 基于秘密共享公钥池的抗量子计算ca及证书颁发系统及其颁发和验证方法
WO2009002599A3 (en) Electronically securing an electronic device using physically unclonable functions
EP1751913A1 (en) Computationally asymmetric cryptographic systems
JP2006529064A5 (es)
JP2009171521A (ja) 電子署名方式、電子署名プログラムおよび電子署名装置
DE60308384D1 (de) Vorrichtung zum gesicherten datenaustausch zwischen zwei vorrichtungen
EP3732822B1 (en) Whitebox computation of keyed message authentication codes
JP2007533225A5 (es)
WO2007126049A1 (ja) プログラム難読化システム、プログラム難読化装置及びプログラム難読化方法
DE602007005166D1 (de) Ner ausgangszahl
GB0613868D0 (en) Crytographic system and method for encrypting input data
WO2010024874A3 (en) Message authentication code pre-computation with applications to secure memory
CN101425902A (zh) 一个具有前向安全的门限数字签名方法与系统
RU2014135325A (ru) Криптографический способ аутентификации и идентификации с шифрованием в реальном времени
WO2006067739A3 (en) Method and device for key generation and proving authenticity
ATE472133T1 (de) Entschlüsselungsverfahren
JP2013535903A5 (es)
WO2005038634A3 (en) Maintaining privacy for transactions performable by a user device having a security module
WO2009109715A3 (fr) Procede et dispositifs de contre-mesure pour cryptographie asymetrique a schema de signature
CN101714919B (zh) 基于rsa算法的前向安全数字签名算法
Hartung Attacks on secure logging schemes
ES2231389T3 (es) Procedimiento de mejora de la seguridad de esquemas de cifrado con clave publica.

Legal Events

Date Code Title Description
FG Grant, registration