AU2001290036A1 - Encryption and identification method - Google Patents
Encryption and identification methodInfo
- Publication number
- AU2001290036A1 AU2001290036A1 AU2001290036A AU9003601A AU2001290036A1 AU 2001290036 A1 AU2001290036 A1 AU 2001290036A1 AU 2001290036 A AU2001290036 A AU 2001290036A AU 9003601 A AU9003601 A AU 9003601A AU 2001290036 A1 AU2001290036 A1 AU 2001290036A1
- Authority
- AU
- Australia
- Prior art keywords
- calculates
- secret
- message
- medium
- sends
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F7/00—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
- G07F7/08—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
- G07F7/10—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data
- G07F7/1008—Active credit-cards provided with means to personalise their use, e.g. with PIN-introduction/comparison system
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/34—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
- G06Q20/341—Active cards, i.e. cards including their own processing means, e.g. including an IC or chip
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F7/00—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
- G07F7/08—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
- G07F7/0873—Details of the card reader
- G07F7/088—Details of the card reader the card reader being part of the point of sale [POS] terminal or electronic cash register [ECR] itself
- G07F7/0886—Details of the card reader the card reader being part of the point of sale [POS] terminal or electronic cash register [ECR] itself the card reader being portable for interacting with a POS or ECR in realizing a payment transaction
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
Landscapes
- Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computer Networks & Wireless Communication (AREA)
- Business, Economics & Management (AREA)
- Accounting & Taxation (AREA)
- Strategic Management (AREA)
- General Business, Economics & Management (AREA)
- Microelectronics & Electronic Packaging (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Signal Processing (AREA)
- Storage Device Security (AREA)
- Control Of Vending Devices And Auxiliary Devices For Vending Devices (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
- Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)
- Reverberation, Karaoke And Other Acoustics (AREA)
- Collating Specific Patterns (AREA)
- Signal Processing For Digital Recording And Reproducing (AREA)
Abstract
The invention concerns a cryptographic method for transferring messages in encrypted form between two media A and B sharing a secret number E and hardly reversible functions fI(fJ (x)) = fJ(fI(x)). The method operates without public key and without shared private key through a dialogue consisting of several message exchanges. If the medium A wishes to exchange confidentially the message M1 with the medium B, the medium A randomly draws a number A1 and sends to B the number fE(fA1(M1)) = M2. B randomly draws B1 and calculates fB1(M2) = M3 which it sends to A. A calculates the reciprocal A1prime(=g(A1)) of A1 such that, A sends back to B fA1prime (M3) = M4. B calculates the reciprocal of B1prime=g(B1*E) of B1*E then calculates fBprime(M4)=(M5). Since M5=M1, the message has been exchanged confidentially. In another embodiment, A and B share a secret S, the message M1 comprises the secret S and B authenticates A by verifying whether M5 actually consists of the secret S. The invention is applicable in the case of a microprocessor card, a micro-computer and an electronic wallet.
Applications Claiming Priority (5)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
FR0012122A FR2814575A1 (en) | 2000-09-22 | 2000-09-22 | Encryption/identification message transfer process having two systems with public/secret whole numbers exchanging data using random drawn numbers/mathematical functions and reciprocal mathematics procedures. |
FR0012122 | 2000-09-22 | ||
FR0102953 | 2001-03-05 | ||
FR0102953A FR2814618B1 (en) | 2000-09-22 | 2001-03-05 | CRYPTOGRAPHIC METHOD FOR ENCRYPTING MESSAGES AND IDENTIFYING HOMOLOGATED MEDIA |
PCT/FR2001/002882 WO2002025863A1 (en) | 2000-09-22 | 2001-09-17 | Encryption and identification method |
Publications (1)
Publication Number | Publication Date |
---|---|
AU2001290036A1 true AU2001290036A1 (en) | 2002-04-02 |
Family
ID=26212623
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
AU2001290036A Abandoned AU2001290036A1 (en) | 2000-09-22 | 2001-09-17 | Encryption and identification method |
Country Status (6)
Country | Link |
---|---|
EP (1) | EP1344343B1 (en) |
AT (1) | ATE454763T1 (en) |
AU (1) | AU2001290036A1 (en) |
DE (1) | DE60141042D1 (en) |
FR (1) | FR2814618B1 (en) |
WO (1) | WO2002025863A1 (en) |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
FR2530053B1 (en) * | 1982-07-08 | 1986-04-25 | Bull Sa | METHOD FOR CERTIFYING THE SOURCE OF AT LEAST ONE INFORMATION RECORDED IN A MEMORY OF A FIRST ELECTRONIC DEVICE AND TRANSMITTED TO A SECOND ELECTRONIC DEVICE, AND SYSTEM FOR IMPLEMENTING SUCH A METHOD |
US5953422A (en) * | 1996-12-31 | 1999-09-14 | Compaq Computer Corporation | Secure two-piece user authentication in a computer network |
-
2001
- 2001-03-05 FR FR0102953A patent/FR2814618B1/en not_active Expired - Fee Related
- 2001-09-17 WO PCT/FR2001/002882 patent/WO2002025863A1/en active Application Filing
- 2001-09-17 AU AU2001290036A patent/AU2001290036A1/en not_active Abandoned
- 2001-09-17 AT AT01969907T patent/ATE454763T1/en not_active IP Right Cessation
- 2001-09-17 DE DE60141042T patent/DE60141042D1/en not_active Expired - Lifetime
- 2001-09-17 EP EP01969907A patent/EP1344343B1/en not_active Expired - Lifetime
Also Published As
Publication number | Publication date |
---|---|
DE60141042D1 (en) | 2010-02-25 |
FR2814618B1 (en) | 2003-02-14 |
EP1344343B1 (en) | 2010-01-06 |
ATE454763T1 (en) | 2010-01-15 |
FR2814618A1 (en) | 2002-03-29 |
WO2002025863A1 (en) | 2002-03-28 |
EP1344343A1 (en) | 2003-09-17 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Magkos et al. | Receipt-freeness in large-scale elections without untappable channels | |
US7499551B1 (en) | Public key infrastructure utilizing master key encryption | |
CN1689297B (en) | Method of preventing unauthorized distribution and use of electronic keys using a key seed | |
US5664017A (en) | Internationally regulated system for one to one cryptographic communications with national sovereignty without key escrow | |
US5956404A (en) | Digital signature with auditing bits | |
EP1751913B1 (en) | Signature generation and verification method using time lock puzzle | |
WO2006049832A3 (en) | Security device for cryptographic communications | |
CN101032117B (en) | Method of authentication based on polynomials, system, and method for demonstration device | |
CN100488096C (en) | System for achieving anonymous communication of messages using secret key crytptography | |
US10089627B2 (en) | Cryptographic authentication and identification method using real-time encryption | |
WO2003003171A3 (en) | A method and system for generating and verifying a key protection certificate. | |
Conrado et al. | Privacy in an Identity-based DRM System | |
JPH09179923A (en) | Anonymous counting system of data item for statistic purpose | |
Clark et al. | On the Security of Recent Protocols. | |
JP2004501458A (en) | Secure biometric authentication / identification method, biometric data entry module and verification module | |
CN114091009B (en) | Method for establishing safety link by using distributed identity mark | |
KR20040007417A (en) | Transaction certification | |
KR100875341B1 (en) | How to create a virtual private network using a public network | |
EP2136311A1 (en) | Data storage method, client device, storage device, and program | |
JPH1020778A (en) | Encoding device, decoding device and ic card | |
AU2001290036A1 (en) | Encryption and identification method | |
JPH09114719A (en) | Information recording business card and file transfer system using the card | |
JP2009267583A (en) | Secret authentication system | |
JPH07336328A (en) | Cipher device | |
WO2004054208A1 (en) | Transferring secret information |