DE602004021047D1 - Kryptographisches Verfahren mit öffentlichem Schlüssel zum Schützen einer integrierten Schaltung gegen Missbrauch - Google Patents

Kryptographisches Verfahren mit öffentlichem Schlüssel zum Schützen einer integrierten Schaltung gegen Missbrauch

Info

Publication number
DE602004021047D1
DE602004021047D1 DE602004021047T DE602004021047T DE602004021047D1 DE 602004021047 D1 DE602004021047 D1 DE 602004021047D1 DE 602004021047 T DE602004021047 T DE 602004021047T DE 602004021047 T DE602004021047 T DE 602004021047T DE 602004021047 D1 DE602004021047 D1 DE 602004021047D1
Authority
DE
Germany
Prior art keywords
protecting
integrated circuit
public key
key cryptographic
cryptographic method
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Lifetime
Application number
DE602004021047T
Other languages
English (en)
Inventor
Marc Girault
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Orange SA
Original Assignee
France Telecom SA
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by France Telecom SA filed Critical France Telecom SA
Publication of DE602004021047D1 publication Critical patent/DE602004021047D1/de
Anticipated expiration legal-status Critical
Expired - Lifetime legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F7/00Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
    • G07F7/08Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
    • G07F7/10Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data
    • G07F7/1008Active credit-cards provided with means to personalise their use, e.g. with PIN-introduction/comparison system
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/34Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
    • G06Q20/341Active cards, i.e. cards including their own processing means, e.g. including an IC or chip
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/36Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes
    • G06Q20/367Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes involving electronic purses or money safes
    • G06Q20/3674Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes involving electronic purses or money safes involving authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/409Device specific authentication in transaction processing
    • G06Q20/4097Device specific authentication in transaction processing using mutual authentication between devices and transaction partners
    • G06Q20/40975Device specific authentication in transaction processing using mutual authentication between devices and transaction partners using encryption therefor
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/065Encryption by serially and continuously modifying data stream elements, e.g. stream cipher systems, RC4, SEAL or A5/3
    • H04L9/0656Pseudorandom key sequence combined element-for-element with data sequence, e.g. one-time-pad [OTP] or Vernam's cipher
    • H04L9/0662Pseudorandom key sequence combined element-for-element with data sequence, e.g. one-time-pad [OTP] or Vernam's cipher with particular pseudorandom sequence generator
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • H04L9/3066Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/56Financial cryptography, e.g. electronic payment or e-cash

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Signal Processing (AREA)
  • Finance (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • Computing Systems (AREA)
  • Pure & Applied Mathematics (AREA)
  • Mathematical Physics (AREA)
  • Mathematical Optimization (AREA)
  • Mathematical Analysis (AREA)
  • Algebra (AREA)
  • Microelectronics & Electronic Packaging (AREA)
  • Storage Device Security (AREA)
DE602004021047T 2003-01-24 2004-01-23 Kryptographisches Verfahren mit öffentlichem Schlüssel zum Schützen einer integrierten Schaltung gegen Missbrauch Expired - Lifetime DE602004021047D1 (de)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
FR0301108A FR2850479B1 (fr) 2003-01-24 2003-01-24 Procede cryptographique a cle publique pour la protection d'une puce contre la fraude

Publications (1)

Publication Number Publication Date
DE602004021047D1 true DE602004021047D1 (de) 2009-06-25

Family

ID=32525020

Family Applications (1)

Application Number Title Priority Date Filing Date
DE602004021047T Expired - Lifetime DE602004021047D1 (de) 2003-01-24 2004-01-23 Kryptographisches Verfahren mit öffentlichem Schlüssel zum Schützen einer integrierten Schaltung gegen Missbrauch

Country Status (11)

Country Link
US (1) US7590846B2 (de)
EP (1) EP1441313B1 (de)
JP (1) JP4659149B2 (de)
KR (1) KR101142656B1 (de)
CN (1) CN100566246C (de)
AR (1) AR047012A1 (de)
AT (1) ATE431603T1 (de)
DE (1) DE602004021047D1 (de)
FR (1) FR2850479B1 (de)
MX (1) MXPA04000700A (de)
TW (1) TWI336864B (de)

Families Citing this family (27)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CA2419972C (en) * 2001-03-29 2011-10-25 Matsushita Electric Industrial Co., Ltd. Data protection system that protects data by encrypting the data
JP4612461B2 (ja) * 2004-06-24 2011-01-12 株式会社東芝 マイクロプロセッサ
CA2594670C (en) * 2005-01-21 2014-12-23 Certicom Corp. Elliptic curve random number generation
TW200708027A (en) * 2005-04-29 2007-02-16 Sean O'neil Process of and apparatus for hashing
US7613915B2 (en) 2006-11-09 2009-11-03 BroadOn Communications Corp Method for programming on-chip non-volatile memory in a secure processor, and a device so programmed
US9767319B2 (en) 2007-04-17 2017-09-19 Avago Technologies General Ip (Singapore) Pte. Ltd. Method and apparatus of secure authentication for system on chip (SoC)
EP2251813A1 (de) * 2009-05-13 2010-11-17 Nagravision S.A. Verfahren zur Authentifizierung des Zugangs auf einen gesicherten Chip in einer Testvorrichtung
DE102009022233A1 (de) * 2009-05-20 2010-11-25 Feustel, Dietmar Verwendung einer Zeichenkette in Sytemen der Kryptographie, der Statistik, der Simulation, der Randomisierung, von Spielautomaten und dgl.
US8923519B2 (en) * 2009-05-29 2014-12-30 Alcatel Lucent Method of efficient secure function evaluation using resettable tamper-resistant hardware tokens
DE102010010950A1 (de) * 2010-03-10 2011-09-15 Giesecke & Devrient Gmbh Verfahren zum Authentisieren eines portablen Datenträgers
EP2720167A1 (de) 2012-10-11 2014-04-16 Nagravision S.A. Verfahren und System zur Chippersonalisierung von Chipkarten
AU2017223133B2 (en) 2016-02-23 2022-09-08 nChain Holdings Limited Determining a common secret for the secure exchange of information and hierarchical, deterministic cryptographic keys
AU2017223127B2 (en) 2016-02-23 2023-01-05 nChain Holdings Limited Universal tokenisation system for blockchain-based cryptocurrencies
CN109417465B (zh) 2016-02-23 2021-01-15 区块链控股有限公司 区块链执行的智能合约的注册和自动化管理方法
SG11201806784UA (en) 2016-02-23 2018-09-27 Nchain Holdings Ltd System and method for controlling asset-related actions via a blockchain
EP3259724B1 (de) 2016-02-23 2021-03-24 Nchain Holdings Limited Sicherer verlustresistenter mehrparteienspeicher und transfer von kryptografischen schlüsseln für blockchain-basierte systemen in verbindung mit einem geldbörsenverwaltungssystem
EP4087178A1 (de) 2016-02-23 2022-11-09 nChain Licensing AG Verfahren und system zum sicheren transfer von entitäten auf einer blockchain
EA201891829A1 (ru) 2016-02-23 2019-02-28 Нчейн Холдингс Лимитед Способ и система для эффективного перевода криптовалюты, связанной с заработной платой, в блокчейне для создания способа и системы автоматизированной выплаты заработной платы на основе смарт-контрактов
SG10202007907PA (en) 2016-02-23 2020-09-29 Nchain Holdings Ltd Blockchain-implemented method for control and distribution of digital content
WO2017145009A1 (en) 2016-02-23 2017-08-31 nChain Holdings Limited A method and system for securing computer software using a distributed hash table and a blockchain
AU2017223126B2 (en) 2016-02-23 2022-12-15 nChain Holdings Limited Blockchain-based exchange with tokenisation
GB2560274C (en) 2016-02-23 2022-06-15 Nchain Holdings Ltd Personal device security using elliptic curve cryptography for secret sharing
EP3860037A1 (de) 2016-02-23 2021-08-04 Nchain Holdings Limited Kryptographisches verfahren und system zur sicheren extraktion von daten aus einer blockchain
MX2018010050A (es) 2016-02-23 2019-01-21 Nchain Holdings Ltd Transacciones turing completas basadas en agente que integran retroalimentacion dentro de un sistema de cadena de bloques.
US11182782B2 (en) 2016-02-23 2021-11-23 nChain Holdings Limited Tokenisation method and system for implementing exchanges on a blockchain
CN109471610B (zh) * 2018-10-25 2021-03-19 北京链化未来科技有限公司 一种串行随机数生成方法、装置和存储介质
CN109361509A (zh) * 2018-10-25 2019-02-19 杭州隐知科技有限公司 一种随机数生成方法、装置和存储介质

Family Cites Families (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4926480A (en) * 1983-08-22 1990-05-15 David Chaum Card-computer moderated systems
US4933970A (en) * 1988-01-19 1990-06-12 Yeda Research And Development Company Limited Variants of the fiat-shamir identification and signature scheme
EP0383985A1 (de) * 1989-02-24 1990-08-29 Claus Peter Prof. Dr. Schnorr Verfahren zur Identifikation von Teilnehmern sowie zur Generierung und Verifikation von elektronischen Unterschriften in einem Datenaustauschsystem
JP2993275B2 (ja) * 1992-05-25 1999-12-20 三菱電機株式会社 認証方法
FR2716058B1 (fr) * 1994-02-04 1996-04-12 France Telecom Procédé de signature numérique et d'authentification de messages utilisant un logarithme discret.
FR2717286B1 (fr) * 1994-03-09 1996-04-05 Bull Cp8 Procédé et dispositif pour authentifier un support de données destiné à permettre une transaction ou l'accès à un service ou à un lieu, et support correspondant.
EP0723251A3 (de) * 1995-01-20 1998-12-30 Tandem Computers Incorporated Verfahren und Gerät für einen Benützer und Sicherheitsauthentisierungseinrichtung
US6226383B1 (en) 1996-04-17 2001-05-01 Integrity Sciences, Inc. Cryptographic methods for remote authentication
DE19820422A1 (de) * 1998-05-07 1999-11-11 Giesecke & Devrient Gmbh Verfahren zur Authentisierung einer Chipkarte innerhalb eines Nachrichtenübertragungs-Netzwerks
TW536672B (en) 2000-01-12 2003-06-11 Hitachi Ltd IC card and microcomputer
JP3864675B2 (ja) * 2000-03-09 2007-01-10 株式会社日立製作所 共通鍵暗号装置
GB0102516D0 (en) * 2001-01-31 2001-03-21 Hewlett Packard Co Trusted gateway system
FR2826531B1 (fr) * 2001-06-26 2003-10-24 France Telecom Procede cryptographique pour la protection d'une puce electronique contre la fraude
FR2828780B1 (fr) * 2001-08-20 2004-01-16 France Telecom Procede de realisation d'une unite cryptographique pour un systeme de cryptographie asymetrique utilisant une fonction logarithme discret
FR2829645A1 (fr) * 2001-09-10 2003-03-14 St Microelectronics Sa Protocole d'authentification a verification d'integrite de memoire
FR2834403B1 (fr) 2001-12-27 2004-02-06 France Telecom Systeme cryptographique de signature de groupe
US7353395B2 (en) * 2002-03-21 2008-04-01 Ntt Docomo Inc. Authenticated ID-based cryptosystem with no key escrow

Also Published As

Publication number Publication date
FR2850479A1 (fr) 2004-07-30
CN1518270A (zh) 2004-08-04
FR2850479B1 (fr) 2005-04-29
KR20040068472A (ko) 2004-07-31
US7590846B2 (en) 2009-09-15
US20040193890A1 (en) 2004-09-30
TWI336864B (en) 2011-02-01
JP2004229308A (ja) 2004-08-12
EP1441313B1 (de) 2009-05-13
AR047012A1 (es) 2006-01-04
JP4659149B2 (ja) 2011-03-30
MXPA04000700A (es) 2004-08-03
KR101142656B1 (ko) 2012-05-11
EP1441313A1 (de) 2004-07-28
CN100566246C (zh) 2009-12-02
ATE431603T1 (de) 2009-05-15
TW200511136A (en) 2005-03-16

Similar Documents

Publication Publication Date Title
DE602004021047D1 (de) Kryptographisches Verfahren mit öffentlichem Schlüssel zum Schützen einer integrierten Schaltung gegen Missbrauch
DE60318974D1 (de) Elektronisches Schlüsselsystem
GB2443349B (en) A method and apparatus for protecting private information on a user apparatus
IS8420A (is) Aðferð fyrir örugga auðkenningu
DE60329738D1 (de) Verfahren und System zum Drucken von integrierten Schaltungsplänen
DE602004020362D1 (de) Lenkbare bohrmeisselanordnung und verfahren
DE502005009563D1 (de) Schaltungsanordnung und Verfahren zum Schutz einer integrierten Halbleiterschaltung
DE602005014426D1 (de) Elektronisches Schlüsselsystem
DE602005022194D1 (de) Verfahren gegen unbefugten Zugang zu Entschlüsselungsschlüsseln mit Hilfe einer verschlüsselten digitalen Unterschrift
DE502004008891D1 (de) Elektrohandwerkzeuggerät mit Diebstahlschutzeinrichtung und Verfahren zum Betreiben eines solchen Elektrohandwerkzeuggerätes
DE60143655D1 (de) Verfahren zum ausgeben elektronischer tickets
DE60306864D1 (de) Verfahren und System zum abnehmbaren kryptographischenen Zündungsschlüssel
FI20031558A0 (fi) Menetelmä käyttäjän autentikoimiseksi
TW588853U (en) Key device having clip-buckle type bridge
DE60135864D1 (de) Verfahren zum öffnen eines elektronischen schlosses
AU2003249501A8 (en) Method for protecting an electronic circuit against fault-based attacks
DE602004001051D1 (de) Schlüsselbetätigte Diebstahlsicherung
DE502004004313D1 (de) Elektronischer schl ssel
DE60221863D1 (de) Verfahren zur implementierung eines kryptographischen algorithmus zum finden des öffentlichen exponenten in einer elektronischen komponente
DE60206107D1 (de) Verfahren zum Schutz eines elektronisches Gerätes, und elektronisches Gerät
DE60102856D1 (de) Verfahren zum Widerrufen elektronischer Post
DE602004011645D1 (de) Vorrichtung zum Schutz einer Information
FI20000797A0 (fi) Menetelmä sähköisen avaimen käyttöön
FI114362B (fi) Menetelmä laitteen salaisen avaimen ottamiseksi käyttöön toisessa laitteessa
DE10394184D2 (de) Münzpfandschloss

Legal Events

Date Code Title Description
8364 No opposition during term of opposition