JPH024018B2 - - Google Patents

Info

Publication number
JPH024018B2
JPH024018B2 JP12312084A JP12312084A JPH024018B2 JP H024018 B2 JPH024018 B2 JP H024018B2 JP 12312084 A JP12312084 A JP 12312084A JP 12312084 A JP12312084 A JP 12312084A JP H024018 B2 JPH024018 B2 JP H024018B2
Authority
JP
Japan
Prior art keywords
user
authentication processing
password
information
processing unit
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Lifetime
Application number
JP12312084A
Other languages
Japanese (ja)
Other versions
JPS613254A (en
Inventor
Tatsuaki Okamoto
Akira Shiraishi
Tsukasa Kawaoka
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nippon Telegraph and Telephone Corp
Original Assignee
Nippon Telegraph and Telephone Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nippon Telegraph and Telephone Corp filed Critical Nippon Telegraph and Telephone Corp
Priority to JP59123120A priority Critical patent/JPS613254A/en
Publication of JPS613254A publication Critical patent/JPS613254A/en
Publication of JPH024018B2 publication Critical patent/JPH024018B2/ja
Granted legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F12/00Accessing, addressing or allocating within memory systems or architectures
    • G06F12/14Protection against unauthorised use of memory or access to memory

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
  • Storage Device Security (AREA)

Description

【発明の詳細な説明】 〔産業上の利用分野〕 本発明は、文書等をデイジタル情報として転送
あるいは蓄積するシステムにおいて、利用者の記
憶もしくは利用者が保有するカード等の記録媒体
で秘密に保有するパスワードを用いて、利用者の
正当性を認証する方式に関する。
[Detailed Description of the Invention] [Field of Industrial Application] The present invention provides a system for transferring or storing documents, etc. as digital information. This invention relates to a method for authenticating the validity of a user using a password.

〔従来技術〕[Prior art]

現在、文書等をデイジタル情報として転送ある
いは蓄積するシステムにおいて、利用者の正当性
を認証する方式としては、利用者が秘密に保持す
るパスワードを用いる方式が広く使われている。
しかし、この方式は、転送情報、蓄積情報の盗
聴、盗難、改ざんに対して無防護であり、この欠
点を利用した犯罪事例が報告されている。それに
対し、岡本等による特願昭58−2887号の“パスワ
ード認証方式”及び、1981年発行のIEEE Trans.
Comm.vol.29,No.6 773〜777頁に掲載されたR.
E.Lennon等の論文“Cryptographic
Procedures”等では、暗号等の技術を用いるこ
とにより、これら不正行為への対処策を講じた利
用者認証方式を提案している。しかし、いずれの
方式も、認証処理を行う側では、各利用者対応に
それぞれ認証処理用の蓄積情報を維持、管理する
必要があり、利用者の数が多くなると、これら情
報の維持、管理に多大なコストを要するという欠
点がある。また、上記方式では、各端末で全利用
者の認証処理用の蓄積情報を維持・管理すること
が事実上不可能であることより、センタと独立に
端末側のみで利用者の認証(オフライン認証)を
行うシステムで使用することは困難である。
BACKGROUND ART Currently, in systems that transfer or store documents and the like as digital information, a method that uses a password kept secret by the user is widely used as a method for authenticating the authenticity of the user.
However, this method provides no protection against wiretapping, theft, and falsification of transferred information and stored information, and criminal cases have been reported that take advantage of this drawback. On the other hand, the "Password Authentication Method" of Patent Application No. 58-2887 by Okamoto et al. and the IEEE Trans.
R. published in Comm.vol.29, No.6 pages 773-777.
E. Lennon et al.’s paper “Cryptographic
Proposed user authentication methods that take countermeasures against these fraudulent acts by using technologies such as encryption. However, in both methods, the authentication processing side must It is necessary to maintain and manage accumulated information for authentication processing for each user, and as the number of users increases, there is a drawback that maintaining and managing this information requires a large cost.In addition, the above method has the disadvantage that: Since it is virtually impossible to maintain and manage the accumulated information for authentication processing of all users on each terminal, it is used in a system that performs user authentication only on the terminal side (offline authentication) independent of the center. It is difficult to do so.

一方、1983年発行のLecture Notes in
Computer Science,vol.149,283〜288頁に掲載
されたM.Davio等の論文“Authentication
Procedures”では、各利用者対応の認証処理蓄
積情報を維持、管理する必要のない相互認証方式
が提案されているが、転送情報の盗聴に対処する
ため暗号通信機を必要とし、また認証処理を行う
装置内での情報の盗難等にも対処する必要がある
という欠点を有している。
On the other hand, Lecture Notes published in 1983
Computer Science, vol. 149, pages 283-288, M. Davio et al.
``Procedures'' proposes a mutual authentication method that does not require the maintenance and management of accumulated authentication processing information for each user, but it requires an encrypted communication device to deal with eavesdropping of transferred information, and also requires authentication processing. This method has the disadvantage that it is necessary to deal with the theft of information within the device.

〔発明の目的〕[Purpose of the invention]

本発明は、上記従来の各方式の欠点に鑑みなさ
れたもので、転送情報、蓄積情報の盗聴、改ざん
等に対処するとともに、認証処理を行う装置上に
おける蓄積情報を利用者の数にかかわらず単一情
報にする利用者認証方式を提供することにある。
The present invention was developed in view of the shortcomings of the conventional methods described above, and it is possible to deal with the eavesdropping and falsification of transferred information and stored information, and to protect the stored information on the device that performs authentication processing regardless of the number of users. The objective is to provide a user authentication method that uses a single piece of information.

〔発明の実施例〕[Embodiments of the invention]

本発明はR.L.Rivest等により提案されたRSA
公開鍵暗号法を用いる。これについては、1978年
2月発行のCommunication of the ACM,第21
巻,2号,120〜126頁に“A Method for
Obtaining Digital Signatures and Public−
Key Cryptosystems”として詳述されている。
以下、本発明の内容を説明する。
The present invention is based on the RSA proposed by RLRivest et al.
Uses public key cryptography. This is discussed in Communication of the ACM, February 1978, No. 21.
“A Method for
Obtaining Digital Signatures and Public−
Key Cryptosystems”.
The contents of the present invention will be explained below.

最初に本発明の第1の実施例について説明す
る。第1図は本発明の第1の実施例により認証手
順を行う前に設定すべき情報について示したもの
である。まず、システムに唯一存在するシステム
管理ユニツト3(例えば特別に保護されたプログ
ラムで動作する装置)は、次の情報p,q,n,
e,d,pWi(i=1,2,…)を秘密に生成す
る。ここで、各変数はすべて正の整数とする。
First, a first embodiment of the present invention will be described. FIG. 1 shows information to be set before performing an authentication procedure according to a first embodiment of the present invention. First, the system management unit 3, which is the only one in the system (for example, a device that operates with a specially protected program), collects the following information p, q, n,
Secretly generate e, d, pW i (i=1, 2,...). Here, all variables are assumed to be positive integers.

p,q:素数 (1) n=p・q (2) e・d≡1(modL) (3) ただし、L=LCM〔(p−1),(q−1)〕 (LCM〔x,y〕は、x,yの最小公倍数) 1≦e≦L−1,1≦d≦L−1 pWi≡d・IDi(modL) (4) 1≦pWi≦L−1 以上において、e,dはRSA公開鍵暗号法の
公開鍵、秘密鍵に対応する。ID1,ID2は利用者
1,2の識別番号であり、pW1,pW2は利用者
1,2のパスワードである。
p, q: Prime numbers (1) n=p・q (2) e・d≡1(modL) (3) However, L=LCM [(p-1), (q-1)] (LCM[x, y] is the least common multiple of x and y) 1≦e≦L−1, 1≦d≦L−1 pW i ≡d・ID i (modL) (4) 1≦pW i ≦L−1 In the above, e and d correspond to the public key and private key of RSA public key cryptography. ID 1 and ID 2 are the identification numbers of users 1 and 2, and pW 1 and pW 2 are the passwords of users 1 and 2.

上記各情報を生成したシステム管理ユニツト3
は、各利用者の保持するカード等の記録媒体(以
下、カードと呼ぶ)5,6にpW1,pW2及びID1
ID2及びnを記録し(ID1,ID2は別に記録されて
もよい)、(e,n)を認証処理ユニツト4へ送付
する。ここで、カード5,6に記録された情報を
読み取ることは事実不可能であり(例えば、IC
カードを利用)、従つて利用者1,2はパスワー
ドpW1,pW2を知ることができない。認証処理ユ
ニツト4に送られた(e,n)は公開されても良
い値である。システム管理ユニツト3は、(p,
q,d)を秘密に保持する。
System management unit 3 that generated the above information
pW 1 , pW 2 and ID 1 , on recording media such as cards (hereinafter referred to as cards ) 5 and 6 held by each user.
ID 2 and n are recorded (ID 1 and ID 2 may be recorded separately), and (e, n) is sent to the authentication processing unit 4. Here, it is actually impossible to read the information recorded on the cards 5 and 6 (for example,
card), therefore users 1 and 2 cannot know the passwords pW 1 and pW 2 . (e, n) sent to the authentication processing unit 4 is a value that may be made public. The system management unit 3 (p,
q, d) are kept secret.

第2図は、第1の実施例における認証手順を説
明する図である。第2図は利用者1が認証処理ユ
ニツト4に認証を受ける場合の例であり、利用者
1が保持するカード5は、例えばICカードのよ
うにメモリ及び演算処理能力を持つているとして
いる。カード5が演算処理能力を持たない場合に
は、該カード5に記録された情報を読み出すこと
ができる装置に入力し、その装置で演算処理を行
うようにする。まず、利用者1がカード5により
認証処理ユニツト4へ認証処理の依頼を行うと、
認証処理ユニツト4は乱数γ(1≦γ≦n−1)
を乱数発生器43により生成し、カード5へ送
る。カード5はユニツト4から送られたγ、およ
びレジスタ51,52に保持しているpW1,nよ
り指数合同演算器54を用いて、次の関係を持つ
値Sを生成し、レジスタ53のID1と共に認証処
理ユニツト4へ送る。
FIG. 2 is a diagram illustrating the authentication procedure in the first embodiment. FIG. 2 shows an example in which the user 1 is authenticated by the authentication processing unit 4, and the card 5 held by the user 1 is assumed to have memory and arithmetic processing capabilities, such as an IC card. If the card 5 does not have arithmetic processing capability, the information recorded on the card 5 is input to a device that can read it, and the arithmetic processing is performed by that device. First, when the user 1 requests the authentication processing unit 4 to perform authentication processing using the card 5,
The authentication processing unit 4 uses a random number γ (1≦γ≦n-1)
is generated by the random number generator 43 and sent to the card 5. The card 5 uses the exponent congruence calculator 54 from the γ sent from the unit 4 and pW 1 , n held in the registers 51 and 52 to generate a value S having the following relationship, and generates the value S having the following relationship. 1 and sent to the authentication processing unit 4.

S≡γpW1(modn) (5) 認証処理ユニツト4では、レジスタ41,42
に事前に保持しているe,n、乱数発生器43の
γ、及びカード5から受け取つたS,ID1によ
り、指数合同演算器44,45でそれぞれSe
γID1を生成し、比較器46を用いて次の関数が成
立するかどうか判定する。
S≡γ pW1 (modn) (5) In authentication processing unit 4, registers 41 and 42
Using e and n stored in advance, γ of the random number generator 43, and S and ID 1 received from the card 5, the exponent congruence calculators 44 and 45 calculate S e , respectively.
γ ID1 is generated, and the comparator 46 is used to determine whether the following function holds true.

Se≡γID1(modn) (6) 上記の関係が成立すれば、正しい利用者1であ
ると認証される。
S e ≡γ ID1 (modn) (6) If the above relationship is established, the user is authenticated as the correct user 1.

なお、pW1を導出する式は、ID1,dに関する
他の多項式でも良い。例えば、式(4)を次式(7)とし
た場合、 pW1≡IDi(IDi+d)(modL) (7) 式(6)は次式(8)となる。
Note that the formula for deriving pW 1 may be another polynomial regarding ID 1 and d. For example, when formula (4) is changed to the following formula (7), pW 1 ≡ID i (ID i +d) (modL) (7) Formula (6) becomes the following formula (8).

Se≡γIDi(IDi S e ≡γ IDi(IDi

Claims (1)

【特許請求の範囲】 1 利用者が秘密に保持するパスワードを利用し
て、利用者の認証処理を行うシステムにおいて、
システムに唯一存在するシステム管理ユニツト
と、各利用者の認証処理を行う認証処理ユニツト
とを具備し、前記システム管理ユニツトは、自分
のみが秘密に保持する情報と各利用者の識別番号
を用いて各利用者のパスワードを秘密に生成し、
該パスワードを記録媒体(以下、カードという)
に記録して各利用者に配布すると共に、各利用者
の認証処理を行う際、共通に用いられる公開情報
を前記認証処理ユニツトに配布し、利用者が認証
を受ける場合、カードもしくはカード入力装置で
前記認証処理ユニツトより乱数を受け取り、その
乱数とパスワードより指数合同演算を用いて生成
した情報を利用者の識別番号と共に前記認証処理
ユニツトへ送付し、該認証処理ユニツトでは送付
した乱数と受け取つた情報及び公開情報の関係を
指数合同演算により検証することにより、利用者
の正当性を確認することを特徴とした利用者認証
方式。 2 利用者が秘密に保持するパスワードを利用し
て、利用者の認証処理を行うシステムにおいて、
システムに唯一存在するシステム管理ユニツト
と、各利用者の認証処理を行う認証処理ユニツト
とを具備し、前記システム管理ユニツトは、自分
のみが秘密に保持する情報と各利用者の識別番号
を用いて、指数合同演算により各利用者のパスワ
ードを秘密に生成して各利用者に直接あるいは記
録媒体(以下、カードという)に記録して配布す
ると共に、各利用者の認証処理を行う際、共通に
用いられる公開情報を前記認証処理ユニツトに配
布し、利用者が認証を受ける場合、パスワード入
力装置あるいはカードで前記認証処理ユニツトよ
り乱数を受け取ると共に内部で乱数を生成し、こ
れら乱数とパスワードより指数合同演算及び合同
乗算を用いて生成した第1の情報と、内部で生成
した乱数と利用者の識別番号より指数合同演算を
用いて生成した第2情報とを利用者識別番号と共
に前記認証処理ユニツトへ送付し、それを受け取
つた認証処理ユニツトは送付した乱数と受け取つ
た情報及び公開情報の関係を指数合同演算及び合
同乗算により検証することにより、利用者の正当
性を確認することを特徴とした利用者認証方式。 3 前記パスワードをカード等の記録媒体に記録
する情報と利用者が記憶する情報に分割してお
き、事前に定めた演算を両情報に作用させること
によりパスワードを生成することを特徴とする特
許請求の範囲第1項もしくは第2項記載の利用者
認証方式。
[Claims] 1. In a system that performs user authentication processing using a password kept secret by the user,
The system is equipped with a system management unit that exists only in the system, and an authentication processing unit that performs authentication processing for each user. Secretly generate a password for each user,
The password is stored on a storage medium (hereinafter referred to as a card)
In addition, when performing authentication processing for each user, public information that is commonly used is distributed to the authentication processing unit, and when a user is authenticated, the card or card input device receives a random number from the authentication processing unit, and sends the information generated using the exponential congruence operation from the random number and password to the authentication processing unit together with the user's identification number, and the authentication processing unit receives the sent random number. A user authentication method characterized by confirming the authenticity of the user by verifying the relationship between information and public information using exponential congruence calculations. 2. In a system that performs user authentication processing using a password that the user keeps secret,
The system is equipped with a system management unit that exists only in the system, and an authentication processing unit that performs authentication processing for each user. , secretly generates a password for each user through exponent joint calculation and distributes it to each user either directly or by recording it on a recording medium (hereinafter referred to as a card), and when performing authentication processing for each user, a common password is generated. When the public information to be used is distributed to the authentication processing unit and the user is authenticated, a password input device or card receives random numbers from the authentication processing unit, generates random numbers internally, and uses these random numbers and the password to calculate the index congruence. The first information generated using the calculation and joint multiplication and the second information generated using the exponent joint calculation from the internally generated random number and the user identification number are sent to the authentication processing unit together with the user identification number. The authentication processing unit that receives the sent random number verifies the relationship between the sent random number, the received information, and the public information through exponent joint operation and joint multiplication, thereby confirming the authenticity of the user. person authentication method. 3. A patent claim characterized in that the password is divided into information to be recorded on a recording medium such as a card and information to be memorized by the user, and the password is generated by applying a predetermined calculation to both pieces of information. The user authentication method described in item 1 or 2 of the scope.
JP59123120A 1984-06-15 1984-06-15 User certification system Granted JPS613254A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
JP59123120A JPS613254A (en) 1984-06-15 1984-06-15 User certification system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
JP59123120A JPS613254A (en) 1984-06-15 1984-06-15 User certification system

Publications (2)

Publication Number Publication Date
JPS613254A JPS613254A (en) 1986-01-09
JPH024018B2 true JPH024018B2 (en) 1990-01-25

Family

ID=14852676

Family Applications (1)

Application Number Title Priority Date Filing Date
JP59123120A Granted JPS613254A (en) 1984-06-15 1984-06-15 User certification system

Country Status (1)

Country Link
JP (1) JPS613254A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO1996007256A1 (en) * 1994-08-30 1996-03-07 Kokusai Denshin Denwa Co., Ltd. Certifying system

Families Citing this family (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2574755B2 (en) * 1986-04-23 1997-01-22 株式会社日立製作所 Personal authentication system
US4916738A (en) * 1986-11-05 1990-04-10 International Business Machines Corp. Remote access terminal security
EP0281059B1 (en) * 1987-03-04 1993-12-01 Siemens Nixdorf Informationssysteme Aktiengesellschaft Data exchange system with a plurality of user terminals, each including an IC card reader
JP2521785B2 (en) * 1988-02-08 1996-08-07 日本電信電話株式会社 Terminal authentication processing system
JP2697876B2 (en) * 1988-10-28 1998-01-14 日本電信電話株式会社 Electronic bidding system
JP2555220B2 (en) * 1990-12-17 1996-11-20 日本電信電話株式会社 Authentication method in digital mobile communication
US5475756A (en) * 1994-02-17 1995-12-12 At&T Corp. Method of authenticating a terminal in a transaction execution system
JP2000276445A (en) 1999-03-23 2000-10-06 Nec Corp Authentication method and device using biometrics discrimination, authentication execution device, and recording medium recorded with authentication program
JP4867760B2 (en) * 2007-03-30 2012-02-01 ソニー株式会社 Information processing apparatus and method, and information processing system

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO1996007256A1 (en) * 1994-08-30 1996-03-07 Kokusai Denshin Denwa Co., Ltd. Certifying system

Also Published As

Publication number Publication date
JPS613254A (en) 1986-01-09

Similar Documents

Publication Publication Date Title
CA2196356C (en) Transaction verification protocol for smart cards
US7000118B1 (en) Asymmetric system and method for tamper-proof storage of an audit trial for a database
AU651326B2 (en) Method and system for personal identification using proofs of legitimacy
EP0772165B1 (en) Electronic cash implementing method using an anonymous public key license
EP1048143B1 (en) Method and apparatus for secure cryptographic key storage and use
Law et al. How to make a mint: the cryptography of anonymous electronic cash
US7869593B2 (en) Software for providing based on shared knowledge public keys having same private key
CA1321835C (en) Public key diversification method
US20060153365A1 (en) Providing digital signature and public key based on shared knowledge
US20020174339A1 (en) Data card verification system
EP0252499A2 (en) Method, apparatus and article for identification and signature
JP2000357156A (en) System and method for authentication sheet distribution
CN1202288A (en) Document authentication system and method
Syverson Limitations on design principles for public key protocols
Brickell et al. Interactive identification and digital signatures
JPH024018B2 (en)
US20050102523A1 (en) Smartcard with cryptographic functionality and method and system for using such cards
Dandash et al. Fraudulent Internet Banking Payments Prevention using Dynamic Key.
JPH05173972A (en) Password restoring method
JPH0353367A (en) Decentralized information processing system
Harn et al. Password authentication using public-key cryptography
Farsi Digital Cash
JP2574755B2 (en) Personal authentication system
Rihaczek TeleTrusT-OSIS and communication security
WO2006056234A1 (en) Smartcard with cryptographic functionality and method and system for using such cards

Legal Events

Date Code Title Description
EXPY Cancellation because of completion of term