WO2007138518A2 - Verfahren zu kryptographischen authentikation - Google Patents
Verfahren zu kryptographischen authentikation Download PDFInfo
- Publication number
- WO2007138518A2 WO2007138518A2 PCT/IB2007/051877 IB2007051877W WO2007138518A2 WO 2007138518 A2 WO2007138518 A2 WO 2007138518A2 IB 2007051877 W IB2007051877 W IB 2007051877W WO 2007138518 A2 WO2007138518 A2 WO 2007138518A2
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- counter
- eeprom
- valid
- invalid
- reading
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F12/00—Accessing, addressing or allocating within memory systems or architectures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2103—Challenge-response
Definitions
- the invention relates to a method for cryptographic authentication in access security systems.
- the advantage of a solution in which the card or the transponder also provides a number that changes from time to time is the increased attack resistance compared to the so-called "replay attack.” This attack and its derivatives could result in an unauthorized base station (attacker). try to read protected information from the transponder or modify information in the transponder EEPROM memory using recorded valid communication sequences.
- the basic idea of the invention is to provide an algorithm which is used in particular in transponders of cryptographic authentication.
- it is not a software hardware solution that always uses special hardware. This saves even compared to other methods EEPROM accesses, which are based on the storage of redundant information.
- Each of the EEPROM segments is used exclusively for storing counter data. This allows in many cases a write access to the EEPROM segments which has been optimized for counter data in order to further increase the permitted number of write cycles.
- only a small amount of computation is required to implement the method.
- the method according to the invention uses the characteristic properties of count values for the integrated storage of these values and for error detection and error correction. This also provides effective protection against replay attacks. By updating a new count in only one EEPROM segment after each increment, the number of allowed program cycles can triple compared to prior art methods, while making it difficult to attack the security system.
- An advantageous embodiment of the invention provides that the incrementing comprises the following steps: a) finding an invalid count in one of three EEPROM segments; b) finding a maximum valid counter reading from the remaining valid counter readings in the presence of an invalid counter reading; c) overwriting the invalid meter reading with a valid meter reading; d) finding a smallest valid counter reading from the three valid counter readings, wherein in the absence of the invalid counter reading step d) follows step a); e) finding a maximum valid meter reading from the three valid meter readings; f) Overwriting the smallest valid counter reading with a valid maximum counter reading.
- the invalid count is determined by calculating the difference to the two remaining counts, the invalid count having the largest differences to the remaining counts.
- threshold values are defined for the differences above which a counter reading is recognized as invalid. If the threshold value is exceeded, it can be assumed that the relevant memory segment is invalid - A -
- Initialization value for a suitable crypto-algorithm which is used for authentication and / or encryption of the communication with a transponder.
- a practicable variant of the invention provides that the counter readings during the incrementation come from a forward or backward counter.
- the invention will be explained in more detail with reference to the drawing. It shows in a schematic representation:
- Fig. 1 shows a sequence for secure counting and storing in an EEPROM in the context of an increment.
- the method 100 uses the three EEPROM segments Z 1 , Z 2 , and Z 3 for the secure storage of successive counter readings.
- the method 100 implements a sequence for secure counting and storage in an EEPROM 10 as part of an increment 11, wherein the increment 11 in the application must be passed through successfully in order subsequently to reach a state in which access (read, write) is achieved. can be allowed on the EEPROM 10, ie only in the case of a successful execution of the command INCREMENT can be released with access, ie a write and read.
- the counter can in principle be a forward or backward counter. In this embodiment, it is assumed that it is a forward counter of the step size 1.
- the invalid counter reading in step a) is determined by calculating the differences to the two remaining counter readings, wherein an invalid counter reading has the largest differences to the remaining counter readings.
- the memory value of such a memory segment is thus identified as invalid and will be overwritten with the new maximum count in step c).
- this is invalid Count has been removed from one of the memory segments of the EEPROM 10 and has been overwritten by a new valid count. If it should turn out that no invalid meter reading now exists, then in step d) a smallest valid meter reading is retrieved from the three valid meter readings, wherein in the absence of an invalid meter reading the
- Process step d) immediately follows the process step a). Finally, in step e), the finding of a largest valid counter reading from the now three valid counter readings takes place, so that in the subsequent step f) the smallest valid counter reading can be overwritten with a valid maximum counter reading.
- the sequence shown here for secure counting and storing in an EEPROM 10 only slightly increments the memory segments of the EEPROM 10, since each new counter reading is stored only in one of the memory segments of the EEPROM 10 and thus a small load of the EEPROM 10 takes place with memory operations.
- checking the differences generally results in a check of the memory value, so that in general the operational reliability is increased.
- the EEPROM-based counter reading or a value derived therefrom forms a changing initialization value for a suitable cryptoalgorithm which serves for the authentication and / or encryption of the communication with a transponder 12.
- the inventive method thus represents a pure software solution that can be used for systems in which a high degree of cryptographic security is required. Application areas are in particular transponder 12.
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Computer Hardware Design (AREA)
- Storage Device Security (AREA)
Abstract
Description
Claims
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US12/302,610 US8195955B2 (en) | 2006-05-30 | 2007-05-16 | Method for cryptographic authentication |
EP07735941A EP2030145A2 (de) | 2006-05-30 | 2007-05-16 | Verfahren zu kryptographischen authentikation |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EP06114665 | 2006-05-30 | ||
EP06114665.0 | 2006-05-30 |
Publications (2)
Publication Number | Publication Date |
---|---|
WO2007138518A2 true WO2007138518A2 (de) | 2007-12-06 |
WO2007138518A3 WO2007138518A3 (de) | 2008-02-14 |
Family
ID=38657869
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/IB2007/051877 WO2007138518A2 (de) | 2006-05-30 | 2007-05-16 | Verfahren zu kryptographischen authentikation |
Country Status (5)
Country | Link |
---|---|
US (1) | US8195955B2 (de) |
EP (1) | EP2030145A2 (de) |
KR (1) | KR20090026307A (de) |
CN (1) | CN101454785A (de) |
WO (1) | WO2007138518A2 (de) |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2012161505A1 (en) * | 2011-05-23 | 2012-11-29 | Samsung Electronics Co., Ltd. | Method and apparatus for authenticating a non-volatile memory device |
EP3531615B1 (de) * | 2018-02-21 | 2024-04-10 | EM Microelectronic-Marin SA | Authentifizierungsverfahren eines transponders, der mit einem server kommuniziert |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP1293938A2 (de) * | 2001-09-07 | 2003-03-19 | Philips Corporate Intellectual Property GmbH | Binärzähler mit permutierten Speicherung |
DE10201553A1 (de) * | 2001-09-10 | 2003-03-27 | Philips Corp Intellectual Pty | Anordnung zum Speichern eines Zählerstandes |
Family Cites Families (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPS62202294A (ja) * | 1986-02-28 | 1987-09-05 | Casio Comput Co Ltd | カウンタ装置 |
US5887046A (en) * | 1997-11-20 | 1999-03-23 | Motorola Inc. | Method, system, and device for accumulating data and maintaining the accumulated data |
US6687325B1 (en) * | 1999-06-23 | 2004-02-03 | Intel Corporation | Counter with non-uniform digit base |
US7306158B2 (en) | 2001-07-10 | 2007-12-11 | American Express Travel Related Services Company, Inc. | Clear contactless card |
DE10201554A1 (de) | 2002-01-17 | 2003-08-21 | Philips Intellectual Property | Integrierter Schaltkreis mit Selbsttest-Schaltung |
US7036158B2 (en) * | 2003-11-24 | 2006-05-02 | Bradford William R | Mounting for a seat position actuated toilet bowl light |
US20070046428A1 (en) * | 2005-08-24 | 2007-03-01 | Wayne-Dalton Corporation | System and methods for automatically moving access barriers initiated by mobile transmitter devices |
US20070101152A1 (en) * | 2005-10-17 | 2007-05-03 | Saflink Corporation | Token authentication system |
-
2007
- 2007-05-16 US US12/302,610 patent/US8195955B2/en active Active
- 2007-05-16 WO PCT/IB2007/051877 patent/WO2007138518A2/de active Application Filing
- 2007-05-16 CN CNA2007800198379A patent/CN101454785A/zh active Pending
- 2007-05-16 KR KR1020087031572A patent/KR20090026307A/ko not_active Application Discontinuation
- 2007-05-16 EP EP07735941A patent/EP2030145A2/de not_active Withdrawn
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP1293938A2 (de) * | 2001-09-07 | 2003-03-19 | Philips Corporate Intellectual Property GmbH | Binärzähler mit permutierten Speicherung |
DE10201553A1 (de) * | 2001-09-10 | 2003-03-27 | Philips Corp Intellectual Pty | Anordnung zum Speichern eines Zählerstandes |
Non-Patent Citations (1)
Title |
---|
W RANKL , W EFFING: "Handbuch der Chipkarten" 2002, HANSER VERLAG , MÜNCHEN , XP002459105 Seite 212 - Seite 216 * |
Also Published As
Publication number | Publication date |
---|---|
US20090158055A1 (en) | 2009-06-18 |
EP2030145A2 (de) | 2009-03-04 |
US8195955B2 (en) | 2012-06-05 |
KR20090026307A (ko) | 2009-03-12 |
WO2007138518A3 (de) | 2008-02-14 |
CN101454785A (zh) | 2009-06-10 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
DE10318031A1 (de) | Verfahren zur Sicherstellung der Integrität und Authentizität von Flashware für Steuergeräte | |
EP3254227B1 (de) | Verfahren zum schutz sicherheitsrelevanter daten in einem cachespeicher | |
EP2235598B1 (de) | Feldgerät und verfahren zu dessen betrieb | |
EP2542995A2 (de) | Verfahren zum verifizieren eines speicherblocks eines nicht-flüchtigen speichers | |
WO2007138518A2 (de) | Verfahren zu kryptographischen authentikation | |
EP1892639B1 (de) | Sichere Programmcodeausführung | |
EP1643405A1 (de) | Manipulationsgeschütztes Mikroprozessorsystem und Betriebsverfahren dafür | |
DE10247794B4 (de) | Verwalten eines Fehlversuchszählers in einem tragbaren Datenträger | |
EP1634472B1 (de) | Chipkarte mit wenigstens einer applikation | |
DE102010054446A1 (de) | Portabler Datenträger mit Fehlbedienungszähler | |
DE102005059066A1 (de) | Tragbarer Datenträger | |
DE202013011130U1 (de) | Chipsystem | |
EP2230617B1 (de) | Sperren eines portablen Datenträgers | |
DE102008027456A1 (de) | Verfahren zum Schutz eines tragbaren Datenträgers | |
WO2008077514A1 (de) | Authentisierung portabler datenträger | |
EP1564639B1 (de) | Verfahren zum Betreiben einer Datenträgervorrichtung mit Ablaufdiagnosespeicher | |
DE102004059637A1 (de) | Mobiles elektronisches Gerät mit Zugriffsschutz | |
DE102015223335A1 (de) | Verfahren zum Betreiben eines Mikrocontrollers | |
EP1566776B1 (de) | Verfahren zum sicheren Betrieb eines tragbaren Datenträgers | |
DE102023201559A1 (de) | Vorrichtung und Verfahren zum Bereitstellen geschützter Daten, Mikrocontrollersystem und Sensorsystem | |
EP1750217B1 (de) | Absicherung von Speichereinhalten eines Datenträgers | |
DE102010035314B4 (de) | Verfahren zum Verwalten eines Fehlbedienungszählers in einem tragbaren Datenträger | |
DE10324419A1 (de) | Vorrichtung zum Manipulieren eines Cachespeichers | |
DE102010055237A1 (de) | Verfahren zum geschützten Ausführen einer kryptographischen Berechnung | |
DE4423565C1 (de) | Krypto-Schaltkreis |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
WWE | Wipo information: entry into national phase |
Ref document number: 200780019837.9 Country of ref document: CN |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2007735941 Country of ref document: EP |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 07735941 Country of ref document: EP Kind code of ref document: A2 |
|
WWE | Wipo information: entry into national phase |
Ref document number: 12302610 Country of ref document: US |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2009512725 Country of ref document: JP |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
WWE | Wipo information: entry into national phase |
Ref document number: 10696/DELNP/2008 Country of ref document: IN Ref document number: 1020087031572 Country of ref document: KR |