Abstract:
The invention relates to a method for checking the integrity of a set of data packets received by a receiving communication device from a sending communication device, the data packets of the set being received in unpredictable order. The invention also relates to a communication device implementing a method according to the invention, in particular to a smart card.
Abstract:
The invention relates to a method for protecting a sensitive operation by checking the integrity of at least a subset of the data manipulated by the sensitive operation. Data to be checked are divided into blocks, an intermediate integrity check value being computed for each block, the intermediate integrity check values being computed in random order. The invention also relates to a cryptographic device wherein at least one sensitive operation of the cryptographic device is protected by a method according to the invention.
Abstract:
The present invention concerns a personal token for a mobile terminal in a communication network including an authentication server and a secure server producing derived key material on the basis of a random and a secret key (K) for use in an authentification and key agreement (AKA) procedure in a third-generation mobile system, said personal token including program instructions for re-computing the derived key material (Ck, Ik) on the basis of the received random and the secret key (K) as stored in the personal token, characterized in that the personal token includes program instructions for using a re-computed part of the derived key material in order to interpret the received additional data. This modification of the standard AKA procedure allows the personal token to keep the key material unavailable to the mobile terminal.
Abstract:
Method of authentication in a system comprising two entities communicating between themselves by way of a network, a first entity (CARD) authenticating a second one (SERVER) and data received from said second entity, each entity storing the same secret key K, said first entity receiving a message authenticating code (MAC) and other parameters (RAND, SQN, AMF, ...), the message authenticating code calculation including the key K and said other parameters (RAND, SQN, AMF, ...), the authentication procedure consisting in challenging the received code (MAC) and an expected code (XMAC), the expected code being computed in using the received parameters and the key K stored in said first entity, characterized in that each time the two codes (MAC, XMAC) don't match, the authentication procedure is aborted, a failure counter storing the number of occurrences of abortion.
Abstract:
Method of authentication in a system comprising two entities communicating between themselves by way of a network, a first entity (CARD) authenticating a second one (SERVER) and data received from said second entity, each entity storing the same secret key K, said first entity receiving a message authenticating code (MAC) and other parameters (RAND, SQN, AMF, ...), the message authenticating code calculation including the key K and said other parameters (RAND, SQN, AMF, ...), the authentication procedure consisting in challenging the received code (MAC) and an expected code (XMAC), the expected code being computed in using the received parameters and the key K stored in said first entity, characterized in that each time the two codes (MAC, XMAC) don't match, the authentication procedure is aborted, a failure counter storing the number of occurrences of abortion.