-
公开(公告)号:WO02073374A2
公开(公告)日:2002-09-19
申请号:PCT/DE0200616
申请日:2002-02-20
Applicant: INFINEON TECHNOLOGIES AG , MEYER BERND , HESS ERWIN
Inventor: MEYER BERND , HESS ERWIN
CPC classification number: G07F7/1008 , G06Q20/341 , G06Q20/40975 , H04L9/3066 , H04L9/3234 , H04L9/3263 , H04L9/3271
Abstract: The invention relates to an authentication and identification method that, on the one hand, uses different codes (7, 8) for the prover (1) and the verifier (2) and, on the other hand, forgoes the use of long-number modulo arithmetic by using simple basic components such as arithmetic operations in finite bodies GF(2 ). A private code (7) is stored in the prover (1) so that the prover can be receive, in an encrypted manner, data elements (9), which are generated as random elements, and can itself be used once again as a code for an authentication method of a data set (10) to be transmitted. The verifier (2) receives the authenticator (11) formed in such a manner and verifies it. If the data set is generated by the verifier (2) and sent to the prover (1), the inventive method can serve to identify the prover (1). This method is particularly advantageous in the area of chip cards due to the fact that the space required thereon can be considerably reduced for the implementation of hardware.
Abstract translation: 一方面不同密钥用于认证和识别的方法(7,8),用于证明者(1)和验证(2)分配在另一方面上使用长数模运算的通过使用简单的基本组件,如在算术运算 有限域GF(2n)后。 私钥(7)沉积与证明者(1),从而使作为随机元件产生这些数据项(9)接收加密和再次设置10本身作为密钥使用要发送的数据的鉴权过程。 验证程序(2)接收这样形成(11)所述认证和检查它。 我们从验证器(2)和发送的证明方(1)生成的数据,因此这种方法可用于鉴定证明者(1)。 特别有利的是此方法在智能卡领域中,因为有所需的空间,可以在硬件实现中显著降低。
-
公开(公告)号:BR0108090A
公开(公告)日:2002-10-29
申请号:BR0108090
申请日:2001-01-26
Applicant: INFINEON TECHNOLOGIES AG
Inventor: HESS ERWIN , POCKRANDT WOLFGANG
Abstract: The invention relates to a method and device for mutual authentication of two data processing units. The mutual authentication of two data processing units is normally carried out in two separate successive authentications. A challenge-response method is normally used. A first challenge is transmitted from a first data processing unit (1) to a second data processing unit (2) which sends back a first response. According to the invention, a second response is generated by the first data processing unit (1) and transmitted to the second data processing unit (2).
-
公开(公告)号:DE50214473D1
公开(公告)日:2010-07-15
申请号:DE50214473
申请日:2002-06-04
Applicant: INFINEON TECHNOLOGIES AG
Inventor: GAIL MARKUS , HESS ERWIN , POCKRANDT WOLFGANG , WEDEL ARMIN
-
公开(公告)号:DE102005044885B4
公开(公告)日:2008-03-27
申请号:DE102005044885
申请日:2005-09-20
Applicant: INFINEON TECHNOLOGIES AG
Inventor: DICHTL MARKUS , HESS ERWIN
IPC: H04L9/22
-
公开(公告)号:ES2204117T3
公开(公告)日:2004-04-16
申请号:ES99914397
申请日:1999-02-02
Applicant: INFINEON TECHNOLOGIES AG
Inventor: HESS ERWIN , GEORGIADES JEAN
Abstract: In the case of cryptographic processing with the aid of an elliptic curve, parameters of the elliptic curve are stored in a memory of a computer. These parameters are each of substantial length. The elliptic curve is transformed in order to shorten at least one parameter significantly in length and to ensure that the high security level is unchanged in the process. One parameter is preferably shortened to 1, -1, 2 or -2 with the aid of an algorithm, whereas the other parameters have a length of several 100 bits. The shortening of even one parameter is clearly reflected in the case of devices which have little memory space.
-
公开(公告)号:DE59914864D1
公开(公告)日:2008-10-16
申请号:DE59914864
申请日:1999-09-14
Applicant: INFINEON TECHNOLOGIES AG
Inventor: GAIL MARKUS , POCKRANDT WOLFGANG , WEDEL ARMIN , HESS ERWIN
IPC: G06F12/14 , G07F7/10 , G06F21/02 , G06F21/24 , G06K19/073 , G11C16/10 , H03K19/173
Abstract: A circuit configuration includes at least one nonvolatile, electrically erasable and writable memory area. Each memory area is assigned a nonvolatile, electrically writable and erasable flag memory, which is connected through an address line, a programming line and an authentication line to the assigned memory area, a programming voltage source and a data verification circuit. In the event of an alteration in the content of a memory area, the state of the associated flag memory is changed and, after verification of the programmed memory area content, the flag memory is returned to its basic state.
-
公开(公告)号:DE10130099B4
公开(公告)日:2004-04-08
申请号:DE10130099
申请日:2001-06-21
Applicant: INFINEON TECHNOLOGIES AG
Inventor: GAIL MARKUS , HESS ERWIN , POCKRANDT WOLFGANG , WEDEL ARMIN
-
公开(公告)号:AT245875T
公开(公告)日:2003-08-15
申请号:AT99914397
申请日:1999-02-02
Applicant: INFINEON TECHNOLOGIES AG
Inventor: HESS ERWIN , GEORGIADES JEAN
Abstract: In the case of cryptographic processing with the aid of an elliptic curve, parameters of the elliptic curve are stored in a memory of a computer. These parameters are each of substantial length. The elliptic curve is transformed in order to shorten at least one parameter significantly in length and to ensure that the high security level is unchanged in the process. One parameter is preferably shortened to 1, -1, 2 or -2 with the aid of an algorithm, whereas the other parameters have a length of several 100 bits. The shortening of even one parameter is clearly reflected in the case of devices which have little memory space.
-
公开(公告)号:BR9914136A
公开(公告)日:2001-06-19
申请号:BR9914136
申请日:1999-09-14
Applicant: INFINEON TECHNOLOGIES AG
Inventor: GAIL MARKUS , WEDEL ARMIN , HESS ERWIN , POCKRANDT WOLFGANG
IPC: G06F12/14 , G06F21/02 , G06F21/24 , G06K19/073 , G07F7/10 , G11C16/10 , H03K19/173
Abstract: A circuit configuration includes at least one nonvolatile, electrically erasable and writable memory area. Each memory area is assigned a nonvolatile, electrically writable and erasable flag memory, which is connected through an address line, a programming line and an authentication line to the assigned memory area, a programming voltage source and a data verification circuit. In the event of an alteration in the content of a memory area, the state of the associated flag memory is changed and, after verification of the programmed memory area content, the flag memory is returned to its basic state.
-
公开(公告)号:DE59906358D1
公开(公告)日:2003-08-28
申请号:DE59906358
申请日:1999-02-02
Applicant: INFINEON TECHNOLOGIES AG
Inventor: HESS ERWIN , GEORGIADES JEAN
Abstract: In the case of cryptographic processing with the aid of an elliptic curve, parameters of the elliptic curve are stored in a memory of a computer. These parameters are each of substantial length. The elliptic curve is transformed in order to shorten at least one parameter significantly in length and to ensure that the high security level is unchanged in the process. One parameter is preferably shortened to 1, -1, 2 or -2 with the aid of an algorithm, whereas the other parameters have a length of several 100 bits. The shortening of even one parameter is clearly reflected in the case of devices which have little memory space.
-
-
-
-
-
-
-
-
-