WO1999055991A2 - Authentication method - Google Patents
Authentication method Download PDFInfo
- Publication number
- WO1999055991A2 WO1999055991A2 PCT/DE1999/001234 DE9901234W WO9955991A2 WO 1999055991 A2 WO1999055991 A2 WO 1999055991A2 DE 9901234 W DE9901234 W DE 9901234W WO 9955991 A2 WO9955991 A2 WO 9955991A2
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- instance
- component
- authentication
- mod
- lock
- Prior art date
Links
- 238000000034 method Methods 0.000 title claims abstract description 22
- 230000006870 function Effects 0.000 description 10
- 230000005540 biological transmission Effects 0.000 description 2
- 238000004891 communication Methods 0.000 description 2
- 238000011161 development Methods 0.000 description 2
- 230000018109 developmental process Effects 0.000 description 2
- 238000010586 diagram Methods 0.000 description 2
- 230000001419 dependent effect Effects 0.000 description 1
- 230000006698 induction Effects 0.000 description 1
Classifications
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B60—VEHICLES IN GENERAL
- B60R—VEHICLES, VEHICLE FITTINGS, OR VEHICLE PARTS, NOT OTHERWISE PROVIDED FOR
- B60R25/00—Fittings or systems for preventing or indicating unauthorised use or theft of vehicles
- B60R25/20—Means to switch the anti-theft system on or off
- B60R25/24—Means to switch the anti-theft system on or off using electronic identifiers containing a code not memorised by the user
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00309—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00309—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
- G07C2009/00388—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks code verification carried out according to the challenge/response method
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00309—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
- G07C2009/0042—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks the transmitted data signal containing a code which is changed
- G07C2009/00476—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks the transmitted data signal containing a code which is changed dynamically
- G07C2009/00484—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks the transmitted data signal containing a code which is changed dynamically whereby the code is a variable code
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C2009/00753—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by active electrical keys
- G07C2009/00769—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by active electrical keys with data transmission performed by wireless means
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/84—Vehicles
Definitions
- the invention relates to a method for authentication.
- a method for authentication (also: authentication, authentication) is known from [1].
- An iterated one-way function f is a function that applies to
- the iterative application of the one-way function f returns a sequence of numbers
- a reversal that is to say a backward iteration according to which x m is to be determined from knowledge of Xjn + 1, is not possible at all or only with very great effort.
- An example of such a one-way function is the discrete logarithm modulo of a prime number p.
- a "trapdoor function” is an iterated one-way function which allows its inversion by using a special solution mechanism (said "trapdoor”).
- a second instance e.g. a key
- a first instance e.g. a lock
- the second instance sends a component to the first instance, the first instance in turn with another Component answers and thus authenticates itself to the second instance (mechanism of one-sided authentication).
- authentication methods place high demands on a storage space to be made available.
- the object of the invention is to provide a method for authentication, whereby extremely low demands are made on a storage space to be provided.
- an authentication method which comprises the following steps:
- a first component is transmitted from a first instance to a second instance.
- a second component is determined from the transmitted first component by means of a backward iteration with a special solution mechanism (the trap door described) and transmitted to the first instance.
- the second component in a sequence of values which are determined by the backward iteration or the inverse iterated one-way function, represents a processor component of the first component.
- the described transmissions can optionally be connectionless, e.g. via radio or by induction, or e.g. done connection-oriented via a cable.
- a decisive advantage of the method described is that only a few components have to be kept in the memory, and the memory can therefore be dimensioned accordingly small.
- An iteration that is to say repeated authentication of the second instance with respect to the first instance, is preferably achieved in that after carrying out steps a) to d) the second component is set equal to the first component and the method is continued with step a).
- An embodiment of the method is the implementation of a predetermined action, e.g. starting a vehicle from the first instance after the second instance has successfully authenticated.
- a further development consists in that the iterated one-way function is determined by
- n is an integer
- mod the MODULO operator mod the MODULO operator, xi the first component and X2 the second component.
- Said solution mechanism is that the second instance knows the prime numbers from which the number n is composed.
- the number n is preferably determined by
- the first instance is an electronic lock and the second instance is an electronic key.
- the method can be used in an immobilizer for a vehicle.
- Show it 1 shows a block diagram comprising steps of a method for authentication
- Fig.2 is a sketch that symbolically represents an arrangement of lock and key.
- a block diagram is shown, which comprises steps of a method for authentication.
- a second instance 102 preferably a key
- a first instance 101 preferably a lock.
- the first instance 101 is aware of a component K (cf. step 103).
- This component Kj_ is transmitted to the second instance 102 in a step 105 and the component K is received in a step 106 on the second instance 102.
- a component Ki_ ⁇ _ preceding the component Ki is now determined on the second instance in a step 107 and transmitted to the first instance 101 in a step 108.
- the solution mechanism ("trap door") is used in step 107 in order to calculate the four roots of the first component Ki. Again through this solution mechanism one arrives at the root which is itself a square. So you have that
- Processor component Ki-i of component Ki found. After the transmission (cf. step 108), the component K -i is received by the first instance 101 in a step 109. In a subsequent step 110, it is checked whether the received component Ki-i correctly authenticates the second instance 102. For this purpose, the component Ki-i is used as input for an iterated one-way function and the result is compared with the component Ki. If the result is not the same as the component Ki, a step 111 indicates that the authentication of the second instance 102 to the first instance 101 has failed and that Procedure ended (see step 112). Otherwise, the second instance 102 is successfully authenticated to the first instance 101 in a step 113. In a step 114, the component Ki__ becomes the new component Ki and continues with step 103.
- step 107 the processor component Ki-i is to be determined:
- the number sought is 25 and is transmitted to the first instance as a second component.
- FIG. 2 shows a sketch which symbolically represents an arrangement of lock and key. This arrangement is preferably used in an immobilizer of a motor vehicle.
- a lock 201 requires authentication of a key 202 via a predetermined one
- Communication channel 203 The information transmitted on the communication channel can be found in the flow chart from FIG.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Computer Security & Cryptography (AREA)
- Mechanical Engineering (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Signal Processing (AREA)
- Lock And Its Accessories (AREA)
Abstract
Description
Beschreibungdescription
Verfahren zur AuthentifikationAuthentication procedure
Die Erfindung betrifft ein Verfahren zur Authentifikation.The invention relates to a method for authentication.
Ein Verfahren zur Authentifikation (auch: Authentikation, Authentifizierung), ist aus [1] bekannt.A method for authentication (also: authentication, authentication) is known from [1].
Eine iterierte Einwegfunktion f ist eine Funktion, für die giltAn iterated one-way function f is a function that applies to
x^+1 = f(*k) für k=0,l,2,... (1),x ^ + 1 = f (* k) for k = 0, l, 2, ... (1),
d.h. beginnend bei einem Wert xo liefert die iterative Anwendung der Einwegfunktion f eine Folge von Zahleni.e. starting with a value xo, the iterative application of the one-way function f returns a sequence of numbers
{x0, xi, X2 • • • *k' • • •} (2) •{x 0 , xi, X2 • • • * k '• • •} (2) •
Dabei ist eine Umkehrung, also eine Rückwärtsiteration gemäß derer xm aus Kenntnis von Xjn+1 ermittelt werden soll, gar nicht oder nur mit sehr hohem Aufwand möglich. Ein Beispiel für solch eine Einwegfunktion ist der diskrete Logarithmus modulo einer Primzahl p.A reversal, that is to say a backward iteration according to which x m is to be determined from knowledge of Xjn + 1, is not possible at all or only with very great effort. An example of such a one-way function is the discrete logarithm modulo of a prime number p.
Eine "Trapdoorfunktion" ist eine iterierte Einwegfunktion, die durch Anwendung eines speziellen Lösungsmechanismus (besagter "Trapdoor") ihre Invertierung erlaubt.A "trapdoor function" is an iterated one-way function which allows its inversion by using a special solution mechanism (said "trapdoor").
Wenn sich eine zweite Instanz, z.B. ein Schlüssel, gegenüber einer ersten Instanz, z.B. einem Schloß (Anwendungsbeispiel: Wegfahrsperre eines Fahrzeugs), als authentisch ausweisen soll, sendet die zweite Instanz eine Komponente an die erste Instanz, wobei die erste Instanz wiederum mit einer anderen Komponente antwortet und sich somit gegenüber der zweiten Instanz authentifiziert (Mechanismus der einseitigen Authentifikation) . Generell sind mit Verfahren der Authentifikation hohe Anforderungen an einen bereitzustellenden Speicherplatz verbunden.If a second instance, e.g. a key, is to authenticate itself to a first instance, e.g. a lock (application example: immobilizer of a vehicle), the second instance sends a component to the first instance, the first instance in turn with another Component answers and thus authenticates itself to the second instance (mechanism of one-sided authentication). In general, authentication methods place high demands on a storage space to be made available.
Die Aufgabe der Erfindung besteht darin, ein Verfahren zur Authentifikation anzugeben, wobei extrem geringe Anforderungen an einen bereitzustellenden Speicherplatz gestellt werden.The object of the invention is to provide a method for authentication, whereby extremely low demands are made on a storage space to be provided.
Diese Aufgabe wird gemäß den Merkmalen des unabhängigen Patentanspruchs gelöst.This object is achieved according to the features of the independent claim.
Zur Lösung dieser Aufgabe wird ein Verfahren zur Authentifikation anzugeben, das die folgenden Schritte umfaßt :To solve this task, an authentication method is specified which comprises the following steps:
a) Zu Beginn wird von einer ersten Instanz eine erste Komponente an eine zweite Instanz übermittelt.a) At the beginning, a first component is transmitted from a first instance to a second instance.
b) Von der zweiten Instanz wird anhand einer Rückwärtsiteration mit einem speziellen Lösungsmechanismus (der beschriebenen Trapdoor) aus der übermittelten ersten Komponente eine zweite Komponente ermittelt und an die erste Instanz übermittelt .b) A second component is determined from the transmitted first component by means of a backward iteration with a special solution mechanism (the trap door described) and transmitted to the first instance.
c) Nun wird auf der Seite der ersten Instanz überprüft, ob die übermittelte zweite Komponente die zweite Instanz authentifizieren kann. Dazu wird die zweitec) Now it is checked on the side of the first instance whether the transmitted second component can authenticate the second instance. This will be the second
Komponente als Eingabe für eine iterierte Einwegfunktion verwendet und das Ergebnis mit der ersten Komponente verglichen.Component used as input for an iterated one-way function and the result compared with the first component.
d) Weisen das Ergebnis und die erste Komponente identische Werte auf, dann ist die zweite Instanz gegenüber der ersten Instanz erfolgreich authentifiziert; weisen das Ergebnis und die erste Komponente nicht identische Werte auf, so ist die Authentifikation nicht erfolgreich.d) If the result and the first component have identical values, then the second instance is successful compared to the first instance authenticated; If the result and the first component do not have identical values, the authentication is not successful.
Hierbei sei bemerkt, daß die zweite Komponente in einer Folge von Werten, die durch die Rückwärtsiteration bzw. die dazu inverse iterierte Einwegfunktion bestimmt sind, eine Vorgangerkomponente der ersten Komponente darstellt.It should be noted here that the second component in a sequence of values, which are determined by the backward iteration or the inverse iterated one-way function, represents a processor component of the first component.
Die beschriebenen Übermittlungen können wahlweise verbindungslos, z.B. über Funk oder durch Induktion, oder z.B. verbindungsorientiert über ein Kabel erfolgen.The described transmissions can optionally be connectionless, e.g. via radio or by induction, or e.g. done connection-oriented via a cable.
Ein entscheidender Vorteil des beschriebenen Verfahrens besteht darin, daß nur wenige Komponenten im Speicher gehalten werden müssen, und damit der Speicher entsprechend klein bemessen sein kann.A decisive advantage of the method described is that only a few components have to be kept in the memory, and the memory can therefore be dimensioned accordingly small.
Eine Iteration, also eine wiederholte Authentifikation der zweiten Instanz gegenüber der ersten Instanz, kommt vorzugsweise dadurch zustande, daß nach Durchführung der Schritte a) bis d) die zweite Komponente gleich der ersten Komponente gesetzt wird und das Verfahren mit Schritt a) fortgesetzt wird.An iteration, that is to say repeated authentication of the second instance with respect to the first instance, is preferably achieved in that after carrying out steps a) to d) the second component is set equal to the first component and the method is continued with step a).
Eine Ausgestaltung des Verfahrens ist die Durchführung einer vorgegebenen Aktion, z.B. das Anlassen eines Fahrzeugs, von der ersten Instanz, nachdem sich die zweite Instanz erfolgreich authentifiziert hat.An embodiment of the method is the implementation of a predetermined action, e.g. starting a vehicle from the first instance after the second instance has successfully authenticated.
Eine Weiterbildung besteht darin, daß die iterierte Einwegfunktion bestimmt ist durchA further development consists in that the iterated one-way function is determined by
wobei n eine ganze Zahl, mod den MODULO-Operator, xi die erste Komponente und X2 die zweite Komponente bezeichnen. where n is an integer, mod the MODULO operator, xi the first component and X2 the second component.
Ferner ist die Rückwärtsiteration bestimmt durchFurthermore, the backward iteration is determined by
x2 = ^T mocl n- x 2 = ^ T mocl n -
Besagter Lösungsmechanismus besteht darin, daß die zweite Instanz die Primzahlen kennt, aus denen die Zahl n zusammengesetzt ist. Die Zahl n ist dazu bevorzugt bestimmt durchSaid solution mechanism is that the second instance knows the prime numbers from which the number n is composed. For this purpose, the number n is preferably determined by
n = p q,n = p q,
wobei p und q Primzahlen bezeichnen, die sehr groß sind.where p and q denote prime numbers that are very large.
Damit ist die Bestimmung von p und q bei bloßer Kenntnis der Zahl n nicht mit überschaubarem Aufwand realisierbar. Die "Trapdoor" ist also die Kenntnis von p und q auf der Seite der zweiten Instanz.This means that the determination of p and q with a simple knowledge of the number n cannot be realized with manageable effort. The "trapdoor" is the knowledge of p and q on the side of the second instance.
Bei der Rückwärtsiteration ergeben sich vier Lösungen (siehe Ausführungsbeispiel weiter unten zur Veranschaulichung) , von denen diejenige Lösung ausgewählt wird, die ein Quadrat mod n ist.In the backward iteration there are four solutions (see exemplary embodiment below for illustration), from which the solution is selected which is a square mod n.
Im Rahmen einer zusätzlichen Weiterbildung ist die erste Instanz ein elektronisches Schloß und die zweite Instanz ein elektronischer Schlüssel. Insbesondere kann das Verfahren in einer Wegfahrsperre für ein Fahrzeug eingesetzt werden.As part of an additional training, the first instance is an electronic lock and the second instance is an electronic key. In particular, the method can be used in an immobilizer for a vehicle.
Weiterbildungen der Erfindung ergeben sich auch aus den abhängigen Ansprüchen.Further developments of the invention also result from the dependent claims.
Ausführungsbeispiele der Erfindung werden nachfolgend anhand der Zeichnungen dargestellt und erläutert.Exemplary embodiments of the invention are illustrated and explained below with reference to the drawings.
Es zeigen Fig.l ein Blockdiagramm, das Schritte eines Verfahrens zur Authentifikation umfaßt,Show it 1 shows a block diagram comprising steps of a method for authentication,
Fig.2 eine Skizze, die symbolisch eine Anordnung aus Schloß und Schlüssel darstellt.Fig.2 is a sketch that symbolically represents an arrangement of lock and key.
In Fig.l ist ein Blockdiagramm dargestellt, das Schritte eines Verfahrens zur Authentifikation umfaßt. Dazu soll sich eine zweite Instanz 102, bevorzugt ein Schlüssel, gegenüber einer ersten Instanz 101, bevorzugt ein Schloß, authentifizieren.In Fig.l a block diagram is shown, which comprises steps of a method for authentication. For this purpose, a second instance 102, preferably a key, is to authenticate itself to a first instance 101, preferably a lock.
Die erste Instanz 101 ist in Kenntnis einer Komponente K (vgl. Schritt 103) . Diese Komponente Kj_ wird in einem Schritt 105 an die zweite Instanz 102 übermittelt und auf der zweiten Instanz 102 in einem Schritt 106 die Komponente K empfangen. Nun wird auf der zweiten Instanz in einem Schritt 107 eine der Komponente Ki vorhergehende Komponente Ki_ι_ ermittelt und in einem Schritt 108 an die erste Instanz 101 übermittelt. Dazu wird in dem Schritt 107 der Lösungsmechanismus ("Trapdoor") eingesetzt, um die vier Wurzeln der ersten Komponente Ki zu berechnen. Wiederum über diesen Lösungsmechanismus gelangt man zu derjenigen Wurzel, die selbst wieder ein Quadrat ist. Damit hat man dieThe first instance 101 is aware of a component K (cf. step 103). This component Kj_ is transmitted to the second instance 102 in a step 105 and the component K is received in a step 106 on the second instance 102. A component Ki_ι_ preceding the component Ki is now determined on the second instance in a step 107 and transmitted to the first instance 101 in a step 108. For this purpose, the solution mechanism ("trap door") is used in step 107 in order to calculate the four roots of the first component Ki. Again through this solution mechanism one arrives at the root which is itself a square. So you have that
Vorgangerkomponente Ki-i der Komponente Ki gefunden. Nach der Übermittlung (vgl. Schritt 108) wird die Komponente K -i von der ersten Instanz 101 in einem Schritt 109 empfangen. In einem folgenden Schritt 110 wird überprüft, ob die empfangene Komponente Ki-i die zweite Instanz 102 korrekt authentifiziert. Dazu wird die Komponente Ki-i als Eingabe für eine iterierte Einwegfunktion verwendet und das Ergebnis mit der Komponente Ki verglichen. Ist das Ergebnis nicht gleich der Komponente Ki, so wird in einem Schritt 111 angezeigt, daß die Authentifikation der zweiten Instanz 102 gegenüber der ersten Instanz 101 fehlgeschlagen ist und das Verfahren beendet (vgl. Schritt 112) . Ansonsten wird in einem Schritt 113 die zweite Instanz 102 gegenüber der ersten Instanz 101 erfolgreich authentifiziert. In einem Schritt 114 wird die Komponente Ki__ die neue Komponente Ki und mit Schritt 103 fortgefahren.Processor component Ki-i of component Ki found. After the transmission (cf. step 108), the component K -i is received by the first instance 101 in a step 109. In a subsequent step 110, it is checked whether the received component Ki-i correctly authenticates the second instance 102. For this purpose, the component Ki-i is used as input for an iterated one-way function and the result is compared with the component Ki. If the result is not the same as the component Ki, a step 111 indicates that the authentication of the second instance 102 to the first instance 101 has failed and that Procedure ended (see step 112). Otherwise, the second instance 102 is successfully authenticated to the first instance 101 in a step 113. In a step 114, the component Ki__ becomes the new component Ki and continues with step 103.
Nachfolgend wird, ohne daß dadurch eine Einschränkung auf den geschilderten Fall beabsichtigt ist, anhand eines Beispiels der in Fig.l dargestellte Mechanismus erläutert.In the following, the mechanism shown in Fig.l is explained using an example, without this being intended to limit the case described.
Beispiel :For example:
Es sind die folgenden Größen gegeben:The following sizes are available:
Ki = 9 und n = p • q = 7 • 11 = 77.Ki = 9 and n = p • q = 7 • 11 = 77.
In dem Schritt 107 soll die Vorgangerkomponente Ki-i bestimmt werden:In step 107, the processor component Ki-i is to be determined:
Mit dem Lösungsmechanirαus ("Trapdoor") ergeben sich je zwei Größe für p=7 und q=ll:With the solution mechanism ("trapdoor") there are two sizes for p = 7 and q = ll:
al,2 = J mod 7 (Ia) a l, 2 = J mod 7 (Ia)
= a-i = 3 mod 7 a2 = 4 mod 7= ai = 3 mod 7 a 2 = 4 mod 7
a,4 = ^9 mod 11 (Ib) a , 4 = ^ 9 mod 11 (Ib)
=> a = 3 mod 11 a4 = 8 mod 11 Für p=7 lösen die Zahlen 3 und 4 die Gleichung (la) und für q=ll lösen die Zahlen 3 und 8 die Gleichung (Ib) .=> a = 3 mod 11 a4 = 8 mod 11 For p = 7 the numbers 3 and 4 solve the equation (la) and for q = ll the numbers 3 and 8 solve the equation (Ib).
Es werden nun diejenigen vier Lösungen für Gleichung (I) gesucht, die sowohl eine Lösung der Gleichung (la) als auch eine Lösung der Gleichung (Ib) berücksichtigen:The four solutions for equation (I) are now sought that take into account both a solution of equation (la) and a solution of equation (Ib):
(Ki x -l ± A mod n; (Ki x - l ± A mod n;
i a2 mod pl [ 4 mod 7ia 2 mod pl [4 mod 7
(κ -ι) = \ A4 m ^od qJj = [3 mo.d lJl l = ? mod n- (κ -ι ) = \ A4 m ^ od qJj = [3 mo.d lJl l =? mod n -
Es wird also diejenige Lösung (Ki_ι), mod n gesucht, die gleichzeitig das Ergebnis "3 mod 7" und das Ergebnis "3 mod 11" zur Bedingung hat. Eine solche Lösung wird mit dem chinesischen Restsatz gefunden. Im obigen Beispiel ergeben sich die vier Lösungen zu:The solution (Ki_ι), mod n is sought which has the result "3 mod 7" and the result "3 mod 11" as a condition. Such a solution is found with the Chinese remaining sentence. In the example above, the four solutions are:
(K __), = 3 mod 77;(K __), = 3 mod 77;
(κi-l)3 = 74 mod 77;( κ il) 3 = 74 mod 77;
(κi-l)4 = 5 mod 77.( κ il) 4 = 5 mod 77.
Aus den Lösungen (Ki_ι_)- , wird diejenige Lösung ausgewählt, die ein Quadrat mod n ist. Die Quadrate mod p und mod q sind jeweils berechenbar zu: Quadrate mod 7: {1, 2, 4(=a2)};From the solutions (Ki_ι _) -, the solution that is a square mod n is selected. The squares mod p and mod q can each be calculated to: Squares mod 7: {1, 2, 4 (= a 2 )};
Quadrate mod 11: {1, 4, 9, 5, 3(=a3)}.Squares mod 11: {1, 4, 9, 5, 3 (= a3)}.
Somit ist ersichtlich, daß die Lösung (Ki_]_)4 = 25 sich aus den Lösungen a2 und a3 für die Gleichung (la) und (Ib) ergibt und sowohl a2 als auch a3 selbst Quadrate "mod 7" bzw. "mod 11" darstellen. Also ist auch die Lösung (Ki_ιA = 25 ein Quadrat "mod 77".Thus it can be seen that the solution (Ki _] _) 4 = 25 results from the solutions a 2 and a 3 for the equations (la) and (Ib) and both a 2 and a3 themselves squares "mod 7" or represent "mod 11". So the solution is also (Ki_ιA = 25 a square "mod 77".
Die gesuchte Zahl ist 25 und wird als zweite Komponente an die erste Instanz übermittelt.The number sought is 25 and is transmitted to the first instance as a second component.
In Fig.2 ist eine Skizze dargestellt, die symbolisch eine Anordnung aus Schloß und Schlüssel darstellt. Bevorzugt wird diese Anordnung eingesetzt in einer Wegfahrsperre eines Kraftfahrzeugs. Ein Schloß 201 verlangt eine Authentifikation eines Schlüssels 202 über einen vorgegebenen2 shows a sketch which symbolically represents an arrangement of lock and key. This arrangement is preferably used in an immobilizer of a motor vehicle. A lock 201 requires authentication of a key 202 via a predetermined one
Kommunikationskanal 203. Die auf dem Kommunikationskanal übermittelten Informationen sind dem Flußdiagramm aus Fig.l entnehmbar . Communication channel 203. The information transmitted on the communication channel can be found in the flow chart from FIG.
Literaturverzeichnis :Bibliography :
[1] C. Ruland: Informationssicherheit in Datennetzen, DATACOM-Verlag, Bergheim, 1993, ISBN 3-89238-081-3, Seiten 33-38 und 121-143. [1] C. Ruland: Information security in data networks, DATACOM-Verlag, Bergheim, 1993, ISBN 3-89238-081-3, pages 33-38 and 121-143.
Claims
Priority Applications (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| EP99927720A EP1078139A2 (en) | 1998-04-29 | 1999-04-26 | Authentication method |
| JP2000546123A JP2002513220A (en) | 1998-04-29 | 1999-04-26 | Authentication method |
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| DE19819232 | 1998-04-29 | ||
| DE19819232.0 | 1998-04-29 |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| WO1999055991A2 true WO1999055991A2 (en) | 1999-11-04 |
| WO1999055991A3 WO1999055991A3 (en) | 1999-12-16 |
Family
ID=7866225
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| PCT/DE1999/001234 WO1999055991A2 (en) | 1998-04-29 | 1999-04-26 | Authentication method |
Country Status (3)
| Country | Link |
|---|---|
| EP (1) | EP1078139A2 (en) |
| JP (1) | JP2002513220A (en) |
| WO (1) | WO1999055991A2 (en) |
Cited By (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| EP1172776A3 (en) * | 2000-07-15 | 2002-10-16 | ED Vision (Holdings) Limited | Interactive authentication process |
| WO2002021469A3 (en) * | 2000-09-05 | 2002-11-28 | Ed Vision Holdings Ltd | Interactive authentication process |
| FR2834578A1 (en) * | 2002-01-04 | 2003-07-11 | Somfy | Method of successive authentications of one unit by another, uses value returned by receiver after previous command to allow emitter to compute image that is sent with command and validated by receiver |
Family Cites Families (5)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| DE3122534C1 (en) * | 1981-06-05 | 1983-03-31 | The Grey Lab. Establishment, 9490 Vaduz | Process for creating and checking documents, as well as document and device for carrying out the process |
| GB2102606B (en) * | 1981-06-19 | 1985-01-30 | Nat Res Dev | Apparatus and methods for making payments electronically |
| FR2536928B1 (en) * | 1982-11-30 | 1989-10-06 | France Etat | SYSTEM FOR ENCRYPTING AND DECIPHERING INFORMATION, OF THE TYPE USING A PUBLIC KEY DECRYPTION SYSTEM |
| FR2706210B1 (en) * | 1993-06-08 | 1995-07-21 | Bull Cp8 | Method for authenticating a portable object by an offline terminal, portable object and corresponding terminal. |
| FR2745135B1 (en) * | 1996-02-15 | 1998-09-18 | Cedric Colnot | METHOD FOR AUTHORIZING ACCESS BY A SERVER TO A SERVICE FROM PORTABLE MEMORY CARD TYPE ELECTRONIC MICROCIRCUIT DEVICES |
-
1999
- 1999-04-26 WO PCT/DE1999/001234 patent/WO1999055991A2/en not_active Application Discontinuation
- 1999-04-26 JP JP2000546123A patent/JP2002513220A/en not_active Withdrawn
- 1999-04-26 EP EP99927720A patent/EP1078139A2/en not_active Withdrawn
Cited By (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| EP1172776A3 (en) * | 2000-07-15 | 2002-10-16 | ED Vision (Holdings) Limited | Interactive authentication process |
| WO2002021469A3 (en) * | 2000-09-05 | 2002-11-28 | Ed Vision Holdings Ltd | Interactive authentication process |
| FR2834578A1 (en) * | 2002-01-04 | 2003-07-11 | Somfy | Method of successive authentications of one unit by another, uses value returned by receiver after previous command to allow emitter to compute image that is sent with command and validated by receiver |
Also Published As
| Publication number | Publication date |
|---|---|
| EP1078139A2 (en) | 2001-02-28 |
| JP2002513220A (en) | 2002-05-08 |
| WO1999055991A3 (en) | 1999-12-16 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| DE69920875T2 (en) | Apparatus and method for calculating a digital signature | |
| EP0472714B1 (en) | Process for authenticating a user using a data station | |
| DE69408176T2 (en) | Administrative procedure for secret keys between two chip cards | |
| DE69333068T2 (en) | METHOD FOR EXTENDING THE VALIDITY OF A CRYPTOGRAPHIC CERTIFICATE | |
| DE69613409T2 (en) | Method and device for secure anonymous message transmission and for electronic voting | |
| DE60017845T2 (en) | Minimizing discontinuous transmission in a mobile telecommunication system | |
| DE69934403T2 (en) | METHOD AND DEVICE FOR DIGITAL CHANNELIZATION AND DECANALIZATION | |
| DE69735290T2 (en) | METHOD OF UNSYMMETRIC CRYPTOGRAPHIC COMMUNICATION AND RELATED ARTICLE | |
| DE4242151C1 (en) | Protecting mobile radio, e.g. telephone, against unauthorised use - comparing authentication parameter from input code to stored parameter, only allowing use if they match. | |
| WO2002073374A2 (en) | Authentication method | |
| DE60222033T2 (en) | Method and device for detecting multiple users | |
| DE60207860T2 (en) | METHOD AND DEVICE FOR PROVIDING TIME CONTROL INFORMATION IN A WIRELESS COMMUNICATION SYSTEM | |
| DE102004037801B4 (en) | Method for secure data transmission | |
| DE10110049A1 (en) | Encryption of program data for use in control devices or controllers, involves using decryption key within the control device, to reduce the amount of data to transfer | |
| EP0739108B1 (en) | Method for signing a message using public-key cryptography | |
| WO1999055991A2 (en) | Authentication method | |
| EP2730050B1 (en) | Method for generating and verifying an electronic pseudonymous signature | |
| DE102006013515A1 (en) | Cryptographic method with elliptic curves | |
| DE102004049026B4 (en) | Method for authenticating elements of a group | |
| WO2011110318A1 (en) | Method for authenticating a portable data carrier | |
| WO2000018061A1 (en) | Method for authenticating at least one subscriber during a data exchange | |
| EP2337293B1 (en) | Devices, methods and signals for OFDM encoding | |
| EP1232599B1 (en) | Device for generating a digitally modulated test signal | |
| DE69600143T2 (en) | Process for digital signature with zero knowledge, for producing collision-resistant signatures | |
| DE60300278T2 (en) | Method for transmitting signaling information in a multicarrier radio transmission network |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| AK | Designated states |
Kind code of ref document: A2 Designated state(s): JP US |
|
| AL | Designated countries for regional patents |
Kind code of ref document: A2 Designated state(s): AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE |
|
| AK | Designated states |
Kind code of ref document: A3 Designated state(s): JP US |
|
| AL | Designated countries for regional patents |
Kind code of ref document: A3 Designated state(s): AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE |
|
| 121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
| DFPE | Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101) | ||
| WWE | Wipo information: entry into national phase |
Ref document number: 1999927720 Country of ref document: EP |
|
| WWE | Wipo information: entry into national phase |
Ref document number: 09674218 Country of ref document: US |
|
| WWP | Wipo information: published in national office |
Ref document number: 1999927720 Country of ref document: EP |
|
| WWW | Wipo information: withdrawn in national office |
Ref document number: 1999927720 Country of ref document: EP |