Public key cryptographic method of protecting an electronic chip against fraud
First Claim
1. An asymmetrical cryptographic method of protecting a hard-wired electronic logic chip against fraud in transactions between the electronic chip and an application, including calculating an authentication value V from input parameters in the electronic chip, said method comprising the steps of:
- 1) the chip producing a pseudo-random number r specific to the transaction by means of a serial pseudo-random generator included in the chip, 2) the chip sending the application a parameter x calculated by the application prior to the transaction, linked to the random number r by a mathematical relationship, and stored in a data memory of the chip, 3) the chip calculating a parameter y constituting the whole or a portion of the authentication value V by means of a serial function whose input parameters are at least the random number r specific to the transaction and a private key s belonging to an asymmetrical pair of keys, 4) the chip sending the authentication value V to the application, and 5) the application verifying said authentication value V by means of a verification function whose input parameters consist exclusively of public parameters including at least the public key p.
1 Assignment
0 Petitions
Accused Products
Abstract
An asymmetrical cryptographic method of protecting an electronic chip against fraud in transactions between the electronic chip and an application, involving calculating an authentication value V from input parameters in the electronic chip. The chip produces a pseudo-random number r specific to the transaction by means of a serial pseudo-random generator included in the chip. The chip sends the application a parameter x calculated by the application prior to the transaction, linked to the random number r by a mathematical relationship, and stored in a data memory of the chip. The chip calculates a parameter y constituting the whole or a portion of the authentication value V by means of a serial function whose input parameters are at least the random number r specific to the transaction and a private key s belonging to an asymmetrical pair of keys. The chip sends the authentication value V to the application, and the application verifies the authentication value V by means of a verification function whose input parameters consist exclusively of public parameters including at least the public key p.
-
Citations
33 Claims
-
1. An asymmetrical cryptographic method of protecting a hard-wired electronic logic chip against fraud in transactions between the electronic chip and an application, including calculating an authentication value V from input parameters in the electronic chip, said method comprising the steps of:
-
1) the chip producing a pseudo-random number r specific to the transaction by means of a serial pseudo-random generator included in the chip, 2) the chip sending the application a parameter x calculated by the application prior to the transaction, linked to the random number r by a mathematical relationship, and stored in a data memory of the chip, 3) the chip calculating a parameter y constituting the whole or a portion of the authentication value V by means of a serial function whose input parameters are at least the random number r specific to the transaction and a private key s belonging to an asymmetrical pair of keys, 4) the chip sending the authentication value V to the application, and 5) the application verifying said authentication value V by means of a verification function whose input parameters consist exclusively of public parameters including at least the public key p. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33)
-
Specification