Method and Apparatus to Provide Authentication and Privacy with Low Complexity Devices
First Claim
Patent Images
1. A method to provide a cryptographic protocol comprising:
- authentication based on a use of a private key of a low-processing-power system (LPPS);
privacy to protect a tag identifier (tag ID) so that an unauthorized party cannot learn the identifier for the tag; and
untraceability to ensure that a different value is returned in response to a challenge, so a reader cannot identify the LPPS by the response.
5 Assignments
0 Petitions
Accused Products
Abstract
A method and apparatus to provide a cryptographic protocol for secure authentication, privacy, and anonymity. The protocol, in one embodiment, is designed to be implemented in a small number of logic gates, executed quickly on simple devices, and provide military grade security.
-
Citations
22 Claims
-
1. A method to provide a cryptographic protocol comprising:
-
authentication based on a use of a private key of a low-processing-power system (LPPS); privacy to protect a tag identifier (tag ID) so that an unauthorized party cannot learn the identifier for the tag; and untraceability to ensure that a different value is returned in response to a challenge, so a reader cannot identify the LPPS by the response. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A method of utilizing an RFID tag
receiving a challenge from a reader; -
calculating S=f(s, OE), U=f(u, OO), B=E(n, kE), G=f(A, kO), where A is a function of the challenge and a private key of the RFID tag; s and u are random numbers generated by the RFID tag. n is the tag ID, kE and ko are functions of a first public key and a second public key of the reader respectively, and OE and Oo are originators, provided by the reader; and returning S, U, B, and G to the reader, the returned data including a challenge response and the tag ID, and being unique for each response even when responding to an identical challenge. - View Dependent Claims (11, 12, 13, 14, 15, 17)
-
-
16. A low processing power system comprising:
-
a transceiver to transmit and receive data, the transceiver to receive a challenge from a reader system; a crypto logic to perform cryptographic calculations, the crypto logic for calculating S=f(s, OE), U=f(u, OO), B=E(n, kE), G=f(A, kO), where A is a function of the challenge and a private key of the LPPS, s and u are random numbers, n is an identifier of the LPPS, kE and ko are functions of a first public key and a second public key of the reader respectively, and OE and Oo are originators, provided by the reader; the transceiver further to return S, U, B, and G to the reader system, the returned data including a challenge response and the tag ID, and being unique for each response even when responding to an identical challenge. - View Dependent Claims (18, 19)
-
-
20. The system 16, wherein the originators OE and Oo are points on an elliptical curve, and wherein originators OE and Oo are the same point on the same elliptical curve.
-
21. A low processing power system (LPPS) designed to be securely interrogated by a reader system, the LPPS comprising:
-
a transceiver to receive a challenge from the reader system; a crypto logic to calculate a response to the challenge, the response comprising a private key of the LPPS; the crypto logic to calculate a return data for return to the reader system, the return data is a combination of the response to the challenge and encryption key, an authentication key, and obscuration key. - View Dependent Claims (22)
-
Specification