AUTHENTICATOR, AUTHENTICATEE AND AUTHENTICATION METHOD
4 Assignments
0 Petitions
Accused Products
Abstract
According to one embodiment, an authenticator which authenticates an authenticatee, which stores first key information (NKey) that is hidden, includes a memory configured to store second key information (HKey) which is hidden, a random number generation module configured to generate random number information, and a data generation module configured to generate a session key (SKey) by using the second key information (HKey) and the random number information. The authenticator is configured such that the second key information (HKey) is generated from the first key information (NKey) but the first key information (NKey) is not generated from the second key information (HKey).
16 Citations
12 Claims
-
1. (canceled)
-
2. A host device capable of performing an authentication process with a memory device, the host device comprising:
-
a decryptor; a selector; a processor; and a comparator, wherein the host device is configured to; receive first data from the memory device; generate, by the decryptor, second data based on the received first data; receive key index data from the memory device; select, by the selector, first key data based on the received key index data; transmit first information data and random number data to the memory device; generate, by the processor, second key data based on the selected first key data and the random number data; generate, by the processor, third data based on the generated second key data and the second data; receive fourth data from the memory device; and compare, by the comparator, the generated third data with received fourth data. - View Dependent Claims (3, 4, 5, 6, 7)
-
-
8. A host device capable of performing an authentication process with a memory device, the host device comprising:
-
a decryptor; a selector; and a processor, wherein the host device is configured to; receive first data from the memory device; generate second data by the decryptor decrypting the received first data; select, by the selector, first key data based on key index data; transmit first information data and random number data to the memory device; and generate second key data by the processor executing an AES (Advanced Encryption Standard) encryption process based on the selected first key data and the random number data. - View Dependent Claims (9, 10, 11, 12)
-
Specification