Method and Device to produce a secure hash value
First Claim
1. A method to produce a secure hash value (R) from a plaintext (P), characterised in that said method comprising:
- producing a first result (H) using an hash function of the plaintext (P),obtaining an initial floating value (UO) by converting the first result (H) into a floating number representation of the first value (H),updating a floating value (Un) by executing at least once a Transcendental function (TF) on the Initial floating value (Un−
1),obtaining the secure hash value (R) by mixing the first result (H) with the updated floating value (Un).
1 Assignment
0 Petitions
Accused Products
Abstract
The generation of hash values become popular with the storage of pin code by an authentication server, since the authentication server knows only the result of the hash function and not the pin code itself. Each time an authentication is requested, a hash function is executed on the received pin code and then compared with the stored reference hash value of the initial pin code. In order to improve the security of the hash value, it is proposed a method to produce a secure hash value (R) from a plaintext (P), said method comprising: —producing a first result (H) using an hash function of the plaintext (P), —obtaining an initial floating value (U0) by converting the first result (H) into a floating number representation of the first value (H), —updating a floating value (Un) by executing at least once a Transcendental function (TF) on the initial floating value (Un−1), —obtaining the secure hash value (R) by mixing the first result (H) with the updated floating value (Un).
-
Citations
8 Claims
-
1. A method to produce a secure hash value (R) from a plaintext (P), characterised in that said method comprising:
-
producing a first result (H) using an hash function of the plaintext (P), obtaining an initial floating value (UO) by converting the first result (H) into a floating number representation of the first value (H), updating a floating value (Un) by executing at least once a Transcendental function (TF) on the Initial floating value (Un−
1),obtaining the secure hash value (R) by mixing the first result (H) with the updated floating value (Un). - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
Specification