×

Method of transferring a secret, by the exchange of two certificates between two microcomputers which establish reciprocal authorization

  • US 5,218,637 A
  • Filed: 06/11/1991
  • Issued: 06/08/1993
  • Est. Priority Date: 09/07/1987
  • Status: Expired due to Term
First Claim
Patent Images

1. A method of secured transfer of information S to a first microcomputer belonging to a chip card from a second microcomputer belonging to a security module, the first and second microcomputers establishing reciprocal authentication, this method being characterized in that:

  • a) a first authority is entitled to issue cards which have previously been provided with a first public key constituted by a first modulus n, a first verification exponent v and a first signature exponent s, each card having been defined by an accreditation Bc obtained by signature of a credential Crc, which signature can be verified with the aid of this first public key,b) a second authority is entitled to issue security modules which have also previously been provided with a second public key constituted by a second modulus n'"'"', a second verification exponent v'"'"' and a second signature exponent s'"'"', the security module having been defined by an accreditation Bm obtained by signature of a credential Crm, which signature can be verified with the aid of the second public key,c) finally, the first and second microcomputers have previously publicly agreed to use exponentials in a finite set suitable to establish a common transistory key,d) this method comprises the following steps;

    A) in a first computational stage, realized by the first microcomputer, calculating an exponential X, an optional message M and a calculated signature from the exponential X and the optional message M, this signature being verifiable with the aid of the first public key,B) in a first data transfer, transmitting, from the first microcomputer to the second microcomputer, a first certificate which comprises the credentials of the card Crc, as well as the calculated signature,C) in a second computational stage, realized by the second microcomputer,i) verifying, with the aid of the first public key, whether the certificate received by the second microcomputer has been properly signed by the card, and,ii) if so, calculating the exponential of the exponential X, which constitutes a common transitory key,iii) then calculating an optional message M'"'"' and the second microcomputer'"'"'s own exponential Y,iv) thereafter working out a cryptogram C from the common transitory key K and from the information S to be transmitted, andv) signing the optional message M'"'"', the exponential of the second microcomputer Y and the cryptogram C,D) in a second data transfer, transmitting, from the second microcomputer to the first microcomputer, a second certificate which comprises the credential of the security module Crm as well as the signed exponential of the second microcomputer Y, optional message M'"'"' and cryptogram C,E) in a third computational stage, realized by the first microcomputer,i) verifying with the aid of the second public key, whether the second certificate received from the second microcomputer has been properly signed by the second microcomputer,ii) if so, calculating the exponential of the exponential Y received from the second microcomputer, which gives the common transitory key K; and

    iii) extracting, from the cryptogram C using the common transitory secret K, the information S which is contained in the cryptogram C and which is intended for the first microcomputer,all of the variables herein representing integers.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×