Random clock composition-based cryptographic authentication process and locking system
First Claim
Patent Images
1. An attack resistant process for authenticating an access dialog between a first device and a second device in an electronic locking system, the process comprising the steps of:
- at said first device;
generating a random first clocking key;
encrypting said first clocking key to produce an encrypted clocking key;
communicating said encrypted clocking key to said second device; and
using said first clocking key to perform a composition process to generate a first response code;
at said second device;
decrypting said encrypted clocking key to recover a second clocking key; and
using said second clocking key to perform said composition process to generate a second response code; and
at least one of said first and second devices;
comparing said first and second response codes and authenticating said access dialog if said first and second response codes match.
10 Assignments
0 Petitions
Accused Products
Abstract
The first and second devices exchange randomly generated messages that are used in a composition-based encryption/decryption process. At least one of the randomly generated messages is, itself, encrypted before transmission. The composition-based process (a cyclic redundancy code process, preferably enhanced with midcycle non-Galois Field operation) is embedded in both devices and not readily discernable by playback attack.
106 Citations
27 Claims
-
1. An attack resistant process for authenticating an access dialog between a first device and a second device in an electronic locking system, the process comprising the steps of:
-
at said first device; generating a random first clocking key; encrypting said first clocking key to produce an encrypted clocking key; communicating said encrypted clocking key to said second device; and using said first clocking key to perform a composition process to generate a first response code; at said second device; decrypting said encrypted clocking key to recover a second clocking key; and using said second clocking key to perform said composition process to generate a second response code; and at least one of said first and second devices; comparing said first and second response codes and authenticating said access dialog if said first and second response codes match. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. An electronic locking apparatus comprising:
-
a first device comprising; a random number generator for generating an n-bit first clocking key; an encryption system for encrypting said n-bit first clocking key; a first transmitter for transmitting said encrypted n-bit first clocking key; a first receiver; and a first composition processor for generating a first response code based on said n-bit first clocking key; a second device comprising; a second receiver for receiving said encrypted n-bit first clocking key; decryption system for recovering a second clocking key from said received encrypted n-bit first clocking key; and a second composition processor for generating a second response code based on said second clocking key; and an authentication system for comparing said first and second response codes and for unlocking said locking apparatus if said first and second response codes match. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16, 17, 18, 19)
-
-
20. An attack resistant process for authenticating an access dialog between a first device and a second device in an electronic locking system, the process comprising the steps of:
-
at said second device; generating a random message; and communicating said message to said first device; at said first device; generating a random first clocking key; encrypting said first clocking key to produce an encrypted clocking key; communicating said encrypted clocking key to said second device; receiving said message from said second device; using said first clocking key and said message to perform a composition process to generate a first response code; and communicating said first response code to said second device; and at said second device; receiving said first response code; decrypting said encrypted clocking key to recover a second clocking key; using said second clocking key and said message to perform said composition process to generate a second response code; and comparing said first and second response codes and authenticating said access dialog if said first and second response codes match. - View Dependent Claims (21, 22, 23, 24, 25, 26, 27)
-
Specification