Method and apparatus to provide authentication and privacy with low complexity devices
First Claim
Patent Images
1. A method of utilizing a radio-frequency identification (RFID) tag comprising:
- receiving a challenge at the RFID tag from a reader;
calculating S=f(s, OE), U=f(u, OO), B=E(n, kE), G=f(A, kO), whereA is a function of the challenge and a private key of the RFID tag;
s and u are random numbers generated by the RFID tag,n is a tag ID,kE and kO are functions of a first public key and a second public key of the reader respectively, andOE and OO are originators, provided by the reader; and
returning S, U, B, and G from the RFID tag to the reader, the returned data including a challenge response and the tag ID, and being unique for each response even when responding to an identical challenge.
5 Assignments
0 Petitions
Accused Products
Abstract
A method and apparatus to provide a cryptographic protocol for secure authentication, privacy, and anonymity. The protocol, in one embodiment, is designed to be implemented in a small number of logic gates, executed quickly on simple devices, and provide military grade security.
-
Citations
11 Claims
-
1. A method of utilizing a radio-frequency identification (RFID) tag comprising:
-
receiving a challenge at the RFID tag from a reader; calculating S=f(s, OE), U=f(u, OO), B=E(n, kE), G=f(A, kO), where A is a function of the challenge and a private key of the RFID tag; s and u are random numbers generated by the RFID tag, n is a tag ID, kE and kO are functions of a first public key and a second public key of the reader respectively, and OE and OO are originators, provided by the reader; and returning S, U, B, and G from the RFID tag to the reader, the returned data including a challenge response and the tag ID, and being unique for each response even when responding to an identical challenge. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A low processing power system (LPPS) comprising:
-
a transceiver configured to transmit and receive data, the transceiver further configured to receive a challenge from a reader system; a crypto logic configured to perform cryptographic calculations, the crypto logic configured for calculating S=f(s, OE), U=f(u, OO), B=E(n, kE), G=f(A, kO), where A is a function of the challenge and a private key of the LPPS, s and u are random numbers generated by the LPPS, n is an identifier of the LPPS, kE and kO are functions of a first public key and a second public key of the reader respectively, and OE and OO are originators, provided by the reader; the transceiver further configured to return S, U, B, and G to the reader system, the returned data including a challenge response and the identifier of the LPPS, and being unique for each response even when responding to an identical challenge. - View Dependent Claims (8, 9, 10)
-
-
11. The system 7, wherein the originators OE and OO are points on an elliptical curve, and wherein originators OE and OO are the same point on the same elliptical curve.
Specification