Method and apparatus to provide public key authentication with low complexity devices
First Claim
1. A radio-frequency identification (RFID) tag, comprising:
- a memory for storing a tag identifier and a random number table; and
a processing device, responsive to energy from a RFID tag reader, configured to;
receive an initialization message instructing the RFID tag to initialize, the message comprising an identifier;
store the identifier in the memory;
select a random number as a private key;
generate an acknowledgement response to the message;
receive a request to compute a public key using elliptic cryptography, wherein the request comprises a value representing a point on an elliptical curve E over a finite field F;
compute the public key using the private key and the point on the elliptical curve E over the finite field F;
generate a response to the request, the response comprising the computed public key and facilitating certification of the RFID tag and the computed public key associated with the RFID tag; and
in response to challenges issued by the RFID tag reader and generated using the value and another random number, send challenge responses to the RFID tag reader, the challenge responses generated using the private key and the challenge, wherein the computed public key facilitating authentication of the challenge responses.
7 Assignments
0 Petitions
Accused Products
Abstract
A method and apparatus to authenticate limited processing-power systems (LPPS) using elliptic cryptography within a well known elliptic curve E, over a well known finite field F ((E(F)). The apparatus comprises a random number generator to choose a random value b, of a similar order of magnitude to the order of E(F). The apparatus further comprises a challenge calculator to calculate a value C=bP and send the challenge to the LPPS, where P is a point on the elliptic curve E(F) which was used as a basis for generating a private key, a, for the LPPS. The apparatus further comprising an RFID reader to receive a challenge response, R=aC=abP from the LPPS, and a crypto calculator to calculate bQ, based on a public key, Q, of the LPPS. The apparatus further comprising a comparison logic to authenticate the LPPS if bQ=aC=abP.
24 Citations
21 Claims
-
1. A radio-frequency identification (RFID) tag, comprising:
-
a memory for storing a tag identifier and a random number table; and a processing device, responsive to energy from a RFID tag reader, configured to; receive an initialization message instructing the RFID tag to initialize, the message comprising an identifier; store the identifier in the memory; select a random number as a private key; generate an acknowledgement response to the message; receive a request to compute a public key using elliptic cryptography, wherein the request comprises a value representing a point on an elliptical curve E over a finite field F; compute the public key using the private key and the point on the elliptical curve E over the finite field F; generate a response to the request, the response comprising the computed public key and facilitating certification of the RFID tag and the computed public key associated with the RFID tag; and in response to challenges issued by the RFID tag reader and generated using the value and another random number, send challenge responses to the RFID tag reader, the challenge responses generated using the private key and the challenge, wherein the computed public key facilitating authentication of the challenge responses. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A method, comprising:
-
receiving an initialization message at a processing device, the message comprising a tag identifier and instructions to initialize the processing device; storing the identifier in a memory; selecting a random number as a private key; generating an acknowledgement response to the message; receiving a request to compute a public key using elliptic cryptography, wherein the request comprises a value representing a point on an elliptical curve E over a finite field F; computing the public key using the private key and the point on the elliptical curve E over the finite field F; generating a response to the request, the response comprising the computed public key and facilitating certification of the processing device and the computed public key associated with the processing device; and in response to challenges issued by a reader of the processing device and generated using the value and another random number, sending challenge responses to the reader, the challenge responses generated using the private key and the challenge, wherein the computed public key facilitating authentication of the challenge responses. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19, 20, 21)
-
Specification