Challenge-response authentication of a cryptographic device
First Claim
1. A method performed by a first cryptographic device, comprising:
- in a registration mode of operation;
generating a set of challenges, wherein the set of challenges comprises n randomly selected multi-bit values, wherein a given one of the n randomly selected multi-bit values comprises a k-bit randomly selected value, and wherein n and k are security parameters denoting the number of challenges generated by the first cryptographic device and the length of the given challenge generated by the first cryptographic device, respectively;
sending the challenges to a second cryptographic device, the second cryptographic device comprising a key-based cryptographic module that utilizes one or more secret keys;
receiving from the second cryptographic device a set of first responses, each first response corresponding to a respective one of the challenges; and
storing information characterizing the first responses; and
in an authentication mode of operation;
sending a selected one of the challenges to the second cryptographic device;
receiving from the second cryptographic device a second response to the selected challenge; and
authenticating the second cryptographic device utilizing the second response and the stored information;
wherein the first cryptographic device generates the challenges in the registration mode of operation without having knowledge of values of said one or more secret keys of the key-based cryptographic module of the second cryptographic device;
wherein the first responses received from the second cryptographic device are based at least in part on at least one of said one or more secret keys of the key-based cryptographic module of the second cryptographic device; and
wherein the first cryptographic device is configured to authenticate the second cryptographic device in the authentication mode of operation using the second response without having knowledge of the values of said one or more secret keys of the key-based cryptographic module of the second cryptographic device.
18 Assignments
0 Petitions
Accused Products
Abstract
In conjunction with a registration mode of operation, a first cryptographic device in one embodiment sends challenges to a second cryptographic device comprising a symmetric-key cryptographic module or other key-based cryptographic module that utilizes one or more secret keys. The first cryptographic device receives from the second cryptographic device responses to respective ones of the challenges, and stores information characterizing the responses. In conjunction with an authentication mode of operation, the first cryptographic device sends a selected one of the challenges to the second cryptographic device, receives from the second cryptographic device a response to the selected challenge, and authenticates the second cryptographic device utilizing the response to the selected challenge and the stored information. The first cryptographic device generates the challenges and authenticates the second cryptographic device without having knowledge of the one or more secret keys of the key-based cryptographic module of the second cryptographic device.
-
Citations
24 Claims
-
1. A method performed by a first cryptographic device, comprising:
-
in a registration mode of operation; generating a set of challenges, wherein the set of challenges comprises n randomly selected multi-bit values, wherein a given one of the n randomly selected multi-bit values comprises a k-bit randomly selected value, and wherein n and k are security parameters denoting the number of challenges generated by the first cryptographic device and the length of the given challenge generated by the first cryptographic device, respectively; sending the challenges to a second cryptographic device, the second cryptographic device comprising a key-based cryptographic module that utilizes one or more secret keys; receiving from the second cryptographic device a set of first responses, each first response corresponding to a respective one of the challenges; and storing information characterizing the first responses; and in an authentication mode of operation; sending a selected one of the challenges to the second cryptographic device; receiving from the second cryptographic device a second response to the selected challenge; and authenticating the second cryptographic device utilizing the second response and the stored information; wherein the first cryptographic device generates the challenges in the registration mode of operation without having knowledge of values of said one or more secret keys of the key-based cryptographic module of the second cryptographic device; wherein the first responses received from the second cryptographic device are based at least in part on at least one of said one or more secret keys of the key-based cryptographic module of the second cryptographic device; and wherein the first cryptographic device is configured to authenticate the second cryptographic device in the authentication mode of operation using the second response without having knowledge of the values of said one or more secret keys of the key-based cryptographic module of the second cryptographic device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A computer program product comprising a non-transitory processor-readable storage medium having embodied therein one or more software programs, wherein the one or more software programs when executed by a processor of a first cryptographic device cause the first cryptographic device to:
-
in a registration mode of operation; generate a set of challenges, wherein the set of challenges comprises n randomly selected multi-bit values, wherein a given one of the n randomly selected multi-bit values comprises a k-bit randomly selected value, and wherein n and k are security parameters denoting the number of challenges generated by the first cryptographic device and the length of the given challenge generated by the first cryptographic device, respectively; send the challenges to a second cryptographic device, the second cryptographic device comprising a key-based cryptographic module that utilizes one or more secret keys; receive from the second cryptographic device a set of first responses, each first response corresponding to a respective one of the challenges; and store information characterizing the first responses; and in an authentication mode of operation; send a selected one of the challenges to the second cryptographic device; receive from the second cryptographic device a second response to the selected challenge; and authenticate the second cryptographic device utilizing the second response and the stored information; wherein the first cryptographic device generates the challenges in the registration mode of operation without having knowledge of values of said one or more secret keys of the key-based cryptographic module of the second cryptographic device; wherein the first responses received from the second cryptographic device are based at least in part on at least one of said one or more secret keys of the key-based cryptographic module of the second cryptographic device; and wherein the first cryptographic device is configured to authenticate the second cryptographic device in the authentication mode of operation using the second response without having knowledge of the values of said one or more secret keys of the key-based cryptographic module of the second cryptographic device.
-
-
14. An apparatus comprising:
-
a first cryptographic device comprising a processor coupled to a memory; the first cryptographic device being configured; in a registration mode of operation; to generate a set of challenges, wherein the set of challenges comprises n randomly selected multi-bit values, wherein a given one of the n randomly selected multi-bit values comprises a k-bit randomly selected value, and wherein n and k are security parameters denoting the number of challenges generated by the first cryptographic device and the length of the given challenge generated by the first cryptographic device, respectively; to send the challenges to a second cryptographic device, the second cryptographic device comprising a key-based cryptographic module that utilizes one or more secret keys; to receive from the second cryptographic device a set of first responses, each first response corresponding to a respective one of the challenges; to store in the memory information characterizing the first responses; and in an authentication mode of operation; to send a selected one of the challenges to the second cryptographic device; to receive from the second cryptographic device a second response to the selected challenge; and to authenticate the second cryptographic device utilizing the second response and the stored information; wherein the first cryptographic device is configured under control of the processor to generate the challenges in the registration mode of operation without having knowledge of values of said one or more secret keys of the key-based cryptographic module of the second cryptographic device; wherein the first responses received from the second cryptographic device are based at least in part on at least one of said one or more secret keys of the key-based cryptographic module of the second cryptographic device; and wherein the first cryptographic device is configured under control of the processor to authenticate the second cryptographic device in the authentication mode of operation using the second response without having knowledge of the values of said one or more secret keys of the key-based cryptographic module of the second cryptographic device.
-
-
15. A method performed by a first cryptographic device, comprising:
-
in a registration mode of operation; generating a plurality of challenge-response pairs, wherein the plurality of challenge-response pairs comprises n randomly selected multi-bit challenge values, wherein a given one of the n randomly selected multi-bit challenge values comprises a k-bit randomly selected challenge value, and wherein n and k are security parameters denoting the number of challenges generated by the first cryptographic device and the length of the given challenge generated by the first cryptographic device, respectively; sending the challenge-response pairs to a second cryptographic device, the second cryptographic device comprising a key-based cryptographic module that utilizes one or more secret keys; in an authentication mode of operation; sending a selected challenge of one of the challenge-response pairs to the second cryptographic device; receiving from the second cryptographic device a response to the selected challenge; and authenticating the second cryptographic device utilizing the response to the selected challenge; wherein the first cryptographic device generates the challenge-response pairs in the registration mode of operation without having knowledge of values of said one or more secret keys of the key-based cryptographic module of the second cryptographic device; wherein the response received from the second cryptographic device is based at least in part on at least one of said one or more secret keys of the key-based cryptographic module of the second cryptographic device; and wherein the first cryptographic device authenticates the second cryptographic device in the authentication mode of operation using the response without having knowledge of the values of said one or more secret keys of the key-based cryptographic module of the second cryptographic device. - View Dependent Claims (16)
-
-
17. A computer program product comprising a non-transitory processor-readable storage medium having embodied therein one or more software programs, wherein the one or more software programs when executed by a processor of a first cryptographic device cause the first cryptographic device to:
-
in a registration mode of operation; generate a plurality of challenge-response pairs, wherein the plurality of challenge-response pairs comprises n randomly selected multi-bit challenge values, wherein a given one of the n randomly selected multi-bit challenge values comprises a k-bit randomly selected challenge value, and wherein n and k are security parameters denoting the number of challenges generated by the first cryptographic device and the length of the given challenge generated by the first cryptographic device, respectively; send the challenge-response pairs to a second cryptographic device, the second cryptographic device comprising a key-based cryptographic module that utilizes one or more secret keys; in an authentication mode of operation; send a selected challenge of one of the challenge-response pairs to the second cryptographic device; receive from the second cryptographic device a response to the selected challenge; and authenticate the second cryptographic device utilizing the response to the selected challenge; wherein the first cryptographic device generates the challenge-response pairs in the registration mode of operation without having knowledge of values of said one or more secret keys of the key-based cryptographic module of the second cryptographic device; wherein the response received from the second cryptographic device is based at least in part on at least one of said one or more secret keys of the key-based cryptographic module of the second cryptographic device; and wherein the first cryptographic device authenticates the second cryptographic device in the authentication mode of operation using the response without having knowledge of the values of said one or more secret keys of the key-based cryptographic module of the second cryptographic device.
-
-
18. An apparatus comprising:
-
a first cryptographic device comprising a processor coupled to a memory; the first cryptographic device being configured; in a registration mode of operation; to generate a plurality of challenge-response pairs, wherein the plurality of challenge-response pairs comprises n randomly selected multi-bit challenge values, wherein a given one of the n randomly selected multi-bit challenge values comprises a k-bit randomly selected challenge value, and wherein n and k are security parameters denoting the number of challenges generated by the first cryptographic device and the length of the given challenge generated by the first cryptographic device, respectively; and to send the challenge-response pairs to a second cryptographic device, the second cryptographic device comprising a key-based cryptographic module that utilizes one or more secret keys; and in an authentication mode of operation; to send a selected challenge of one of the challenge-response pairs to the second cryptographic device; to receive from the second cryptographic device a response to the selected challenge; and to authenticate the second cryptographic device utilizing the response to the selected challenge; wherein the first cryptographic device is configured under control of the processor to generate the challenge-response pairs in the registration mode of operation without having knowledge of values of said one or more secret keys of the key-based cryptographic module of the second cryptographic device; wherein the response received from the second cryptographic device is based at least in part on at least one of said one or more secret keys of the key-based cryptographic module of the second cryptographic device; and wherein the first cryptographic device is configured under control of the processor to authenticate the second cryptographic device in the authentication mode of operation using the response without having knowledge of the values of said one or more secret keys of the key-based cryptographic module of the second cryptographic device.
-
-
19. A method performed by a first cryptographic device, comprising:
-
in a registration mode of operation; receiving a plurality of challenge-response pairs from a second cryptographic device, wherein the plurality of challenge-response pairs comprises n randomly selected multi-bit challenge values, wherein a given one of the n randomly selected multi-bit challenge values comprises a k-bit randomly selected challenge value, and wherein n and k are security parameters denoting the number of challenges and the length of the given challenge, respectively; and storing the responses from the received challenge-response pairs in encrypted form utilizing one or more secret keys of a key-based cryptographic module of the first cryptographic device; and in an authentication mode of operation; receiving a selected challenge of one of the challenge-response pairs from the second cryptographic device; and sending to the second cryptographic device a response to the selected challenge, the response being generated at least in part by decrypting the corresponding encrypted response using said one or more secret keys; wherein the first cryptographic device is authenticated by the second cryptographic device utilizing the response to the selected challenge without the second cryptographic device having knowledge of values of said one or more secret keys of the key-based cryptographic module of the first cryptographic device. - View Dependent Claims (20)
-
-
21. A computer program product comprising a non-transitory processor-readable storage medium having embodied therein one or more software programs, wherein the one or more software programs when executed by a processor of a first cryptographic device cause the first cryptographic device to:
-
in a registration mode of operation; receive a plurality of challenge-response pairs from a second cryptographic device, wherein the plurality of challenge-response pairs comprises n randomly selected multi-bit challenge values, wherein a given one of the n randomly selected multi-bit challenge values comprises a k-bit randomly selected challenge value, and wherein n and k are security parameters denoting the number of challenges and the length of the given challenge, respectively; and store the responses from the received challenge-response pairs in encrypted form utilizing one or more secret keys of a key-based cryptographic module of the first cryptographic device; and in an authentication mode of operation; receive a selected challenge of one of the challenge-response pairs from the second cryptographic device; and send to the second cryptographic device a response to the selected challenge, the response being generated at least in part by decrypting the corresponding encrypted response using said one or more secret keys; wherein the first cryptographic device is authenticated by the second cryptographic device utilizing the response to the selected challenge without the second cryptographic device having knowledge of values of said one or more secret keys of the key-based cryptographic module of the first cryptographic device.
-
-
22. An apparatus comprising:
-
a first cryptographic device comprising a key-based cryptographic module that utilizes one or more secret keys; the first cryptographic device being configured; in a registration mode of operation; to receive a plurality of challenge-response pairs from a second cryptographic device, wherein the plurality of challenge-response pairs comprises n randomly selected multi-bit challenge values, wherein a given one of the n randomly selected multi-bit challenge values comprises a k-bit randomly selected challenge value, and wherein n and k are security parameters denoting the number of challenges and the length of the given challenge, respectively; and to store the responses from the received challenge-response pairs in encrypted form utilizing said one or more secret keys of the key-based cryptographic module; and in an authentication mode of operation; to receive a selected challenge of one of the challenge-response pairs from the second cryptographic device; and to send to the second cryptographic device a response to the selected challenge, the response being generated at least in part by decrypting the corresponding encrypted response using said one or more secret keys; wherein the first cryptographic device is authenticated by the second cryptographic device utilizing the response to the selected challenge without the second cryptographic device having knowledge of values of said one or more secret keys of the key-based cryptographic module of the first cryptographic device. - View Dependent Claims (23, 24)
-
Specification