[go: up one dir, main page]

WO2006067739A3 - Method and device for key generation and proving authenticity - Google Patents

Method and device for key generation and proving authenticity Download PDF

Info

Publication number
WO2006067739A3
WO2006067739A3 PCT/IB2005/054330 IB2005054330W WO2006067739A3 WO 2006067739 A3 WO2006067739 A3 WO 2006067739A3 IB 2005054330 W IB2005054330 W IB 2005054330W WO 2006067739 A3 WO2006067739 A3 WO 2006067739A3
Authority
WO
WIPO (PCT)
Prior art keywords
node
key generation
representative value
random number
computer program
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Ceased
Application number
PCT/IB2005/054330
Other languages
French (fr)
Other versions
WO2006067739A2 (en
Inventor
Pim T Tuyls
Jasper Goseling
Boris Skoric
Geert J Schrijen
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Koninklijke Philips NV
Original Assignee
Koninklijke Philips Electronics NV
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Koninklijke Philips Electronics NV filed Critical Koninklijke Philips Electronics NV
Priority to JP2007547761A priority Critical patent/JP2008526078A/en
Priority to EP05850888A priority patent/EP1832036A2/en
Publication of WO2006067739A2 publication Critical patent/WO2006067739A2/en
Publication of WO2006067739A3 publication Critical patent/WO2006067739A3/en
Anticipated expiration legal-status Critical
Ceased legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F15/00Digital computers in general; Data processing equipment in general
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0866Generation of secret information including derivation or calculation of cryptographic keys or passwords involving user or device identifiers, e.g. serial number, physical or biometrical information, DNA, hand-signature or measurable physical characteristics
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3271Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
    • H04L9/3278Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response using physically unclonable functions [PUF]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/80Wireless
    • H04L2209/805Lightweight hardware, e.g. radio-frequency identification [RFID] or sensor

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)

Abstract

There is provided a method of deriving a key for encrypting or authenticating data sent between first and second nodes, the method comprising determining a representative value from a measurement of a physical identifier of a user; generating a random number; and combining the representative value and the random number to provide an encryption key. The present invention further provides a node, and a verification node as well as a system for authentication of a node by a verification node. Said system applying encryption key generation according to the present invention. The invention further provides a computer program product comprising a representative value of a node for use in authenticating said computer program product.
PCT/IB2005/054330 2004-12-22 2005-12-20 Method and device for key generation and proving authenticity Ceased WO2006067739A2 (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
JP2007547761A JP2008526078A (en) 2004-12-22 2005-12-20 Method and apparatus for key generation and authentication approval
EP05850888A EP1832036A2 (en) 2004-12-22 2005-12-20 Method and device for key generation and proving authenticity

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
EP04106865 2004-12-22
EP04106865.1 2004-12-22
EP05106189.3 2005-07-07
EP05106189 2005-07-07

Publications (2)

Publication Number Publication Date
WO2006067739A2 WO2006067739A2 (en) 2006-06-29
WO2006067739A3 true WO2006067739A3 (en) 2007-03-15

Family

ID=36498944

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/IB2005/054330 Ceased WO2006067739A2 (en) 2004-12-22 2005-12-20 Method and device for key generation and proving authenticity

Country Status (4)

Country Link
EP (1) EP1832036A2 (en)
JP (1) JP2008526078A (en)
KR (1) KR20070095908A (en)
WO (1) WO2006067739A2 (en)

Families Citing this family (19)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1842203A4 (en) 2004-11-12 2011-03-23 Verayo Inc Volatile device keys and applications thereof
KR101366376B1 (en) 2006-01-24 2014-02-24 베라요, 인크. Signal generator based device security
JP2008085567A (en) * 2006-09-27 2008-04-10 Ricoh Co Ltd ENCRYPTION DEVICE, ENCRYPTION METHOD, ENCRYPTION PROGRAM, DECRYPTION DEVICE, DECRYPTION METHOD, DECRYPTION PROGRAM, AND RECORDING MEDIUM
WO2008065596A1 (en) * 2006-11-28 2008-06-05 Koninklijke Philips Electronics N.V. A method of generating arbitrary numbers given a seed
US8782396B2 (en) 2007-09-19 2014-07-15 Verayo, Inc. Authentication with physical unclonable functions
WO2010035202A1 (en) * 2008-09-26 2010-04-01 Koninklijke Philips Electronics N.V. Authenticating a device and a user
WO2010116310A1 (en) * 2009-04-10 2010-10-14 Koninklijke Philips Electronics N.V. Device and user authentication
EP2601769B1 (en) * 2010-08-04 2017-03-01 BlackBerry Limited Method and apparatus for providing continuous authentication based on dynamic personal information
JP5770026B2 (en) * 2011-06-20 2015-08-26 ルネサスエレクトロニクス株式会社 Semiconductor device
WO2013014778A1 (en) 2011-07-27 2013-01-31 富士通株式会社 Encryption processing apparatus and certification method
DE102011081421A1 (en) 2011-08-23 2013-02-28 Siemens Ag System for the secure transmission of data and procedures
FR2988197B1 (en) * 2012-03-19 2015-01-02 Morpho GENERATION AND IDENTITY VERIFICATION METHOD WITH THE UNICITY OF A CARRIER-OBJECT COUPLE
GB2507988A (en) * 2012-11-15 2014-05-21 Univ Belfast Authentication method using physical unclonable functions
DE102013203436A1 (en) * 2013-02-28 2014-08-28 Siemens Aktiengesellschaft Generate a key to provide permission information
US9219722B2 (en) * 2013-12-11 2015-12-22 Globalfoundries Inc. Unclonable ID based chip-to-chip communication
JP6789222B2 (en) * 2014-10-13 2020-11-25 イントリンシツク・イー・デー・ベー・ベー Cryptographic device with non-duplicate physical functions
US10136310B2 (en) * 2015-04-24 2018-11-20 Microsoft Technology Licensing, Llc Secure data transmission
JP6853934B2 (en) * 2017-01-19 2021-04-07 ブリルニクスジャパン株式会社 Solid-state image sensor, solid-state image sensor drive method, and electronic equipment
DE102017118520A1 (en) 2017-08-14 2019-02-14 Huf Hülsbeck & Fürst Gmbh & Co. Kg tire valve

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2000054455A1 (en) * 1999-03-11 2000-09-14 Tecsec, Incorporated Voice and data encryption method using a cryptographic key split combiner

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2000054455A1 (en) * 1999-03-11 2000-09-14 Tecsec, Incorporated Voice and data encryption method using a cryptographic key split combiner

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
BOYEN X: "Reusable Cryptographic Fuzzy Extractors", 11TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'04), ACM PRESS, 29 October 2004 (2004-10-29), Washington, DC, USA, pages 82 - 91, XP002409134, ISBN: 1-58113-961-6, Retrieved from the Internet <URL:http://ai.stanford.edu/~xb//ccs04/> [retrieved on 20061127] *

Also Published As

Publication number Publication date
WO2006067739A2 (en) 2006-06-29
EP1832036A2 (en) 2007-09-12
KR20070095908A (en) 2007-10-01
JP2008526078A (en) 2008-07-17

Similar Documents

Publication Publication Date Title
WO2006067739A3 (en) Method and device for key generation and proving authenticity
CN110022217B (en) Advertisement media service data credible storage system based on block chain
JP2006254423A5 (en)
KR100477645B1 (en) Method of generating serial number and apparatus thereof
Scott Cryptanalysis of an ID-based password authentication scheme using smart cards and fingerprints
CN109508984A (en) It is a kind of that card method is deposited based on certainty common recognition and the block chain electronics of trusted timestamp
JP2002369972A5 (en)
BRPI0519184A2 (en) Methods for authenticating a remote service to a user, and for mutually authenticating a remote service user and a remote service, software architecture, authentication device, and methods for authenticating a second user&#39;s identity and / or credentials to create an authentication device and to authenticate a user to a remote service
US20090252327A1 (en) Combination white box/black box cryptographic processes and apparatus
JP2012165374A5 (en)
CN109615373B (en) An anonymous privacy protection method for delegated supervision in a blockchain system
JP2006148879A5 (en)
WO2009158086A3 (en) Techniques for ensuring authentication and integrity of communications
NZ596935A (en) Generating an encryption/decryption key by comparing data sets received from a central server
WO2004102302A3 (en) Proof of execution using random function
CN107370600A (en) A kind of method for generating core identity digital certificate and identity side digital certificate
DK2150915T3 (en) Security Log protocol
CN109314693A (en) Method and apparatus for authenticating a key requestor
WO2008020991B1 (en) Notarized federated identity management
CN106470103B (en) A method and system for client to send encrypted URL request
WO2002005475A3 (en) Generation and use of digital signatures
CN104579680A (en) Method for safe distribution of seed
FR2826811B1 (en) CRYPTOGRAPHIC AUTHENTICATION PROCESS
CN101777984B (en) Method and system for secure transaction
WO2010057191A3 (en) Storage security using cryptographic splitting

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A2

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BW BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE EG ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KM KN KP KR KZ LC LK LR LS LT LU LV LY MA MD MG MK MN MW MX MZ NA NG NI NO NZ OM PG PH PL PT RO RU SC SD SE SG SK SL SM SY TJ TM TN TR TT TZ UA UG US UZ VC VN YU ZA ZM ZW

AL Designated countries for regional patents

Kind code of ref document: A2

Designated state(s): BW GH GM KE LS MW MZ NA SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IS IT LT LU LV MC NL PL PT RO SE SI SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
WWE Wipo information: entry into national phase

Ref document number: 2005850888

Country of ref document: EP

WWE Wipo information: entry into national phase

Ref document number: 2007547761

Country of ref document: JP

WWE Wipo information: entry into national phase

Ref document number: 1020077013945

Country of ref document: KR

WWE Wipo information: entry into national phase

Ref document number: 200580044128.7

Country of ref document: CN

Ref document number: 2722/CHENP/2007

Country of ref document: IN

NENP Non-entry into the national phase

Ref country code: DE

WWP Wipo information: published in national office

Ref document number: 2005850888

Country of ref document: EP

WWW Wipo information: withdrawn in national office

Ref document number: 2005850888

Country of ref document: EP