Nothing Special   »   [go: up one dir, main page]

WO2006067739A3 - Method and device for key generation and proving authenticity - Google Patents

Method and device for key generation and proving authenticity Download PDF

Info

Publication number
WO2006067739A3
WO2006067739A3 PCT/IB2005/054330 IB2005054330W WO2006067739A3 WO 2006067739 A3 WO2006067739 A3 WO 2006067739A3 IB 2005054330 W IB2005054330 W IB 2005054330W WO 2006067739 A3 WO2006067739 A3 WO 2006067739A3
Authority
WO
WIPO (PCT)
Prior art keywords
node
key generation
representative value
random number
computer program
Prior art date
Application number
PCT/IB2005/054330
Other languages
French (fr)
Other versions
WO2006067739A2 (en
Inventor
Pim T Tuyls
Jasper Goseling
Boris Skoric
Geert J Schrijen
Original Assignee
Koninkl Philips Electronics Nv
Pim T Tuyls
Jasper Goseling
Boris Skoric
Geert J Schrijen
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Koninkl Philips Electronics Nv, Pim T Tuyls, Jasper Goseling, Boris Skoric, Geert J Schrijen filed Critical Koninkl Philips Electronics Nv
Priority to JP2007547761A priority Critical patent/JP2008526078A/en
Priority to EP05850888A priority patent/EP1832036A2/en
Publication of WO2006067739A2 publication Critical patent/WO2006067739A2/en
Publication of WO2006067739A3 publication Critical patent/WO2006067739A3/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F15/00Digital computers in general; Data processing equipment in general
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0866Generation of secret information including derivation or calculation of cryptographic keys or passwords involving user or device identifiers, e.g. serial number, physical or biometrical information, DNA, hand-signature or measurable physical characteristics
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3271Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
    • H04L9/3278Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response using physically unclonable functions [PUF]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/80Wireless
    • H04L2209/805Lightweight hardware, e.g. radio-frequency identification [RFID] or sensor

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)

Abstract

There is provided a method of deriving a key for encrypting or authenticating data sent between first and second nodes, the method comprising determining a representative value from a measurement of a physical identifier of a user; generating a random number; and combining the representative value and the random number to provide an encryption key. The present invention further provides a node, and a verification node as well as a system for authentication of a node by a verification node. Said system applying encryption key generation according to the present invention. The invention further provides a computer program product comprising a representative value of a node for use in authenticating said computer program product.
PCT/IB2005/054330 2004-12-22 2005-12-20 Method and device for key generation and proving authenticity WO2006067739A2 (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
JP2007547761A JP2008526078A (en) 2004-12-22 2005-12-20 Method and apparatus for key generation and authentication approval
EP05850888A EP1832036A2 (en) 2004-12-22 2005-12-20 Method and device for key generation and proving authenticity

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
EP04106865 2004-12-22
EP04106865.1 2004-12-22
EP05106189 2005-07-07
EP05106189.3 2005-07-07

Publications (2)

Publication Number Publication Date
WO2006067739A2 WO2006067739A2 (en) 2006-06-29
WO2006067739A3 true WO2006067739A3 (en) 2007-03-15

Family

ID=36498944

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/IB2005/054330 WO2006067739A2 (en) 2004-12-22 2005-12-20 Method and device for key generation and proving authenticity

Country Status (4)

Country Link
EP (1) EP1832036A2 (en)
JP (1) JP2008526078A (en)
KR (1) KR20070095908A (en)
WO (1) WO2006067739A2 (en)

Families Citing this family (19)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1842203A4 (en) 2004-11-12 2011-03-23 Verayo Inc Volatile device keys and applications thereof
KR101366376B1 (en) 2006-01-24 2014-02-24 베라요, 인크. Signal generator based device security
JP2008085567A (en) * 2006-09-27 2008-04-10 Ricoh Co Ltd Encrypting device, method and program, decrypting device, method and program, and recording medium
DE602007005166D1 (en) 2006-11-28 2010-04-15 Koninkl Philips Electronics Nv NER STARTING NUMBER
US8782396B2 (en) 2007-09-19 2014-07-15 Verayo, Inc. Authentication with physical unclonable functions
US9158906B2 (en) 2008-09-26 2015-10-13 Koninklijke Philips N.V. Authenticating a device and a user
US9031231B2 (en) 2009-04-10 2015-05-12 Koninklijke Philips N.V. Device and user authentication
US9342677B2 (en) 2010-08-04 2016-05-17 Blackberry Limited Method and apparatus to provide continuous authentication based on dynamic personal information
JP5770026B2 (en) * 2011-06-20 2015-08-26 ルネサスエレクトロニクス株式会社 Semiconductor device
JP5700128B2 (en) 2011-07-27 2015-04-15 富士通株式会社 Encryption processing apparatus and authentication method
DE102011081421A1 (en) 2011-08-23 2013-02-28 Siemens Ag System for the secure transmission of data and procedures
FR2988197B1 (en) * 2012-03-19 2015-01-02 Morpho GENERATION AND IDENTITY VERIFICATION METHOD WITH THE UNICITY OF A CARRIER-OBJECT COUPLE
GB2507988A (en) * 2012-11-15 2014-05-21 Univ Belfast Authentication method using physical unclonable functions
DE102013203436A1 (en) * 2013-02-28 2014-08-28 Siemens Aktiengesellschaft Generate a key to provide permission information
US9219722B2 (en) * 2013-12-11 2015-12-22 Globalfoundries Inc. Unclonable ID based chip-to-chip communication
JP6789222B2 (en) * 2014-10-13 2020-11-25 イントリンシツク・イー・デー・ベー・ベー Cryptographic device with non-duplicate physical functions
US10136310B2 (en) * 2015-04-24 2018-11-20 Microsoft Technology Licensing, Llc Secure data transmission
JP6853934B2 (en) * 2017-01-19 2021-04-07 ブリルニクスジャパン株式会社 Solid-state image sensor, solid-state image sensor drive method, and electronic equipment
DE102017118520A1 (en) 2017-08-14 2019-02-14 Huf Hülsbeck & Fürst Gmbh & Co. Kg tire valve

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2000054455A1 (en) * 1999-03-11 2000-09-14 Tecsec, Incorporated Voice and data encryption method using a cryptographic key split combiner

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2000054455A1 (en) * 1999-03-11 2000-09-14 Tecsec, Incorporated Voice and data encryption method using a cryptographic key split combiner

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
BOYEN X: "Reusable Cryptographic Fuzzy Extractors", 11TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'04), ACM PRESS, 29 October 2004 (2004-10-29), Washington, DC, USA, pages 82 - 91, XP002409134, ISBN: 1-58113-961-6, Retrieved from the Internet <URL:http://ai.stanford.edu/~xb//ccs04/> [retrieved on 20061127] *

Also Published As

Publication number Publication date
EP1832036A2 (en) 2007-09-12
JP2008526078A (en) 2008-07-17
WO2006067739A2 (en) 2006-06-29
KR20070095908A (en) 2007-10-01

Similar Documents

Publication Publication Date Title
WO2006067739A3 (en) Method and device for key generation and proving authenticity
Feng et al. AAoT: Lightweight attestation and authentication of low-resource things in IoT and CPS
CN110022217B (en) Advertisement media service data credible storage system based on block chain
CN105723651B (en) Verifiable device
CN104393999B (en) Authentication method and system of a kind of main equipment to its slave
JP2006254423A5 (en)
KR100477645B1 (en) Method of generating serial number and apparatus thereof
JP2002369972A5 (en)
US20090252327A1 (en) Combination white box/black box cryptographic processes and apparatus
CN103560887B (en) Intelligent terminal remote attestation method and system
JP2012165374A5 (en)
CN101022337A (en) Network identification card realizing method
CA2560570A1 (en) Authentication between device and portable storage
WO2007069190A3 (en) On-chip estimation of key-extraction parameters for physical tokens
CN109615373B (en) Entrustable supervision anonymous privacy protection method in block chain system
JP2006148879A5 (en)
WO2009158086A3 (en) Techniques for ensuring authentication and integrity of communications
JP2007511810A (en) Proof of execution using random number functions
NZ596935A (en) Generating an encryption/decryption key by comparing data sets received from a central server
CY1111944T1 (en) SAFE CONNECTION PROTOCOL
WO2008020991B1 (en) Notarized federated identity management
CN106059775A (en) Method for implementing CFL centralized management mode
WO2002005475A3 (en) Generation and use of digital signatures
CN114443754A (en) Block chain-based federated learning processing method, device, system and medium
CN101777984B (en) Method and system for secure transaction

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A2

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BW BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE EG ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KM KN KP KR KZ LC LK LR LS LT LU LV LY MA MD MG MK MN MW MX MZ NA NG NI NO NZ OM PG PH PL PT RO RU SC SD SE SG SK SL SM SY TJ TM TN TR TT TZ UA UG US UZ VC VN YU ZA ZM ZW

AL Designated countries for regional patents

Kind code of ref document: A2

Designated state(s): BW GH GM KE LS MW MZ NA SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IS IT LT LU LV MC NL PL PT RO SE SI SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
WWE Wipo information: entry into national phase

Ref document number: 2005850888

Country of ref document: EP

WWE Wipo information: entry into national phase

Ref document number: 2007547761

Country of ref document: JP

WWE Wipo information: entry into national phase

Ref document number: 1020077013945

Country of ref document: KR

WWE Wipo information: entry into national phase

Ref document number: 200580044128.7

Country of ref document: CN

Ref document number: 2722/CHENP/2007

Country of ref document: IN

NENP Non-entry into the national phase

Ref country code: DE

WWP Wipo information: published in national office

Ref document number: 2005850888

Country of ref document: EP

WWW Wipo information: withdrawn in national office

Ref document number: 2005850888

Country of ref document: EP