首页>
外国专利>
Prover i.e. user, authenticating method for e.g. secured cryptographic support, involves receiving challenge by prover, and calculating response depends on challenge and secret by selecting specific number of operations on encryption
Prover i.e. user, authenticating method for e.g. secured cryptographic support, involves receiving challenge by prover, and calculating response depends on challenge and secret by selecting specific number of operations on encryption
The method involves receiving a challenge (d) by a prover i.e. user, in which a verifier (1) e.g. chip card, knows a value, and calculating a response (r) depending on the challenge and a shared secret (s) by selecting a number between 1 and 20 of operations on encryption. The response is transmitted to the verifier by the prover. A transmission channel e.g. Global system for mobile communication (GSM) radio network, of the challenge to the prover and a transmission channel e.g. Internet protocol, of the response to the verifier, are made different. Independent claims are also included for the following: (1) an authentication system comprising a prover (2) a computer program comprising instructions to perform a method of authenticating a prover (3) a data storage medium comprising instructions to perform a method of authenticating a prover.
展开▼