EP1479189A1 - Cryptographic method using a data flow-symmetrical cryptographic algorithm and use in a smart card - Google Patents
Cryptographic method using a data flow-symmetrical cryptographic algorithm and use in a smart cardInfo
- Publication number
- EP1479189A1 EP1479189A1 EP03717411A EP03717411A EP1479189A1 EP 1479189 A1 EP1479189 A1 EP 1479189A1 EP 03717411 A EP03717411 A EP 03717411A EP 03717411 A EP03717411 A EP 03717411A EP 1479189 A1 EP1479189 A1 EP 1479189A1
- Authority
- EP
- European Patent Office
- Prior art keywords
- block
- authentication
- encryption
- message
- cryptography
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0618—Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
- H04L9/0637—Modes of operation, e.g. cipher block chaining [CBC], electronic codebook [ECB] or Galois/counter mode [GCM]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/065—Encryption by serially and continuously modifying data stream elements, e.g. stream cipher systems, RC4, SEAL or A5/3
- H04L9/0656—Pseudorandom key sequence combined element-for-element with data sequence, e.g. one-time-pad [OTP] or Vernam's cipher
- H04L9/0662—Pseudorandom key sequence combined element-for-element with data sequence, e.g. one-time-pad [OTP] or Vernam's cipher with particular pseudorandom sequence generator
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/50—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees
Definitions
- the present invention relates to a cryptography method for the generation of a pseudo-random number and / or for encryption / decryption by stream and / or for data authentication, using an encryption key K and a symmetric cryptographic algorithm.
- a particularly interesting application relates to chip cards which rely on a remote memory outside, typically in a card reader or in a personal computer.
- the information contained in the remote memory is encrypted and / or authenticated.
- the smart card (or more generally, the portable electronic medium) mainly contains processing means (microprocessor) and minimum necessary storage means.
- the remote memory contains information which can be executable code or data.
- the card When the card needs this information, it must decrypt it and authenticate at least part of this information. It is recalled that the authentication of data makes it possible to verify that the data have not been manipulated and that the sender of this data (which affixes "the authenticator") is indeed the one expected. In the prior art, the cryptographic methods implemented in the card to decrypt and authenticate on the fly the data transmitted by the remote memory are very different. We must therefore first decipher an entire message and then authenticate at least a portion of this message.
- an alternative method of on-the-fly cryptography has been sought which allows decryption by streams and authentication in parallel.
- a cryptography method has been sought using a symmetric flow cryptographic algorithm for encryption / decryption and for authentication.
- the idea underlying the invention is that by implementing the same mechanisms in the two operations, we will allow the parallel processing of the data streams to be decrypted and authenticated.
- the invention therefore relates to a cryptography method for the generation of a pseudo-random number and / or for encryption / decryption and / or for data authentication, using an encryption key K and an algorithm symmetric flow cryptographic, characterized in that it comprises the following stages:
- This process makes it possible to decrypt and authenticate the same message stream in parallel. This saves time and has a much simpler management of the data in the remote memory, recovered by the smart card.
- This method can use for decryption a symmetric cryptographic algorithm primitive (executable code implemented in the smart card) already implemented for authentication, which reduces the memory space necessary for the corresponding executable code, and which also simplifies the setting implementation of the process (only one code to test).
- a symmetric cryptographic algorithm primitive executable code implemented in the smart card
- FIG. 1 represents a flow diagram of the generation of a pseudo-random number and of stream decryption of a message m according to the method of on-the-fly cryptography of the invention
- FIG. 2 represents a flowchart corresponding to authentication by flow of the message m, according to the on-the-fly cryptography method according to the invention.
- the sequence for decrypting the streams mi and mi + i of a message m has been represented according to the cryptography method of the invention, using an encryption block E, of size 1, and an encryption key. K of size greater than 1.
- the encryption block E corresponds to a symmetric cryptographic algorithm per block. This is for example the DES algorithm.
- the size of the block (number of bits entering and leaving the block) corresponds to the length of the mi message block.
- This sequence includes generating a pseudo-random number from the index of message blocks. This index is equal to i for the ith block mi of the message m. It is this pseudo-random number which serves as a mask for the message flow to be deciphered.
- the sequence for generating the pseudo-random number for the message stream mi is as follows:
- This pseudo-random datum obtained from the value i of the index is a function of the cryptographic algorithm used (encryption block or primitive E) and of the encryption key K formed of the three subkeys K1, K2, K3 .
- index can denote both its function and its value.
- index and subkey K2 each have a length of 1/2 bit and the subkey K3 has a length of 1 bit.
- the strength of the symmetric flow algorithm is given by the size of the encryption key it uses. In the example, this force is given by the size k of the subkey K1 used by the encryption block E.
- the cryptographic strength of the cryptography method according to the invention using an encryption key K (K1, K2, K3) in combination with the encryption block E therefore becomes equal to k + 1.
- K (K1, K2, K3)
- the flight cryptography method provides a pseudo-random datum Daiea-i to. from the message stream index.
- This pseudo-random datum D a iéa-i is used to mask the corresponding message flow mi.
- the corresponding decrypted data stream, dci is obtained at output.
- the cryptographic method which has just been described in relation to FIG. 1, thus comprises a method allowing the generation of a pseudo-random number Daié a -i / from a simple index, that is to say in other words the content of a counter incremented with each new message flow.
- the decryption method comprises the sequence of supplying this pseudo-random number, which serves as a mask for the message stream to be decrypted, and which is therefore used in the bit-by-bit exclusive OR operation with this message stream.
- This method can also be used as an encryption method, to encrypt a message, for example if the card wants to record information in the remote memory.
- the pseudo-random number generated according to the method of the invention can be used in the same way as in the decryption method, but to generate a strong random, from the cryptographic point of view, from a weak random , typically a physical hazard.
- physical hazard is meant a hazard provided from physical characteristics, such as an electromagnetic field or the like. These physical hazards are linked to the physical structure of the circuit that generates them. They are often used in smart cards. But these are weak uncertainties on the cryptographic level.
- the cryptography method according to the invention allows three independent applications: the generation of a pseudo-random number D a iéa-i / le encryption / decryption by mi message flow, and the generation of a strong hazard from a weak hazard.
- FIG. 2 represents a typical example of a method of authentication on the fly of the CBC-MAC type.
- the same encryption block E is usually used with the same authentication key K4, except for the last flow which must use either at least one different authentication key and / or a block different encryption.
- the message to be authenticated comprises p message blocks m x to m p .
- an authentication data is obtained This corresponding authentication datum is supplied to the following authentication sequence, in order to perform an exclusive bitwise operation with the following message block m ⁇ + ⁇ .
- the last authentication sequence applied to the last message block m p is different in this that it uses, for example, a different authentication key K5; or that it successively applies the encryption block E with a first key, for example K4, then subsequently with another key, for example K5; or that the encryption block is different; or that it uses a combination of these different variants.
- the last authentication sequence uses the encryption block E with an authentication key K5, different from K4, for the last data stream m p .
- the advantage which one derives from a cryptography method according to the invention is that after the reception of a new message block mi, it is possible to carry out the decryption and the authentication in parallel. Furthermore, it is possible to use only one and the same encryption block E for the two methods, or a limited number of encryption blocks. This saves computation time and working memory space and executable code memory space.
- the invention which has just been described is not limited to the use of DES, as a symmetric flow cryptographic algorithm.
- the advantage of DES is that it requires little computing power and little memory space (executable code).
- This invention applies in all cases where one wants to use a cryptographically weak algorithm, in general for reasons of means of limited processing or reduced available computing time, while having a very secure cryptography process.
- This invention is particularly applicable in the field of smart cards or more generally portable electronic devices using a remote memory, which requires the decryption and authentication of the data contained in this memory.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Storage Device Security (AREA)
Abstract
Description
Claims
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
FR0202226 | 2002-02-21 | ||
FR0202226A FR2836311B1 (en) | 2002-02-21 | 2002-02-21 | CRYPTOGRAPHY METHOD USING A FLOW SYMMETRIC CRYPTOGRAPHIC ALGORITHM AND APPLICATION TO A CHIP CARD |
PCT/FR2003/000532 WO2003071735A1 (en) | 2002-02-21 | 2003-02-18 | Cryptographic method using a data flow-symmetrical cryptographic algorithm and use in a smart card |
Publications (1)
Publication Number | Publication Date |
---|---|
EP1479189A1 true EP1479189A1 (en) | 2004-11-24 |
Family
ID=27636401
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
EP03717411A Withdrawn EP1479189A1 (en) | 2002-02-21 | 2003-02-18 | Cryptographic method using a data flow-symmetrical cryptographic algorithm and use in a smart card |
Country Status (4)
Country | Link |
---|---|
EP (1) | EP1479189A1 (en) |
AU (1) | AU2003222578A1 (en) |
FR (1) | FR2836311B1 (en) |
WO (1) | WO2003071735A1 (en) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
RU2459367C2 (en) * | 2010-07-16 | 2012-08-20 | Федеральное государственное бюджетное образовательное учреждение высшего профессионального образования "Московский государственный технологический университет "СТАНКИН" (ФГБОУ ВПО МГТУ "СТАНКИН") | Method to generate alternating key for unit coding and transfer of coded data |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5757913A (en) * | 1993-04-23 | 1998-05-26 | International Business Machines Corporation | Method and apparatus for data authentication in a data communication environment |
EP0923826B1 (en) * | 1996-09-03 | 2002-10-23 | Siemens Aktiengesellschaft | Device and method for the cryptographic processing of a digital data stream presenting any number of data |
-
2002
- 2002-02-21 FR FR0202226A patent/FR2836311B1/en not_active Expired - Fee Related
-
2003
- 2003-02-18 EP EP03717411A patent/EP1479189A1/en not_active Withdrawn
- 2003-02-18 AU AU2003222578A patent/AU2003222578A1/en not_active Abandoned
- 2003-02-18 WO PCT/FR2003/000532 patent/WO2003071735A1/en not_active Application Discontinuation
Non-Patent Citations (1)
Title |
---|
See references of WO03071735A1 * |
Also Published As
Publication number | Publication date |
---|---|
FR2836311B1 (en) | 2004-05-28 |
FR2836311A1 (en) | 2003-08-22 |
WO2003071735A1 (en) | 2003-08-28 |
AU2003222578A1 (en) | 2003-09-09 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP0800691B1 (en) | Method for implementing a private key communication protocol between two processing devices | |
US5479513A (en) | Fast and secure encryption-decryption method based on chaotic dynamics | |
US20100303229A1 (en) | Modified counter mode encryption | |
US20080084996A1 (en) | Authenticated encryption method and apparatus | |
US20090103726A1 (en) | Dual-mode variable key length cryptography system | |
KR102383829B1 (en) | Cryptographic method for securely exchanging messages and device and system for implementing this method | |
EP3228043B1 (en) | Method of encryption with dynamic diffusion and confusion layers | |
EP1358733A1 (en) | Secure method for secret key cryptographic calculation and component using said method | |
EP2795833B1 (en) | Authentication method between a reader and a radio tag | |
FR2738972A1 (en) | DATA ENABLING METHOD FOR SECURE DATA EXCHANGE PROTOCOL | |
EP3300293A1 (en) | Method for symmetric encryption or decryption by blocks | |
EP1524795B1 (en) | Data encryption in an electronic apparatus with several symmetrical processors | |
FR2949886A1 (en) | METHOD FOR CRYPTOGRAPHIC DATA PROCESSING | |
EP2284748B1 (en) | Countermeasure for the protection of stored data | |
EP3300292A1 (en) | Encryption or decryption method protected against side channel attacks | |
WO2007129197A1 (en) | Cryptographic apparatus and process | |
FR3076151A1 (en) | METHOD OF DETERMINING AN INTEGRITY SUM, COMPUTER PROGRAM AND ELECTRONIC ENTITY | |
EP0756398A1 (en) | System and method for communicating encrypted messages using RSA with modular reduction to provide fast decryption | |
EP1479189A1 (en) | Cryptographic method using a data flow-symmetrical cryptographic algorithm and use in a smart card | |
FR3052280A1 (en) | ||
FR3052279B1 (en) | AUTHENTICATION OF A CARD WITH NON-CONTACT READING | |
US11431478B2 (en) | Encryption and decryption system, encryption device, decryption device and encryption and decryption method | |
CA2288767A1 (en) | Pseudo-random generator based on a hash coding function for cryptographic systems requiring random drawing | |
EP2374240B1 (en) | Method of implementing a block encryption algorithm | |
WO2009068658A1 (en) | Methods and devices for encrypting and decrypting a data message with random secret key |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PUAI | Public reference made under article 153(3) epc to a published international application that has entered the european phase |
Free format text: ORIGINAL CODE: 0009012 |
|
17P | Request for examination filed |
Effective date: 20040921 |
|
AK | Designated contracting states |
Kind code of ref document: A1 Designated state(s): AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IT LI LU MC NL PT SE SI SK TR |
|
AX | Request for extension of the european patent |
Extension state: AL LT LV MK RO |
|
RIN1 | Information on inventor provided before grant (corrected) |
Inventor name: NACCACHE, DAVID Inventor name: POINTCHEVAL, DAVID Inventor name: HANDSCHUH, HELENA |
|
RAP1 | Party data changed (applicant data changed or rights of an application transferred) |
Owner name: GEMALTO SA |
|
GRAC | Information related to communication of intention to grant a patent modified |
Free format text: ORIGINAL CODE: EPIDOSCIGR1 |
|
GRAP | Despatch of communication of intention to grant a patent |
Free format text: ORIGINAL CODE: EPIDOSNIGR1 |
|
GRAS | Grant fee paid |
Free format text: ORIGINAL CODE: EPIDOSNIGR3 |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: THE APPLICATION IS DEEMED TO BE WITHDRAWN |
|
18D | Application deemed to be withdrawn |
Effective date: 20100427 |