Check patentability & draft patents in minutes with Patsnap Eureka AI!

Triple authentication method based on block cipher

A block cipher algorithm and re-authentication technology, which is applied in the field of triple authentication based on block cipher algorithm, can solve problems such as not adapting to application requirements, and achieve the effects of improving security strength, improving security performance, and increasing security strength

Active Publication Date: 2010-11-10
SHANGHAI HUAHONG INTEGRATED CIRCUIT
View PDF0 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, in the process of authentication verification and communication encryption, most non-contact logical encryption cards use stream encryption algorithms based on sequence ciphers. Under the current security requirements, non-contact logical encryption cards with this security strength have been It does not meet the application requirements, and needs a non-contact logical encryption card with higher security strength to fill the current security requirements

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Triple authentication method based on block cipher
  • Triple authentication method based on block cipher
  • Triple authentication method based on block cipher

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] see figure 1 and combine figure 2 As shown, the specific implementation details of the present invention will be illustrated through the triple authentication process of the non-contact logical encryption card using the DES (Data Encryption Standard) algorithm.

[0027] The DES algorithm is a public block cipher algorithm selected by the Federal Information Processing Standard of the US federal government. The entry parameters of the DES algorithm have three Key, Data and Mode. Among them, Key is 8 bytes and 64 bits in total, which is the working key of the DES algorithm; Data is also 8 bytes and 64 bits, which is the data to be encrypted or decrypted; Mode is the working mode of DES, divided into encryption or Decrypt two.

[0028] figure 2 It is a non-contact logical encryption card using an embodiment of the present invention, the non-contact logical encryption card 100 includes:

[0029] RF component 110, used for receiving and sending a radio frequency (RF) ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a triple authentication method based on a block cipher. The triple authentication method comprises the following steps of: generating a random number RB after an authenticated terminal receives a certification instruction, dividing the RB into an RB1 and an RB2, acquiring a Token RB according to the RB and returning the Token RB to an authentication terminal; acquiring the RB, the RB1 and the RB2 after the authentication terminal receives the Token RB, plusing a random number RA of the authentication terminal, forming a TokenAB through a block cipher operation, and transmitting the TokenAB into the authenticated terminal; carrying out the block cipher operation after the authenticated terminal receives the TokenAB to obtain the random number RA or a part or all of RB1 data; forming a TokenBA if the random number RA and a part or all of RB1 data are consistent after comparison, and transmitting the TokenBA into the authentication terminal; and recovering a part or all of RA and a part or all of RB2 by the authentication terminal through the block cipher operation again, and judging the triple certification passes if the a part or all of RA and a part or all of RB2 are consistent after comparison. The invention can improve the authentication of the identity legitimacy of two communication terminals and ensure the data security in the communication process.

Description

technical field [0001] The invention relates to a triple authentication verification method between two communication terminals, in particular to a triple authentication method based on a block cipher algorithm for communication between a non-contact logical encryption card and a card reader. Background technique [0002] With the continuous expansion of the application range of contactless logic encryption cards, the security requirements for contactless logic encryption cards are also getting higher and higher. From the perspective of application, the non-contact logical encryption card not only needs to complete basic operations such as command execution, data reading and writing, and logic operations, but also needs to perform identity verification and identification with the card reader from a security perspective. Ensure data security during communication. In order to meet these requirements, the non-contact logical encryption card must have an authentication function...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/28H04L9/32
Inventor 卢君明
Owner SHANGHAI HUAHONG INTEGRATED CIRCUIT
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More