Patent application number | Description | Published |
20090279693 | METHOD AND A DEVICE FOR GENERATING A PSEUDORANDOM STRING - The invention relates to a method of generating a pseudorandom string of terms belonging to a finite body K of cardinal q≧2 intended to be used in a cryptography procedure, said method comprising the iterative calculation of a system (Γ) of m polynomials with n variables belonging to the finite body K. According to the invention, the coefficients of these m polynomials are regenerated at each iteration. The invention also relates to pseudorandom string generator intended to implement this method. | 11-12-2009 |
20090319590 | Method and device for generating a psuedorandom sequence - A method of generating a pseudorandom sequence of terms belonging to a finite body K of cardinal q≧2 intended to be used in a cryptographic procedure, said method comprising the iterative calculation, from an initialization n-tuple X | 12-24-2009 |
20100161988 | METHOD OF AUTHENTICATING AN ENTITY BY A VERIFICATION ENTITY - A method of authenticating an entity by a verification entity, said entities sharing a pair of secret keys X and Y. According to the invention said secret keys X and Y are n×m (n, m>1) binary matrices, said method comprising steps repeated r times (r≧1) of:
| 06-24-2010 |
20100185851 | EFFICIENT AND SECURE CRYPTOGRAPHIC COUPON RELOADING - A system and a method for cryptographic coupon reloading are provided for, wherein a coupon comprises, on one hand, a pseudo-random number r | 07-22-2010 |
20100199090 | Secure Communication Between An Electronic Label And A Reader - The invention relates to a secure communication between an electronic label (A) and a reader (B), in particular for the authentication of the label by the reader, in which: the reader ( | 08-05-2010 |
20100228986 | AUTHENTICATION SYSTEM AND METHOD USING ELECTRONIC TAGS - An authentication method of a prover device by a verifier device by means of cryptographic coupons is provided for, wherein a coupon comprises, on one hand, a pseudo-random number r | 09-09-2010 |
20100281336 | METHOD AND ENTITY FOR PROBABILISTIC SYMMETRICAL ENCRYPTION - The invention relates to a method of probabilistic symmetric encryption of a plaintext message element with the aid of a secret key that can be represented in the form of a matrix. It comprises an operation of encrypting the plaintext message element, with the aid of the matrix parametrized by a random vector, so as to obtain an encrypted message element coupled to the random vector. Furthermore, there is envisaged a step of encoding the plaintext message element as a code word with the aid of an error correcting code having a given correction capacity and a step of adding a noise vector. The error correcting code and the noise vector are adapted so that the Hamming weight of the noise vector is less than or equal to the correction capacity of the correcting code. | 11-04-2010 |
20110249815 | METHOD OF IMPLEMENTING A BLOCK CIPHER ALGORITHM - A method is provided of implementing a block cipher algorithm by a device storing a fixed initialization datum, comprising, before execution of a first iteration of the algorithm in the course of a session, a step of determining a modified initialization datum by way of a determined function supplied as input with the fixed initialization datum and a state value specific to the session, the state value being stored in the device, said modified initialization datum being usable to implement the first iteration of the algorithm. | 10-13-2011 |
20120020476 | Method for Performing a Cryptographic Task in an Electronic Hardware Component - A method and apparatus are provided to perform a cryptographic task on at least one numerical datum in an electronic hardware component. The method includes a step of at least partial use of an encryption function. This encryption function includes a basic encryption function obtained by the addition between an intermediate function arising from composition of a coding function with a first function, and a second function. This method can be applied to the encryption of a datum or to the decryption of a datum. Also, a method is provided for generating a public key and a device able to implement one of these methods. | 01-26-2012 |
20120191971 | METHOD AND DEVICES FOR SECURE COMMUNICATIONS IN A TELECOMMUNICATIONS NETWORK - A secure communications method is provided for use in a telecommunications network, wherein a transaction between an entity A and an entity B of the network comprises: entity A sending an authorization request to an Authorization Server S, in which request the entity A identifies itself and authenticates itself; the entity A declares to the Authorization Server its intention to communicate with a certain entity B; the Authorization Server determines a secret key that it shares with the entity B; the Authorization Server generates a session key and sends it to the entity A; the session key being a one-way function of the secret key and also being a function of an integer (transaction number) allocated to the transaction; the Authorization Server also generates a transaction identifier that is a function depending at least on the transaction number in non-invertible manner. | 07-26-2012 |
20120200386 | METHOD OF MUTUALLY AUTHENTICATING A READER AND A RADIO TAG - A method and apparatus are provided for mutually authenticating a reader and a radio tag. The method includes: a step of the tag sending data to the reader, the data enabling an index to be determined for identifying an authentication coupon of the reader, the index being selected by the tag; a step of the reader obtaining the coupon from the determined index and of the reader sending the coupon to the tag; a step of the tag obtaining an authentication value from the selected index and of the tag verifying that the coupon received from the reader corresponds to the authentication value that is obtained, if the verification is positive, then a step of finalizing the authentication of the tag by the reader; and if the verification is negative, interrupting the mutual authentication method. | 08-09-2012 |
20120321074 | METHOD FOR CONVERSION OF A FIRST ENCRYPTION INTO A SECOND ENCRYPTION - A method for converting, by means of a conversion entity, a first digit into a second digit, the first cipher corresponding to the result of a symmetric probabilistic encryption of an plain message element using a first secret matrix parameterized by a random vector, the second digit corresponding to the result of a symmetric probabilistic encryption of the plain message element using a second secret matrix that is parameterized by the random vector, characterized in that the method includes a step of: calculating the second digit by encrypting the first digit using a secret conversion matrix which is a function of the first and second secret matrices, and which is parameterized by the random vector. | 12-20-2012 |
20130010953 | ENCRYPTION AND DECRYPTION METHOD - A method and apparatus are provided for encrypting a plaintext message element into a ciphertext message element associated with a random vector a first subset of encrypting users. The message element is encoded using an error correcting code and then encrypted by a secret matrix, parameterized by the random vector and with noise added by a noise vector. The method includes obtaining the secret matrix parameterized by the random vector and with noise by adding together user secret matrices specific to each of the encryption users. The user secret matrices are parameterized by the random vectors and having noise added by respective noise vectors specific to the encrypting users. | 01-10-2013 |
20130043982 | METHOD OF IDENTIFYING AND AUTHENTICATING A RADIO TAG BY A READER - A method and apparatus are provided for identifying and authenticating a radio tag by a radio reader. The tag forms part of a set of tags in a radio range of the reader and has selected a time slot from a set of available time slots. The method includes: a step of the reader sending a query message during the selected time slot; and a step of the reader receiving a reply message from the tag that selected the time slot. The reply message includes a random value selected by the tag. The tag stores authentication coupons and the reply from the tag received by the reader during the time slot contains, as a random value selected by the tag, a value that is a function of one of the coupons. | 02-21-2013 |