摘要:
Method for protecting data against power analysis attacks comprising at least a first phase of executing a cryptographic operation OP for ciphering the data in corresponding encipher data through a secret key ESK; the method comprises at least a second phase of executing an additional cryptographic operation AOP for ciphering additional data in corresponding encipher additional data, an execution of the first phase and the second phase being undistinguishable by the power analysis attacks. A plurality of secret parameters are randomly generated and processed by the at least one second phase. The secret parameters comprises at least an additional secret key ERK for ciphering the additional data in the corresponding encipher additional data.
摘要:
Method for key session derivation during a mutual authentication between a master IC Card 1, storing a master key K M , and a User IC Card 2, storing a key-seed K SEED , the master IC Card 1 and the User IC Card 2 being connected through a communication interface ITF for a communication session; the method comprises the steps of: generating at least a first random number RND.ICC associated to the User IC Card 2; deriving at least a first and a second sub keys K SEEDa and K SEEDb from the key-seed K SEED ; deriving at least a first and a second derivation sub keys K ENCa and K ENCb , respectively through the first sub key K SEEDa in combination with the first random number RND.ICC and through the second sub key K SEEDb in combination with the first random number RND.ICC; joining the at least first and second derivation sub keys K ENCa and K ENCb in at least a session key K ENC for the communication session. The step of generating comprises a generation of a second random number RND.SAM associated to said master IC Card 1; the step of deriving comprises a derivation of a third and a fourth derivation sub keys in order to obtain a second session key for the communication session.
摘要:
Method for controlling access to a data file (2) of an IC Card including the step of storing a plurality of access conditions (3) to be evaluated for accessing the data file (2) and the step of enabling the access to the file (2) if the access conditions (3) are satisfied. The method comprises the step of ordering the access conditions (3) to be evaluated in a Reverse Polish Notation inside a memory queue (4) of the IC Card and the step of evaluating the access conditions (3) starting from a head (5) of the memory queue (4).
摘要:
Method for key session derivation during a mutual authentication between a master IC Card 1, storing a master key K M , and a User IC Card 2, storing a key-seed K SEED , the master IC Card 1 and the User IC Card 2 being connected through a communication interface ITF for a communication session; the method comprises the steps of: generating at least a first random number RND.ICC associated to the User IC Card 2; deriving at least a first and a second sub keys K SEEDa and K SEEDb from the key-seed K SEED ; deriving at least a first and a second derivation sub keys K ENCa and K ENCb , respectively through the first sub key K SEEDa in combination with the first random number RND.ICC and through the second sub key K SEEDb in combination with the first random number RND.ICC; joining the at least first and second derivation sub keys K ENCa and K ENCb in at least a session key K ENC for the communication session. The step of generating comprises a generation of a second random number RND.SAM associated to said master IC Card 1; the step of deriving comprises a derivation of a third and a fourth derivation sub keys in order to obtain a second session key for the communication session.
摘要:
The invention relates to a method for pre-personalizing an IC Card (1), comprising the steps of transmitting a memory image (12) of a golden sample IC Card (11) to the IC Card (1) and storing the memory image (12) in a memory (2) of the IC Card (1). The method further comprises the step of separating the memory image (12) in a plurality of memory blocks (13) of predetermined size (14) to be transmitted separately to the IC Card (1) and by the fact that the step of storing comprises writing at least one memory block (13a) in the memory (2) while one or more memory blocks (13b) are transmitted.
摘要:
Method to defrag a memory (M) for an IC Card comprising a plurality of files (1, 2, 3) stored in memory portions (P1, P2, P3) of the memory (M), each file (1, 2, 3) including respective links (L1, L2, L3) to one or more other files (1, 2, 3). The method comprises the steps of: -detecting a start address (fl) of a first free memory portion (M1) of the memory (M); -detecting an address (ai) of a memory portion (P1) following the start address (fl) and storing one file to be moved (1); -detecting files (2) including links (L2) to the address (ai) of the file to be moved (1); - moving the file to be moved (1) at the start address (fl) of the first free memory portion (M1); -updating the links to point at the start address (fl); wherein the above steps are repeated until at least two free memory portions (M1, M2) following the moved files (1) are separated by one or more of files (1, 2, 3).
摘要:
The invention relates to a method for executing n data updates in an IC Card which comprises memory pages supporting only m erase operations per page, with m
摘要:
Authentication method between a first IC card (1) and a second IC card (2) interconnected through a terminal (3) comprising the step of: transmitting an identification number (2sn) from the second IC card (2) to the first IC Card (1) for deriving and storing a key (1K) in the first IC Card (1); generating and storing an authentication number (1rand) in the first (1) IC Card and transmitting it to the second (2) IC Card; encrypting the authentication number (1rand) in an encrypted authentication number (enc-rand), inside the second (2) IC Card, and transmitting it to the first (1) IC Card; decrypting, through the key derived (1K), the encrypted authentication number (enc-rand) and comparing it with the authentication number (1rand). The second IC Card (2) is authorized if the encrypted authentication number (enc-rand), in the first IC Card (1), is equal to the authentication number (1rand). At least one transmission included in the above cited steps comprises one or more identification and/or authentication number intended to authorize the first IC Card (1) from the second IC Card (2). The identification and/or authentication number comprises a reverse authentication number (rev-rand).