-
1.
公开(公告)号:US20200099541A1
公开(公告)日:2020-03-26
申请号:US16471973
申请日:2017-02-10
发明人: Karl NORRMAN , Elena DUBROVA , Bernard SMEETS
摘要: A method of verifying that a first device and a second device are physically interconnected is disclosed. The method is performed by a verifier and includes sending a challenge R1 to the first device, for use as basis for input to a first physical unclonable function, PUF,—part of the first device, receiving, a response, RES1, from the second device, the response RES1 being based on an output of a second PUF part of the second device, and verifying that the first device and the second device are interconnected for the case that the received response, RES1, and an expected response fulfills a matching criterion. A method in a first device and a method in a second device and corresponding devices, computer programs and computer program products are also disclosed.
-
公开(公告)号:US20190385489A1
公开(公告)日:2019-12-19
申请号:US16480798
申请日:2017-02-01
发明人: Karl NORRMAN , Elena DUBROVA
摘要: A method (20) performed by a device (1) for protecting data is provided. The method (20) comprises inputting (21), to a Physically Unclonable Function, PUF, (3), of the device (1), a challenge; obtaining (22), from the PUF (3), a response; and protecting (23) the data by using the response. A device (1), a method in an encryption unit, computer program and computer program product are also provided.
-
公开(公告)号:US20190037404A1
公开(公告)日:2019-01-31
申请号:US16151628
申请日:2018-10-04
发明人: Mats NÄSLUND , Elena DUBROVA , Karl NORRMAN , Vesa TORVINEN
IPC分类号: H04W12/08 , H04W12/02 , H04L29/06 , H04W12/06 , H04W12/10 , H04L9/32 , H04L29/12 , H04W84/04
CPC分类号: H04W12/08 , H04L9/3242 , H04L61/1505 , H04L61/203 , H04L63/0428 , H04L63/0892 , H04L63/162 , H04L2209/80 , H04L2209/84 , H04W12/02 , H04W12/06 , H04W12/10 , H04W84/042
摘要: A method and arrangements for enabling authentication of a communication device is suggested, where a network node, capable of operating as an authentication server does not have to store all state related information relevant for a roundtrip of an authentication session. Instead of storing all this information, at least a part of it is provided to the authenticator or the communication unit, for later retrieval in a subsequent response. Based on the state related information provided in the response, the network node is capable of reproducing a state associated with a respective roundtrip. By repeating the mentioned process for a required number of roundtrips, an authentication session can be executed, where less state related information need to be stored at the mentioned network node.
-
公开(公告)号:US20180367296A1
公开(公告)日:2018-12-20
申请号:US15781260
申请日:2015-12-18
发明人: Karl NORRMAN , Jari ARRKO , Elena DUBROVA , Mats NÄSLUND
摘要: A method (40) of generating a pseudonym associated with a communication device (11) is disclosed. The method (40) is performed in a network node (13) of a communications system (10) and comprises generating (41) a pseudonym embryo based on one or more elements of a sequence (S1, S2, . . . , Sn), obtaining (42) the pseudonym as output of a masking operation applied to the pseudonym embryo, wherein the masking operation comprises a one-to-one mapping, and transmitting (43) the pseudonym to the communication device (11). A corresponding network node (13), computer program and computer program product are also disclosed.
-
公开(公告)号:US20180069706A1
公开(公告)日:2018-03-08
申请号:US15558844
申请日:2015-05-04
发明人: Elena DUBROVA , Gunnar MILDH , Mats NÄSLUND , Göran SELANDER
CPC分类号: H04L9/3242 , G06F11/1004 , H03M13/09 , H03M13/158 , H04L9/3236 , H04L2209/34
摘要: A method (400) of generating a cryptographic checksum for a message M(x) is provided. The method is performed by a communication device, such as a sender or a receiver, and comprises calculating (405) the cryptographic checksum as a first function g of a division of a second function of M(x), f(M(x)), modulo a generator polynomial p(x) of degree n, g(f(M(x)) mod p(x)). The generator polynomial is calculated (403) as p(x)=(1−x)·P1(x), and P/(x) is a primitive polynomial of degree n−1. The primitive polynomial is selected (402), based on a first cryptographic key, from the set of primitive polynomials of degree n−1 over a Galois Field. By replacing a standard checksum with a cryptographic checksum, an efficient message authentication is provided. The proposed cryptographic checksum may be used for providing integrity assurance on the message, i.e., for detecting random and intentional message changes, with a known level of security. The proposed checksum is capable of detecting double-bit errors which may be introduced by a Turbo code decoder.
-
公开(公告)号:US20170244564A1
公开(公告)日:2017-08-24
申请号:US15504604
申请日:2014-08-19
发明人: Mats NÄSLUND , Elena DUBROVA , Fredrik LINDQVIST , Göran SELANDER
CPC分类号: H04L9/3242 , G06F7/724 , H04L1/0061 , H04L9/0643 , H04L2209/34
摘要: A method (500) of generating a cryptographic checksum for a message M(x) is provided. The method comprises pseudo-randomly selecting (502) at least two irreducible polynomials pi(x). Each irreducible polynomial pi(x) is selected based on a first cryptographic key from the set of irreducible polynomials of degree ni over a Galois Field. The method further comprises calculating (503) a generator polynomial p(x) of degree n=formula (I) as a product of the N irreducible polynomials formula (II), and calculating (505) the cryptographic checksum as a first function g of a division of a second function of M(x), ƒ(M(x)), modulo p(x), i.e., g(ƒ(M(x)) mod p(x)). By replacing a standard checksum, such as a Cyclic Redundancy Check (CRC), with a cryptographic checksum, an efficient message authentication is provided. The proposed cryptographic checksum may be used for providing integrity assurance on the message, i.e., for detecting random and intentional message changes, with a known level of security. Further, a corresponding computer program, a corresponding computer program product, and a checksum generator for generating a cryptographic checksum, are provided. Σ i = 1 N n i ( I ) p i ( x ) , p ( x ) = Π i = 1 N p i ( x ) , ( II )
-
公开(公告)号:US20170141918A1
公开(公告)日:2017-05-18
申请号:US15319465
申请日:2014-06-27
发明人: Elena DUBROVA , Fredrik LINDQVIST , Mats NÄSLUND , Göran SELANDER
CPC分类号: H04L9/3093 , H04L1/0061 , H04L9/0643 , H04L9/14 , H04L9/3242 , H04L63/06 , H04L2209/34 , H04L2209/80 , H04W12/04
摘要: A method (500) of generating a cryptographic checksum for a message M(x) is provided. The method comprises pseudo-randomly selecting (502) a generator polynomial p(x) from the set of polynomials of degree n over a Galois Field and calculating (504) the cryptographic checksum as a first function g of a division of a second function of M(x), ƒ(M(x)), modulo p(x), g(ƒ(M(x))mod p(x)). The generator polynomial p(x) is pseudo-randomly selected based on a first cryptographic key. By replacing a standard checksum, such as a Cyclic Redundancy Check (CRC), with a cryptographic checksum, an efficient message authentication is provided. The proposed cryptographic checksum may be used for providing integrity assurance on the message, i.e., for detecting random and intentional message changes, with a known level of security. Further, a corresponding computer program, a corresponding computer program product, and a checksum generator for generating a cryptographic checksum, are provided.
-
公开(公告)号:US20180092025A1
公开(公告)日:2018-03-29
申请号:US15566104
申请日:2015-04-16
发明人: Göran SELANDER , Elena DUBROVA , Fredrik LINDQVIST , Mats NÄSLUND
摘要: The disclosure relates to a method (30) for a network node (6, 7, 8) of a wireless network (1) of providing a device (5, 9) access to the wireless network (1). The method (30) comprises receiving (31), from a device (5, 9), an access request comprising a preamble; establishing (32), in response to the access request, a computational puzzle based on the received preamble; and sending (33) the computational puzzle to the device (5, 9). A corresponding method in a device is also disclosed, as are a network node (6, 7, 8), device (5, 9), computer programs and computer program products.
-
公开(公告)号:US20170338946A1
公开(公告)日:2017-11-23
申请号:US15535994
申请日:2014-12-17
发明人: Mats NÄSLUND , Elena DUBROVA , Martin HELL , Bernard SMEETS
CPC分类号: H04L9/0631 , H04L9/0668 , H04L9/0861 , H04L2209/12 , H04L2209/122 , H04L2209/125
摘要: A technique for generating a keystream (128) for ciphering or deciphering a data stream (122) is provided. As to a method aspect of the technique, a nonlinear feedback shift register, NLFSR (112), including n register stages implemented in a Galois configuration is operated. At least one register stage of the implemented n register stages is representable by at least one register stage of a linear feedback shift register, LFSR. A first subset of the implemented n register stages is representable by a second subset of a second NLFSR. A number of register stages receiving a nonlinear feedback in the second NLFSR is greater than one and less than a number of register stages receiving a nonlinear feedback in the implemented NLFSR. The keystream (128) is outputted from a nonlinear output function (118). An input of the nonlinear output function (118) is coupled to at least two of the implemented n register stages of the NLFSR (112).
-
公开(公告)号:US20170164200A1
公开(公告)日:2017-06-08
申请号:US15023115
申请日:2015-12-07
发明人: Mats NÄSLUND , Elena DUBROVA , Karl NORRMAN , Vesa TORVINEN
CPC分类号: H04W12/08 , H04L9/3242 , H04L61/1505 , H04L63/0428 , H04L63/0892 , H04L63/162 , H04L2209/80 , H04L2209/84 , H04W12/02 , H04W12/06 , H04W12/10 , H04W84/042
摘要: A method and arrangements for enabling authentication of a communication device is suggested, where a network node, capable of operating as an authentication server does not have to store all state related information relevant for a roundtrip of an authentication session. Instead of storing all this information, at least a part of it is provided to the authenticator or the communication unit, for later retrieval in a subsequent response. Based on the state related information provided in the response, the network node is capable of reproducing a state associated with a respective roundtrip. By repeating the mentioned process for a required number of roundtrips, an authentication session can be executed, where less state related information need to be stored at the mentioned network node.
-
-
-
-
-
-
-
-
-