Login| Sign Up| Help| Contact|

Patent Searching and Data


Title:
AUTHENTICATION METHOD
Document Type and Number:
WIPO Patent Application WO/2003/088564
Kind Code:
A1
Abstract:
The authentication method based on a challenge-response procedure between at least two cryptographic instances A and B of a communication system. The method is used to generate a session key for safe communication between the two instances. Instances A and B can be a CAM and a Smart Card in a conditional access environment.

Inventors:
FROEHLICH HANS-HERMANN (DE)
TUECKE PETER (DE)
Application Number:
PCT/EP2003/003783
Publication Date:
October 23, 2003
Filing Date:
April 11, 2003
Export Citation:
Click for automatic bibliography generation   Help
Assignee:
SCM MICROSYSTEMS GMBH (DE)
FROEHLICH HANS-HERMANN (DE)
TUECKE PETER (DE)
International Classes:
H04L9/08; H04L9/32; H04N7/16; H04N7/173; (IPC1-7): H04L9/32; H04L9/08; H04N7/167
Domestic Patent References:
WO2001059728A12001-08-16
WO1997038530A11997-10-16
Foreign References:
US6178507B12001-01-23
EP0492692A21992-07-01
Other References:
TAEKYOUNG KWON ET AL: "Security and efficiency in authentication protocols resistant to password guessing attacks", LOCAL COMPUTER NETWORKS, 1997. PROCEEDINGS., 22ND ANNUAL CONFERENCE ON MINNEAPOLIS, MN, USA 2-5 NOV. 1997, LOS ALAMITOS, CA, USA,IEEE COMPUT. SOC, US, PAGE(S) 245-252, USA, ISBN: 0-8186-8141-1, XP010252430
Attorney, Agent or Firm:
Degwert, Hartmut (Manzingerweg 7, München, DE)
Download PDF:
Claims:
Claims
1. An authentication method based on a challengeresponse procedure between at least two cryptographic instances A and B of a communication system, wherein the first instance A generates at least a first random number Rnonce, the first instance A reads a serial number Ser from the second instance B, the first instance A generates a challenge s by encrypting a concatenate of at least the first random number Rnonce and the serial number Ser with a public key of an asymmetric key pair, the first instance A sends the challenge s to the second instance B, the second instance B decrypts to s'the challenge s with the private key of the key pair, the second instance B retrieves the serial number Ser'from the decrypted challenge s', the second instance B compares its serial number Ser with the retrieved serial number Ser', the second instance B retrieves the first random number Rnonce' from the decrypted challenge s', the second instance B sends the retrieved first random number Rnonce'to the first instance A, the first instance A compares the first random number Rnonce with the retrieved first random number Rnonce'.
2. The method of claim 1, wherein the concatenate includes a constant known to both instances A and B and the second instance B retrieves and checks also the constant from the decrypted challenge s'.
3. The method of claim 2, wherein the constant is a byte string.
4. The method of any of claims 1 to 3, wherein the first instance A also generates a second random number Rseed which is included in the concatenate, the second instance B retrieves the second random number Rseed'from the decrypted challenge s', and both instances A and B use the second random number Rseed and Rseed', respectively, to generate a common session key S.
5. The method of claim 4, wherein the common session key S is generated by encrypting the serial number Ser with a symmetric encryption algorithm using the second random number Rseed as encryption key.
6. An authentication method based on a challengeresponse procedure between at least two cryptographic instances A and B of a communication system, wherein the first instance A generates at least a first random number Rnonce, the first instance A generates a challenge s by encrypting a first concatenate Cl of at a constant known to both instances A and B and at least the first random number Rnonce with a public key of an asymmetric key pair, the first instance A sends the challenge s to the second instance B, the second instance B decrypts to s'the challenge s with the private key of the key pair, the second instance B retrieves the first random number Rnonce' and the constant from the decrypted challenge s', the second instance B verifies the retrieved constant, the second instance B generates a second random number Rseed (SC), the second instance B sends in the clear to the first instance A a second concatenate C2 of the retrieved first random number Rnonce', the second random number Rseed (SC) and an individual characteristic Ser (B) of the second instance B, the first instance A extracts and verifies the retrieved first random number Rnonce'and the individual characteristic Ser (B).
7. The method of claim 6, wherein the first concatenate Cl includes a further random number Rseed (CAM) generated by the first instance, the second instance B retrieves from the decrypted challenge s'the further random number Rseed (CAM), the second concatenate C2 contains the retrieved further random number Rseed (CAM), the first instance A extracts from the second concatenate C2 the second random number Rseed (SC), both instances A and B generate a common session key S by encrypting the individual characteristic Ser (B) with a symmetric encryption algorithm involving both of the second random number Rseed (SC) and the further random number Rseed (CAM) as symmetric encryption keys.
8. The method of claim 7, wherein the individual characteristic Ser (B) is repeatedly encrypted with different ones of the symmetric encryption keys.
9. The method of claim 7 or claim 8, wherein the individual characteristic Ser (B) is the serial number of the second instance.
10. The method of any of the preceding claims, wherein both instances A and B are part of a conditional access system.
11. The method of claim 10, wherein the first instance A is a conditional access module"CAM"and the second instance B is a Smart Card"SC".
12. The method of claim 10, wherein one of the first and second instances A and B is a conditional access module"CAM"and the other is a Set TopBox.
13. The method of claim 11, wherein the session key is used for encrypting data exchanged between the CAM and the SC.
14. The method of claim 13, wherein the session key is used for encrypting data exchanged between the CAM and the TetTopBox.
Description:
Authentication method The present invention relates to an authentication method.

1. Conceptual Formulation In every operational system with an exchange of confidential and secret information between operational components Ai the problem of mutual authentication of the involved cryptographic entities will arise. In case of transmitting information coming from an instance B from the overall system to an instance A of the overall system, A has to have the opportunity to verify the authenticity of B (and vice versus). Usually the unilateral or mutual authentication is based on the verification of confidential information according to a so-called Challenge-Response-Procedure. In this case instance A sends a sequence of information with a specifically defined syntax ("Challenge") to instance B.

Instance B authenticates itself (viewed by A) by accurate reaction (respective to the protocol) against the information received ("Response"). The communication between A and B will possibly be encrypted with a common key only known by A and B. ISO 9798 1-4 describes different prevalent procedures.

Subject of this invention, as defined in the appending claims is an extended Challenge-Response-Procedure between a Conditional Access Module (following referred to as CAM) and a deployed Smartcard (following referred to as SC). The

cryptographic system here stands for the system"Conditional Access Module (CAM) and Smartcard", while the instances A and B individually stand for CAM resp. SC (instead of CAM also a Set-Top-Box with embedded CAM may be used).

Description of the Conceptual Formulation The Challenge-Response-Procedure should contain at least the following functions : Unilateral authentication of the SC through the CAM Common generation and arrangement of a session key S, which is necessary for further transmission of information and supports the exchange of keys (control word) between SC and CAM. This is supposed to establish a secure connection between the respective Smartcard and the CAM If possible a desirable aspect would also be Authentication of the CAM through the Smartcard 2. Formal description of the procedure Notation: A=CAM, B=SC.

PKA (public key algorithm) is an arbitrary (asymmetric) encryption algorithm with the keys epKF (A; B), dpKF (A; B) (here: epKF (A; B) is the public key, dpKF (A; B) is the associated private key). Furthermore, SKA (Symmetric Key Algorithm) is a symmetric encryption-algorithm which is present on A as well as on B.

Following: e=ep (A ; B), d=dpKF (A; B).

First Embodiment With reference to Fig. 1 of the appending drawings, a first embodiment of the invention will be disclosed more in detail.

Protocol steps: Step 1 A creates two (individual) random numbers Rseed (CAM) and Rnonce with sufficient length. Rseed (CAM) will be used as a basic value (seed) for the subsequent derivation, Rnonce acts as a single number and guarantees an instantaneous communication (enforcement of the temporal tie-up) Step 2 A generates a challenge of the form s=PKAe (const | | Rseed (CAM) | | RnOnce) <BR> <BR> and sends s to B. Here, "const"is a fixed byte string, which supports the authentication (of the CAM) with regards to the Smartcard. The symbol | | denotes the concatenation of character strings. The string (which has to be encrypted with PKA) will possibly be filled up (padded) with zeros.

Step 3 B decrypts s with the secret key d, verifies the prefixed constant const and extracts the components Rseed (CAM) and Rnonee.

Step 4 B creates a random number Rseed (SC) and sends the concatenation Rince Rseed (SC) | | Ser (SC) to A.

Here: Ser (SC) is the serial number of the card.

Step 5 A checks Rnonce and Ser (SC) (authentication of SC) and extracts Rseed (SC) Step6 Common creation of the session key S: A and B calculate S=SKAKsc (SKAKCAM (Ser (SC))).

Here: SKA = symmetric encryption algorithm which has been implemented on A and B; KSC=Rseed (SC), KCAM=Rseed (CAM) 3a. Illustration of the procedure The key-exchange-procedure according to Diffie-Hellman is a popular procedure for the common creation and exchange of keys. Two instances A and B create a common key K (rA; rB) by using commutative encryption operations from individually created random numbers rA and rB. The key holds the abstract structure K (rA; rB) = E (E (s; rA); rB) = E (E (s; rB) ; rA) while s is a common information of A and B. Unfortunately only a few (symmetric) encryption procedures and mathematic operations have the necessary commutative feature E (E (s; rA); rB) = E (E (S; rB); rA). This limits the adaptability of the classic Diffie- Hellman-procedure to only a few proceedings such as the modular exponentiation and the respective alternative for elliptic curves. Furthermore those require a high effort of calculating operations that cannot be put into operation for limited capacities. Step 6 which has been described under section 2 limits the method of the key convention according to Diffie-Hellman with a symmetric encryption algorithm SKA and can therefore be executed in an environment with limited resources. The usage of the card's serial number Ser (SC) (which can be read by the CAM with a special command) causes a strong mutual binding between the CAM and the card. Although in step 4 Rseed (CAM) will be transmitted in plaintext it will not be possible for the attacker to create a valid session key because he is not aware of the short-dated key Rseed (CAM). The authentication mechanism contains a redundant component. This is because the verification of the single number Rnonce through the CAM as well as the serial number will be checked and compared with the serial number that will be sent by the card. This complicates the use of piracy cards.

Various options and refinements of the procedure are possible. These could be: Instead of the serial number, another card-specific characteristic can be used for the calculation of the session key

The Challenge can (in excess of the Nonce=R"once) also (on the part of the CAM) be furnished with a time stamp. Furthermore this procedure could be used in an iterated way while previous sequences of the CAM resp. the SC could be logged (by calculating of hash values through past (old) data) Another aspect is to sign the serial number and have the valid signature verified by the CAM.

Finally the transmittal of the data described in step 4 can also occur in an encrypted way.

Exchange of the common key S after the usage through a mutually acquainted function, e. g. depending on time factors or on the number of usages.

4a. Advantages of the procedure and comparison with conventional solutions The procedure combines an authentication mechanism with a key-creation- mechanism/key-exchange-mechanism, whereof two cryptographic instances create a common key. Thereby the key generation is based on the application of a symmetric encryption algorithm that will be applied serially with two different key parts, which are independently generated from the SC and the CAM. This is the main difference between the proposal and similar Challenge-Response- Procedures. The Patent WO 97/38530"Method for Providing a Secure Communication Between Two Devices and Application of this Method"to DigCo BV also describes a combined authentication-/key generation-mechanism.

However, in this case only instance A (here: CAM) contributes to the key generation; instance B is passive. In coincidental awareness of the key dpKF (A; B) any desired instance from part of the CAM could give an accurate answer (respective to the protocol) and establish a communication with the CAM. This procedure pursuant to the invention contains an additional component, which is the link to the card. Moreover the key will be bilaterally calculated through a one- way-function while according to the above-mentioned patent it directly corresponds to an (on the part of the CAM) originated random number. This

improves the protection against reply attacks. For the calculation of the key only symmetric algorithms are used which usually require less effort for the calculation. Therefore the Challenge-Response-Procedure can also be realized in an environment that offers only limited calculation power.

5a. System Components In order to realize the protocol any desired tools with cryptographic function (Smartcard, Terminal) can be useful. More general this could also mean different software-system-or network interfaces. Besides the two encryption algorithms SKA/PKA mainly a mechanism for the creation of random numbers adequate to good quality will be necessary. This has to be effective for both sides but also needs to be differently implemented. (hardware-based or as a software solution).

Second Embodiment With reference to Fig. 2, a second embodiment of the invention will be disclosed in detail.

Protocol steps Step 1 A creates 2 (individual) random numbers Rseed (CAM) and Rnonce with sufficient length. Rseed (CAM) will be used as a basic value (seed) for the subsequent dissipation, Rnonce acts as a single number and guarantees an instantaneous communication (enforcement of the temporal tie-up) Step 2 A is reading the serial number Ser (SC) from B, generates a Challenge which is S=PKAe (const ! ! Ser (SC) | | Rseed (CAM) j ! Rnonce) and sends it to B. You will here find const as a fixed byte string, which supports the authentication (of the CAM) with regards to the Smartcard. The symbol ! ! describes the

concatenation of character strings. The string (which has to be encrypted with PKA) will possibly be filled up with zeros.

Step 3 B decrypts s with the secret key d, verifies the prefixed constant const and/or the serial number Ser (SC) and extracts the components Rseed (CAM) and Rnonce- Step4 B sends the (unencrypted) random number Rnonce to A Step 5 A verifies Rnonce (authentication of the SC) Step 6 Common creation of the session key S: A and B calculate S=SKAcAM (Ser (SC)) Here: SKA = symmetric encryption algorithm which has been implemented to A and B, KCAM= Rseed (CAM).

3b. Illustration of the procedure The procedure combines a unilateral authentication of the SC with the mechanism for the creation of a session key between two instances A and B (here SC and CAM) based on the common information shared by A and B. The characteristic that stands for both A and B is here described as the serial number of the card which will be used together with the random number Rseed (CAM) that has been generated by A for the derivation of the common key S. The usage of the card's serial number usually always enables an implemented authentication against the SC because the SC has the possibility to verify its own serial number after decrypting the Challenge in Step 1.

Hereby the creation of recent valid Challenges (see Step 1) will be complicated by simply copying one-off Challenges (i. e. Challenges, which also come from"authentic"cards). The usage of the card's serial number Ser (SC) therefore causes a strong mutual binding between the CAM and the card.

Various options and refinements of the procedure are possible. These are outlined with the following: Instead of the serial number another card-specific characteristic can be used for the calculation of the session key The Challenge can (in excess of the Nonce=Rnonce) also (on the part of the CAM) be furnished with a time stamp. Furthermore this procedure could be used in an iterated way while previous sequences of the CAM and/or the SC could be logged (by calculating of hash values through past/old data and/or proceeding sequences of the protocol). Thereby, the CAM has the possibility to register an exchange of the Smartcard (possibly as a method against the application of piracy cards) Another aspect is to sign the serial number and have the valid signature verified by the CAM Finally the transmittal of the data described in step 4 can occur in an encrypted way.

Exchange of the common key S after the usage through a mutually acquainted function, e. g. depending on time factors or on the number of usages.

4b. Advantages of the procedure and comparison with familiar solutions The patent WO 97/38530"Method for Providing a Secure Communication Between Two Devices and Application of this Method"to DigCo BV also describes a combined authentication-/key-production-mechanism. Through the retrieval of the card's serial number and/or the verification of the serial number on part of the SC this invention-specific procedure also contains an additional

authentication mechanism. Moreover the key will be bilaterally calculated through a one-way-function (coming from the SC) while according to the above- mentioned patent it directly corresponds to a (on the part of the CAM) originated random number. This improves the protection against replay attacks. For the calculation of the key only symmetric algorithms are used which usually require less effort for the calculation. Therefore the Challenge-Response-Procedure can also be realized in a surrounding that offers only limited calculation power.

5b. System Components In order to realize the protocol any desired tools with cryptographic function (Smartcard, Terminal) can be useful. More general this could also mean different software-system-or network interfaces. Besides the two encryption algorithms SKA/PKA mainly a mechanism (on instance A, here CAM) for the creation of random numbers adequate to good quality will be necessary.