To perform inexpensive, high-speed and secured apparatus authentication.
Provided is a security chip having tamper-resistance which comprises: an acquisition unit which acquires information that is transmitted from a device performing challenge response authentication and is unique to the device; a storage unit which stores second key information that can be used for generating first key information to be used by the device for the challenge response authentication from the unique information; and a generation unit which generates the first key information from the unique information by using the second key information. On the basis of a challenge transmitted by the device by using the first key information, a response to be transmitted to the device is generated. In the device, the first key information is not stored in the security chip having tamper-resistance.
JPH0256136A | 1990-02-26 | |||
JPH04247737A | 1992-09-03 | |||
JP2008506317A | 2008-02-28 | |||
JPH09138643A | 1997-05-27 | |||
JP2002185443A | 2002-06-28 | |||
JP2010237772A | 2010-10-21 | |||
JP2000138674A | 2000-05-16 | |||
JP2006180457A | 2006-07-06 | |||
JP2007173999A | 2007-07-05 | |||
JP2008085547A | 2008-04-10 |
JPN6013042216; Desmedt, Y. and Quisquater, J.-J.: 'PUBLIC-KEY SYSTEMS BASED ON THE DIFFICULTY OF TAMPERING' Lecture Notes in Computer Science Vol.263, 19870804, p.111-117
Tetsuo Kanamoto
Koji Hagiwara
Kazuki Matsumoto