摘要 |
<p>The method involves partitioning a digital quantity into blocks of identical size, and applying a symmetrical encryption algorithm to each block. A one-to-one, non linear function (FCT) is applied to a result (MAC) of the previous steps for obtaining a current value (AUTH) that is to be compared with an expected value provided from the exterior of a processor. Each block is combined with the result provided by the algorithm from the previous block. Independent claims are also included for the following: (1) an integrated processor comprising a unit for implementing a method for verifying a digital quantity (2) a mobile telephone comprising a processor.</p> |