摘要 |
The message authentication technique uses a power of two system and follows the method of transfer without knowledge of a key word. Transfer is effected of private values Q, and public values, G. Relationships of the type G asterisk (Qv)=1modn are formed. The exponent v is such that v=2k where k greater than 1 is a security parameter. The public value G is the square gi asterisk gi of a base number gi that is lower than f first factors pj so that x2=gi mod n and x<2>=-gi mod n. The authentication technique uses an advanced transfer technique which does not involve knowledge of key words. A power of two system is used to interface with an authentication system, for the controller to transmit a mathematical response, for a test to be carried out using the method of chinese remainders and for the controller to accept or reject authentication.
|