Claims
- 1. A method of arranging subscriber authentication in a telecommunications system, the method comprising:
defining a key for the subscriber; generating a challenge to be used in authentication; defining a parameter for the subscriber's operator; calculating a first secret from the key and the parameter with a first one-way function; calculating an output from the challenge and the first secret with a second one-way function; extracting an authentication response from the output; and authenticating the subscriber with the authentication response.
- 2. The method of claim 1, further comprising:
storing the first secret in a subscriber identity module; and calculating, during authentication, the output from the first secret and the challenge in the subscriber identity module with the second one-way function.
- 3. The method of claim 1 wherein
the first one-way function is a hash function; and the second one-way function is an encryption algorithm.
- 4. A method of arranging subscriber authentication in a telecommunications system, the method comprising:
defining a key for the subscriber; generating a challenge to be used in authentication; defining a parameter for the subscriber's operator; calculating a first secret from the key and the parameter with a first one-way function; calculating a second secret from the key and the parameter with a second one-way function; calculating an intermediate output from the challenge and the first secret with a third one-way function; calculating an output from the intermediate output and the second secret with a fourth one-way function; extracting an authentication response from the output; and authenticating the subscriber with the authentication response.
- 5. The method of claim 4, further comprising:
masking the key and parameter with a first mask before the first secret is calculated; calculating the first secret from the masked key and parameter; masking the key and parameter with a second mask before calculating the second secret; and calculating the second secret from the masked key and parameter.
- 6. The method of claim 4 further comprising:
storing the first and the second secret in the subscriber identity module; and calculating, during authentication, the intermediate output from the first secret and the challenge in the subscriber identity module with the third one-way function and the output from the intermediate output and the second secret with the fourth one-way function.
- 7. The method of claim 4 wherein
the first and the second one-way functions are hash functions; and the third and the fourth one-way functions are encryption algorithms.
- 8. The method of claim 3 wherein the encryption algorithm utilizes a DES encryption algorithm.
- 9. The method of claim 1 wherein the parameter of the subscriber's operator includes an operator code and an operator secret.
- 10. The method of claim 1, further comprising extracting an encryption key from the output.
- 11. A telecommunications system comprising a subscriber identity module and an authentication center
the system being arranged to use a challenge as a parameter in authentication and authenticate a subscriber by comparing an authentication response calculated by the subscriber identity module with an authentication response calculated by the authentication center; wherein
at least one operator parameter is defined for the subscriber's operator; the authentication center is arranged to store authentication information on the subscriber which includes at least a subscriber key and the operator parameter, calculate a first secret from the subscriber key and the operator parameter with a first one-way function; calculate an output from the first secret and the challenge with a second one-way function; and extract an authentication response from the output; the subscriber identity module includes the first secret and is arranged to calculate an output from the first secret and the challenge with the second one-way function, and extract an authentication response from the output.
- 12. A telecommunications system comprising a subscriber identity module and an authentication center
the system being arranged to use a challenge as a parameter in authentication and authenticate a subscriber by comparing an authentication response calculated by the subscriber identity module with an authentication response calculated by the authentication center; wherein at least one operator parameter is defined for the subscriber's operator; the authentication center is arranged to store authentication information on the subscriber which includes at least a subscriber key; and the operator parameter, calculate a first secret from the subscriber key and the operator parameter with a first one-way function; calculate a second secret from the subscriber key and the operator parameter with a second one-way function, calculate an intermediate output from the first secret and the challenge with a third one-way function, calculate an output from the second secret and the intermediate output with a fourth one-way function, and extract an authentication response from the output; the subscriber identity module comprises a first and a second secret and is arranged to calculate an intermediate output with a third one-way function, calculate an output from the second secret and the intermediate output with a fourth one-way function and to extract an authentication response from the output.
- 13. An authentication center in a telecommunications system which comprises at least one subscriber and in which a challenge is used as a parameter in authentication, the authentication center being arranged to store authentication information on the subscriber which includes at least a subscriber key,
store the operator parameter defined for the subscriber's operator, calculate a first secret from the subscriber key and the operator parameter with a first one-way function, calculate an output from the first secret and the challenge with a second one-way function and extract an authentication response to be used in authentication from the output.
- 14. An authentication center in a telecommunications system which comprises at least one subscriber to whom a subscriber key is defined as authentication information and in which system a challenge is used as a parameter in authentication, the authentication center being arranged to store a first secret calculated from the subscriber key and the operator parameter defined for the subscriber's operator with a first one-way function, calculate an output from the first secret and the challenge with a second one-way function, and extract an authentication response to be used in authentication from the output.
- 15. An authentication center in a telecommunications system which comprises at least one subscriber and in which a challenge is used as a parameter in authentication, the authentication center being arranged
to store authentication information on the subscriber which includes at least a subscriber key, store an operator parameter defined for the subscriber's operator, calculate a first secret from the subscriber key and the operator parameter with a first one-way function, calculate a second secret from the subscriber key and the operator parameter with a second one-way function, calculate an intermediate output from the first secret and the challenge with a third one-way function, calculate the output from the second secret and the intermediate output with a fourth one-way function, and extract an authentication response from the output.
- 16. An authentication center in a telecommunications system which comprises at least one subscriber to whom a subscriber key is defined as authentication information and in which system a challenge is used as a parameter in authentication, the authentication center being arranged to store a first secret calculated from the subscriber key and the operator parameter defined for the subscriber's operator with a first one-way function and a second secret calculated from the subscriber key and the operator parameter with a second one-way function, calculate an intermediate output from the first secret and the challenge with a third one-way function, calculate an output from the second secret and the intermediate output with a fourth one-way function, and extract an authentication response from the output.
- 17. A subscriber identity module which can be connected to the terminal used by a subscriber in a telecommunications system where a challenge is used as a parameter in authentication, the identity module comprising a subscriber keyand an operator parameter defined for the subscriber's operator; and being arranged to calculate a first secret from the subscriber key and the operator parameter with a first one-way function, calculate an output from the first secret and the challenge with a second one-way function, and extract an authentication response to be used in authentication from the output.
- 18. A subscriber identity module which can be connected to the terminal used by a subscriber in a telecommunications system which utilizes a subscriber key in authentication and a challenge as the parameter, the subscriber identity module including a first secret calculated from the subscriber key and the operator parameter defined for the subscriber's operator with a first one-way function; and being arranged to calculate an output from the first secret and the challenge with a second one-way function, and extract an authentication response to be used in authentication from the output.
- 19. A subscriber identity module which can be connected to the terminal used by a subscriber in a telecommunications system where a challenge is used as the parameter in authentication, the identity module comprising a subscriber key and an operator parameter defined for the subscriber's operator; and being arranged to calculate a first secret from the subscriber's key and the operator parameter with a first one-way function, calculate a second secret from the subscriber key and the operator parameter with a second one-way function, calculate an intermediate output from the first secret and the challenge with a third one-way function, calculate an output from the second secret and the intermediate output with a fourth one-way function, and extract an authentication response to be used in authentication from the output.
- 20. A subscriber identity module which can be connected to the terminal used by a subscriber in a telecommunications system which utilizes a subscriber key in authentication and a challenge as the parameter, the subscriber identity module including a first secret calculated from the subscriber key and the operator parameter defined for the subscriber's operator with a first one-way function and a second secret calculated from the subscriber key and the operator parameter with a second one-way function; and
being arranged to calculate an intermediate output from the subscriber's challenge and the first secret with a third one-way function, calculate an output from the intermediate output and the second secret with a fourth one-way function, and extract an authentication response from the output.
- 21. A method of arranging subscriber authentication in a telecommunications system, the method comprising:
defining a key for the subscriber; generating a challenge to be used in authentication; defining a parameter for the subscriber's operator; calculating a first secret from the key and the parameter with a hash function; storing the first secret in a subscriber identity module; and calculating, during authentication, an output from the challenge and the first secret in the subscriber identity module with an encryption algorithm; extracting an authentication response from the output; and authenticating the subscriber with the authentication response.
- 22. A method of arranging subscriber authentication in a telecommunications system, the method comprising:
defining a key for the subscriber; generating a challenge to be used in authentication; defining a parameter for the subscriber's operator; masking the key and parameter with a first mask; calculating a first secret from the masked key and the parameter with a first one-way function; masking the key and parameter with a second mask; calculating a second secret from the masked key and the parameter with a second one-way function; storing the first and the second secret in the subscriber identity module; calculating, during authentication, an intermediate output from the challenge and the first secret in the subscriber identity module with a third one-way function; calculating, during authentication, an output from the intermediate output and the second secret in the subscriber identity module with a fourth one-way function; extracting an authentication response from the output; and authenticating the subscriber with the authentication response.
- 23. The method of claim 22 wherein
the first and the second one-way functions are hash functions; and the third and the fourth one-way functions are encryption algorithms.
- 24. The method of claim 23 wherein
the hash function is an RIPEMD-128 function; and the encryption algorithm utilizes a DES encryption algorithm.
Priority Claims (1)
Number |
Date |
Country |
Kind |
20000732 |
Mar 2000 |
FI |
|
Parent Case Info
[0001] This application is a Continuation of International Application PCT/FI10/00293 filed Mar. 26, 2001 which designated the U.S. and was published under PCT Article 21(2) in English.
Continuations (1)
|
Number |
Date |
Country |
Parent |
PCT/FI01/00293 |
Mar 2001 |
US |
Child |
10256256 |
Sep 2002 |
US |