Answer the question
In order to leave comments, you need to log in
Scheme of work of E-Token
Tell me, how is the connection scheme between E-token and computer going?
Answer the question
In order to leave comments, you need to log in
found it myself).
1. Reading by the host of information about the token and its cryptogram;
2. The host generates a random number;
3. Cryptogram + random number + initial secret number = request;
4. The request is sent to the token for authentication;
5. The host calculates a new cryptogram and a new session encryption key;
6. The crypto1function is called in the token. The sent random number
(generated by the host) is calculated;
7. The token computes a new request;
8. The token computes a new cryptogram and a new session key;
9. The token compares the request sent by the host with what he got. If
there is a match, then the token declares the host to be authentic;
10. The token writes a new cryptogram over the newly formed request;
11. The host reads the new request and compares the cryptogram from it with the
new cryptogram it generated earlier. If there is a match, then the host recognizes the token as
authentic.
Didn't find what you were looking for?
Ask your questionAsk a Question
731 491 924 answers to any question