The exclusive promotional activities on JCOP J3H145 card and Feitian R301 Smartcard Reader are in full swing. Please check this page for details.

Search found 78 matches

by BirdKing
Tue May 15, 2018 2:32 am
Forum: Questions & Answers
Topic: How to verify that the RSA calculation process is under attack
Replies: 5
Views: 810

Re: How to verify that the RSA calculation process is under attack

In this way, the padding algorithm maybe premeditated. And, in algorithm library, cipher and signature is same.
by BirdKing
Mon May 14, 2018 6:28 am
Forum: Questions & Answers
Topic: How to verify that the RSA calculation process is under attack
Replies: 5
Views: 810

Re: How to verify that the RSA calculation process is under attack

wumindejia wrote:Does not call rsa authentication interface(verify).You can decrypt rsa ciphertext, and then judge the decryption result.

your way is very interesting. But I mean is how to detect attack during the RSA process or after the RSA process.
by BirdKing
Mon May 14, 2018 5:50 am
Forum: Questions & Answers
Topic: mature product with biometric api powered by java card
Replies: 1
Views: 566

Re: mature product with biometric api powered by java card

fingerprint technology ? I think those apis are defined by companies itself.
by BirdKing
Wed Apr 18, 2018 6:22 am
Forum: Questions & Answers
Topic: How to verify that the RSA calculation process is under attack
Replies: 5
Views: 810

How to verify that the RSA calculation process is under attack

Hello everyone

I have a problem with RSA on javacard. How to verify that the RSA calculation process is under attack ?
Again RSA ? Does anyone have a better way?
by BirdKing
Wed Apr 18, 2018 5:57 am
Forum: Questions & Answers
Topic: Multiply big numbers
Replies: 8
Views: 1165

Re: Multiply big numbers

It's like private APIs defined by the company. Is big-end or little-end ?
by BirdKing
Fri Jan 19, 2018 1:47 am
Forum: Algorithm School
Topic: How to compute MAC
Replies: 13
Views: 4972

Re: How to compute MAC

According to GPC_Specification_v2.2.1, the ICV should be the MAC of the EXTERNAL AUTHENTICATE command. The description from GPC_Specification_v2.2.1 is : E.3.2 Message Integrity ICV using Explicit Secure Channel Initiation When using explicit Secure Channel initiation, SCP02 mandates the use of a MA...
by BirdKing
Tue Apr 19, 2016 5:51 am
Forum: Other Tools
Topic: I want a tool to get bytecode speed time
Replies: 4
Views: 2261

I want a tool to get bytecode speed time

hello,
I want a tool to get bytecode speed time oncard. Could you help me?
by BirdKing
Tue Apr 19, 2016 5:49 am
Forum: Communication
Topic: How anderstance SFGT?
Replies: 1
Views: 1555

How anderstance SFGT?

hello,
I 'm in a puzzle about the SFGT.
In 14443, what role the SFGT acts ?
by BirdKing
Tue Apr 19, 2016 1:35 am
Forum: Communication
Topic: How to implement T=CL protocol
Replies: 4
Views: 2112

Re: How to implement T=CL protocol

T=CL is block protocol, T= 1 is block protocol too. So, they are similar. You could referce to your T1 protocol implementation.
by BirdKing
Sun Dec 06, 2015 9:49 pm
Forum: Algorithm School
Topic: how compute Phi(N) of RSA?
Replies: 2
Views: 888

Re: how compute Phi(N) of RSA?

Hello,
Thank you very much.
I solved the problem following your method. :lol: :lol: :lol:
JavaCard OS : Disclaimer