METHOD FOR OPTIMIZING AN EXECUTION OF A GENERATION OF A CRYSTALS-DILITHIUM POST-QUANTUM SIGNATURE

    公开(公告)号:EP4422126A1

    公开(公告)日:2024-08-28

    申请号:EP23305221.6

    申请日:2023-02-21

    IPC分类号: H04L9/32 H04L9/30

    摘要: The present invention relates to a method method for optimizing the execution of the generation of a Crystals-Dilithium post-quantum digital signature σ = (c̃, z, h) of a message M with a secret key sk = (ρ, K, tr, s1, s2, t0) where ρ, K, tr are 256 bits binary values, s1 and s2 are vectors of length l, respectively k, of elements of the ring Rq whose coefficients are lower than a first predetermined value η, and t0 is a polynomial vector of length k with k, l, n and q integers, said Crystals-Dilithium post-quantum digital signature generation comprising :
    a) generating (S1) a masking vector y, of length l, of polynomials with coefficients less than a second predetermined value γ1,
    b) computing (S2) a first vector of polynomials, of length k, w = Ay, where A is a k × l matrix each of whose entries is a polynomial in the ring Rq = Zq[X]/(Xn + 1),
    c) determining (S3) a second vector of polynomials w1 and a third vector of polynomials w0, both of length k, where every polynomial coefficient wi in Ay, with i in 0, ..., k-1, is written as wi = w1i · 2γ2 + w0i where |w0i| ≤ γ2 with γ2 a third predetermined value,
    d) generating (S4) a challenge c based on the message and the second vector of polynomials w1,
    e) performing rejection tests (S5) comprising testing if test vectors generated from said vectors, said challenge and said secret key fulfill predetermined conditions, and when said conditions are not fulfilled, restarting the signature generation from step a), else generating said signature, the steps a), b), c), d), and e) being repeated until the conditions are satisfied,
    wherein performing rejection tests (S5) comprises :
    - following said determination of said third vector of polynomials w0, generating a first test vector r0 as w0-cs2, and checking whether said first test vector r0 fulfills a first condition,
    - when said first condition is met, generating a second test vector z= y + cs1, and checking whether said second test vector z fulfills a second condition, and wherein, when said second condition is met, said signature is generated from said second test vector.

    METHOD AND DEVICE FOR SECURE ENTRY OF A CODE IN A DEVICE

    公开(公告)号:EP4418154A1

    公开(公告)日:2024-08-21

    申请号:EP23305209.1

    申请日:2023-02-16

    发明人: JOSHI, Pankaj

    IPC分类号: G06F21/36 G06F21/83

    CPC分类号: G06F21/36 G06F21/83

    摘要: The invention is a method for secure entry of a code in a device (10) comprising a touch screen (18). The method comprises the following steps:
    displaying one or more streams (21,...,28) on the touch screen, each of said streams comprising its own plurality of symbols and scrolling in its own direction;
    detecting, by the device, a set comprising two or more of said symbols, each symbol of said set being specified by a user via a tap on the touch screen; and
    automatically building the code from the symbols of the set by applying a predefined rule.

    A METHOD FOR PROVISIONING A USER EQUIPMENT WITH CREDENTIALS IN A PRIVATE TELECOMMUNICATION NETWORK

    公开(公告)号:EP4395379A1

    公开(公告)日:2024-07-03

    申请号:EP22307046.7

    申请日:2022-12-26

    IPC分类号: H04W4/50 H04L9/40 H04W12/041

    摘要: The invention proposes a method for provisioning a user equipment (10) with credentials in a private telecommunication network, the private telecommunication network comprising a credentials holder and a gNB/AMF or a eNB/MME, the method comprising:
    a) Sending (40) from the user equipment (10) to the gNB/AMF or eNB/MME (11) a provisioning request;
    b) Establishing (41) a PLS key between the user equipment (10) and the gNB/AMF or eNB/MME (11) thanks to Physical Layer Security;
    c) Generating (42) at the user equipment (10) a master key;
    d) Sending (43) from the user equipment (10) to the gNB/AMF or eNB/MME (11) a message comprising data permitting to identify the user of the user equipment (10) and/or the user equipment (10) and the master key, the message being protected in integrity and confidentiality by the PLS key or by keys derived from the PLS key;
    e) Sending (44) from the gNB/AMF or eNB/MME (11) to the credentials holder (12) the data permitting to identify the user of the user equipment (10) and/or the user equipment (10) and the master key;
    f) Verifying (45) at the credentials holder (12) the data permitting to identify the user of the user equipment (10) and/or the user equipment (10);
    g) If the verification is positive, allocating at the credentials holder (12) a unique subscription identifier to the user equipment (10) and generating corresponding keys, security parameters and a key derivation function;
    h) Sending (46) from the credentials holder (12) to the gNB/AMF or eNB/MME (11) the unique subscription identifier, the security parameters and the key derivation function;
    i) Sending (47) from the gNB/AMF or eNB/MME (11) to the user equipment (10) in a message protected in integrity and confidentiality by the PLS key or by keys derived from the PLS key the unique subscription identifier, the security parameters and the key derivation function;
    j) Generating (48) at the user equipment (10) final keys, the credentials comprising the unique subscription identifier, the security parameters and the final keys.

    CONNECTIVITY MANAGEMENT IN DEVICES COMPLIANT WITH SEVERAL TECHNOLOGIES

    公开(公告)号:EP4387339A1

    公开(公告)日:2024-06-19

    申请号:EP22306888.3

    申请日:2022-12-15

    摘要: The present invention relates to a method to manage connectivity of a device having a native air interface enabling the device to connect to several networks of different technologies. The device, before entering in power saving mode, determines a technology to be used on the native air interface for subsequent power saving mode period, register at a central node active in relation with wake-up management nodes of the different technologies to centralize all wake-up triggers from the different technologies, said registration comprising an indication of the determined technology. The device, once entered in power saving mode, keeps active only the determined technology on the native air interface, and, for all wake-up triggers, is paged by the network using the determined technology on the native air interface.