摘要:
An encryption device (FIG. 15) performs elliptic curve encryption using a secret key. The encryption device includes: operation means (ECDBL, ECADD) for performing scalar multiplication of a point on an elliptic curve; storage (T[0]-T[2]) having a plurality of data storing areas; and means (SEL) for determining, in accordance with a bit sequence of a given value (d) and with a random value (RNG), an address of one of the plurality of data storage areas that is to be coupled to the operation means for each scalar multiplication.
摘要:
A smoothing device, according to the present invention, is used to perform smoothing in a conduit line, or the like. The smoothing device has a fluid pressure motor with a cutter attached to its output shaft and guide rollers for guiding the smoothing device in the longitudinal direction of the conduit line. Prescribed ones among the guide rollers are relatively movable in the radial direction of the conduit line by fluid pressure cylinders, springs, or the like, and pressed against the inner wall of the conduit line. The remaining guide rollers are fixed to the smoothing device with respect to the radial direction of the conduit line so as to have an automatic aligning mechanism, thereby keeping the rotatable cutter along the center of the conduit line. In the fluid pressure motor, turbine and water nozzles, for injecting water to the turbine, are detachable, facilitating the replacement of worn parts. To easily advance the smoothing device, a propelling device, using a plurality of propelling shafts connected by universal joints with rollers disposed near the connected portions of the shafts and using screws, is provided. To facilitate the discharge of the removed debris and drainage, a high-pressure water jet pump is provided. The coupler absorbing the rotation is attached to the front face of the cutter thus enabling the smoothing device to be towed in the direction of the cutter with a rope.
摘要:
A video data playback system for reproducing requested video data by switching coded video data to be reproduced between normal playback coded video data and fast playback coded video data according to a requested playback mode, where the normal playback coded video data are encoded by a first video coding scheme using both intra-frame coding and inter-frame coding, while the fast playback coded video data are encoded by a second video coding scheme using only intra-frame coding and having a playback bit rate and a frame rate identical to those of the normal playback coded video data. The normal playback coded video data can be obtained by encoding the original video data first, then the fast playback coded video data can be obtained by encoding selectively decoded normal playback coded video data. Alternatively, the normal and fast playback coded video data can be obtained by synchronizing start and end of encoding by the first video coding scheme and encoding by the second video coding scheme.
摘要:
A device for purifying fuel vapors generated in vehicle fuel tank including a valve which normally closes a through hole provided in an upper wall of the tank and communicating with a canister through a conduit, a flap provided for normally closing a filler pipe mounted for refuelling the tank and adapted to be opened by a fuel dispensing nozzle inserted in the filler pipe, and a member for connecting the flap with the valve so as to transmit the opening movement of the flap to the valve to open the latter for allowing the fuel vapors in the tank to pass through the hole and the conduit into the canister.
摘要:
Based on an encrypting method for performing an exponential remainder calculation y=ad (mod n) from an u-bit exponent d=(du-1, . . . , d0)2, input data a, and a modulo n, calculating a′=a2(mod n) is performed first. Next, calculating y=(a′)f(mod n) is performed on f=(du-1, du-2, . . . , d1)2. Then, when d0=1, calculating y=y×a (mod n) is performed. Then, outputting y=ad (mod n) is performed. In the first step, although an attacker inputs data including a minus value such as a=−1 and a=s, −s, etc., only plus values can be constantly generated in multiplication and squaring. Therefore, the method makes it hard to estimate a secret key using power analyzing attacks such as the SPA and the DPA, thereby realizing an encryption processor having high tamper-resistance.
摘要:
401 stores, in 302, key d′ obtained by subtracting random number 2r held in 201 from key d held in 105. When an operation starts, the values “−C” and “−C2” are calculated respectively, and the resultant values are stored in a multiplication table memory 205 together with value “C”. In a first operation cycle, 107 selects and outputs an intermediate value 108 held in an in-operation data register 103, and thereby makes a modular-multiplication operation circuit 104 perform squaring. In the second operation cycle, 107 selects and outputs one of three values held in 205 in accordance with the combination of key bit value d′i and random number bit value ri, and thereby makes the modular-multiplication operation circuit 104 perform multiplication. Thereby, a cryptographic processing device that requires a short operation time period, small circuit scale, and has sufficient security can be realized.
摘要:
A common key block encryption apparatus for performing a nonlinear transformation with a multiplication executed in a binary field or a composite field includes a computing unit to execute a computation other than the nonlinear transformation with fixed value masked input data obtained by XORing input data with a fixed mask value, an XOR operation circuit to transform all input data into fixed value masked input data by XORing the input data with a fixed mask value and to transform the data into random value masked input data by XORing the input data with a random mask value in the multiplication, a multiplier to execute a multiplication based on the random value masked input data output from the XOR operation circuit, and a random value mask-to-fixed mask value transformation circuit to again transform the random value masked output data into fixed value masked output data and to output the data.
摘要:
In a MISTY1 FI function, an exclusive OR to which a round key KIij2 is inputted is arranged between an exclusive OR arranged on a 9-bit critical path in a first MISTY structure and a zero-extend conversion connected to the branching point of a 7-bit right system data path. Then, a 9-bit round key KIij1 is truncate-converted to seven bits, the exclusive OR of the seven bits and the round key KIij1 is calculated by an exclusive OR and the calculation result is inputted to an exclusive OR arranged on the right system data path in the second stage MISTY structure.
摘要:
401 stores, in 302, key d′ obtained by subtracting random number 2r held in 201 from key d held in 105. When an operation starts, the values “−C” and “−C2” are calculated respectively, and the resultant values are stored in a multiplication table memory 205 together with value “C”. In a first operation cycle, 107 selects and outputs an intermediate value 108 held in an in-operation data register 103, and thereby makes a modular-multiplication operation circuit 104 perform squaring. In the second operation cycle, 107 selects and outputs one of three values held in 205 in accordance with the combination of key bit value d′i and random number bit value ri, and thereby makes the modular-multiplication operation circuit 104 perform multiplication. Thereby, a cryptographic processing device that requires a short operation time period, small circuit scale, and has sufficient security can be realized.
摘要:
In a MISTY1 FI function, an exclusive OR to which a round key KIij2 is inputted is arranged between an exclusive OR arranged on a 9-bit critical path in a first MISTY structure and a zero-extend conversion connected to the branching point of a 7-bit right system data path. Then, a 9-bit round key KIij1 is truncate-converted to seven bits, the exclusive OR of the seven bits and the round key KIij1 is calculated by an exclusive OR and the calculation result is inputted to an exclusive OR arranged on the right system data path in the second stage MISTY structure.