Block cipher using auxiliary transformation
    1.
    发明授权
    Block cipher using auxiliary transformation 有权
    使用辅助转换的块密码

    公开(公告)号:US07760871B2

    公开(公告)日:2010-07-20

    申请号:US11260126

    申请日:2005-10-28

    IPC分类号: H04L9/06 H04L9/18

    摘要: It is desired to share one circuit by an encryption unit 200 and a decryption unit 500. A normal data transformation unit (FL) 251 and an inverse data transformation unit (FL−1) 273 are located at point symmetry on a non-linear data transformation unit 220, and a normal data transformation unit (FL) 253 and an inverse data transformation unit (FL−1) 271 are located at point symmetry on the non-linear data transformation unit 220. Therefore, the encryption unit 200 and the decryption unit 500 can be configured using the same circuits.

    摘要翻译: 期望由加密单元200和解密单元500共享一个电路。正常数据变换单元(FL)251和逆数据变换单元(FL-1)273位于非线性数据上的点对称位置 变换单元220和正常数据变换单元(FL)253和逆数据变换单元(FL-1)271位于非线性数据变换单元220上的点对称处。因此,加密单元200和解密 单元500可以使用相同的电路进行配置。

    Method and apparatus for evaluating the strength of an encryption
    4.
    发明授权
    Method and apparatus for evaluating the strength of an encryption 失效
    用于评估加密强度的方法和装置

    公开(公告)号:US07187769B1

    公开(公告)日:2007-03-06

    申请号:US09463907

    申请日:1999-06-01

    IPC分类号: H04K3/00

    摘要: In the evaluation of the randomness of an S-box, measures of resistance to higher order cryptanalysis, interpolation cryptanalysis, partitioning cryptanalysis and differential-linear cryptanalysis and necessary conditions for those measures to have resistance to each cryptanalysis are set, then for functions as candidates for the S-box, it is evaluated whether one or all of the conditions are satisfied, and those of the candidate functions for which one or all of the conditions are satisfied are selected as required. It is also possible to further evaluate the resistance of such selected functions to at least one of differential cryptanalysis and linear cryptanalysis and select those of the candidate functions which are resistant to at least one of the cryptanalyses as required.

    摘要翻译: 在对S-box随机性的评估中,设定了抵抗高阶密码分析,内插密码分析,分配密码分析和差分线性密码分析的措施以及对每个密码分析具有抵制性的措施的必要条件, 对于S盒,评估是否满足一个或所有条件,并且根据需要选择满足一个或所有条件的候选功能的那些。 还可以进一步评估这些所选功能对差分密码分析和线性密码分析中的至少一种的抵抗性,并根据需要选择对至少一种密码子具有抵抗性的候选功能。

    Inverse calculation apparatus and recording medium having stored thereon a program for executing inverse calculation
    5.
    发明授权
    Inverse calculation apparatus and recording medium having stored thereon a program for executing inverse calculation 有权
    在其上存储有用于执行反向计算的程序的反向计算装置和记录介质

    公开(公告)号:US06850960B2

    公开(公告)日:2005-02-01

    申请号:US10419241

    申请日:2003-04-21

    摘要: In an inverse calculation, x is road out of a storage means, [x/2] is calculated and stored therein as b, a lent significant bit of b is stored as a, [(ax+b)/2] is calculated and stored as updated b, and low-order two bits of x are stored as y. Then, for i=1, 2, . . . , n−1, by is calculated, a is updated with −by, [(b+ax)/(2^(2i))] is calculated and stored as updated b, and y+a2^(2i) is calculated and stored as updated y, where y is road out as the result of inverse calculation.

    摘要翻译: 在逆计算中,从存储装置读出x,计算出[x / 2]并存储为b,b的最低有效位被存储为,[(ax + b)/ 2]被计算, 存储为更新b,x的低位2位被存储为y。 那么,对于i = 1,2,... 。 。 ,计算n-1,通过-by更新a,计算[(b + ax)/(2 ^(2))]并将其存储为更新的b,并且y + a2 ^(2 < i>)被计算并存储为更新的y,其中作为反向计算的结果读出y。

    Block cipher apparatus using auxiliary transformation
    7.
    发明申请
    Block cipher apparatus using auxiliary transformation 有权
    使用辅助转换的块密码设备

    公开(公告)号:US20060050874A1

    公开(公告)日:2006-03-09

    申请号:US11260129

    申请日:2005-10-28

    IPC分类号: H04K1/06

    摘要: It is desired to share one circuit by an encryption unit 200 and a decryption unit 500. A normal data transformation unit (FL) 251 and an inverse data transformation unit ((FL−1)) 273 are located at point symmetry on a non-linear data transformation unit 220, and a normal data transformation unit (FL) 253 and an inverse data transformation unit ((FL−1)) 271 are located at point symmetry on the non-linear data transformation unit 220. Therefore, the encryption unit 200 and the decryption unit 500 can be configured using the same circuits.

    摘要翻译: 期望由加密单元200和解密单元500共享一个电路。正常数据变换单元(FL)251和逆数据变换单元((FL <-1> 0))273位于 在非线性数据变换单元220处的点对称,以及正常数据变换单元(FL)253和逆数据变换单元((FL <-1> 0))271位于点对称 非线性数据变换单元220.因此,加密单元200和解密单元500可以使用相同的电路来配置。

    Block cipher apparatus using auxiliary transformation
    8.
    发明申请
    Block cipher apparatus using auxiliary transformation 有权
    使用辅助转换的块密码设备

    公开(公告)号:US20060045265A1

    公开(公告)日:2006-03-02

    申请号:US11260111

    申请日:2005-10-28

    IPC分类号: H04K1/06

    摘要: It is desired to share one circuit by an encryption unit 200 and a decryption unit 500. A normal data transformation unit (FL) 251 and an inverse data transformation unit (FL−1) 273 are located at point symmetry on a non-linear data transformation unit 220, and a normal data transformation unit (FL) 253 and an inverse data transformation unit (FL−1) 271 are located at point symmetry on the non-linear data transformation unit 220. Therefore, the encryption unit 200 and the decryption unit 500 can be configured using the same circuits.

    摘要翻译: 期望由加密单元200和解密单元500共享一个电路。 正常数据变换单元(FL)251和逆数据变换单元(FL -1)273位于非线性数据变换单元220的点对称位置,并且正常数据变换单元 FL)253,并且逆数据变换单元(FL <-1>)271位于非线性数据变换单元220上的点对称处。 因此,加密单元200和解密单元500可以使用相同的电路来配置。

    Scheme for arithmetic operations in finite field and group operations
over elliptic curves realizing improved computational speed
    10.
    发明授权
    Scheme for arithmetic operations in finite field and group operations over elliptic curves realizing improved computational speed 失效
    在椭圆曲线上的有限域和组运算中的算术运算方案实现了改进的计算速度

    公开(公告)号:US6038581A

    公开(公告)日:2000-03-14

    申请号:US14891

    申请日:1998-01-28

    IPC分类号: G06F7/72 G06F7/00

    CPC分类号: G06F7/725 G06F7/724 G06F7/726

    摘要: A scheme for arithmetic operations in finite field and group operations over elliptic curves capable of realizing a very fast implementation. According to this scheme, by using a normal basis [.alpha. .alpha.+1], the multiplicative inverse calculation and the multiplication in the finite field GF(2.sup.2n) can be realized as combinations of multiplications, additions and a multiplicative inverse calculation in the subfield GF(2.sup.n). Also, by using a standard basis [1.alpha.], the multiplication, the square calculation, and the multiplicative inverse calculation in the finite field GF(2.sup.2n) can be realized as combinations of multiplications, additions and a multiplicative inverse calculation in the subfield GF(2.sup.n). These arithmetic operations can be utilized for calculating rational expressions expressing group operations over elliptic curves that are used in information security techniques such as elliptic curve cryptosystems.

    摘要翻译: 有限域和椭圆曲线上的组运算的算术运算方案能够实现非常快的实现。 根据该方案,通过使用正常基础αα+ 1,有限域GF(22n)中的乘法逆计算和乘法可以被实现为子场GF中的乘法,加法和乘法逆计算的组合 (2n)。 此外,通过使用标准基础,有限域GF(22n)中的乘法,平方计算和乘法逆计算可以被实现为子域GF中的乘法,加法和乘法逆计算的组合 (2n)。 这些算术运算可用于计算用于信息安全技术(例如椭圆曲线密码系统)中使用的椭圆曲线上的组运算的有理表达式。