RESILIENT CRYPTOGRAPHIC SCHEME
    1.
    发明申请
    RESILIENT CRYPTOGRAPHIC SCHEME 有权
    灵活的CRYPTOGRAPHIC计划

    公开(公告)号:US20100284540A1

    公开(公告)日:2010-11-11

    申请号:US12840008

    申请日:2010-07-20

    IPC分类号: H04L9/08

    CPC分类号: H04L9/3242 H04L9/3249

    摘要: A system and method are provided for enabling a symmetric key to be derived, the method comprising: obtaining a plurality of key parts, wherein the plurality of key parts when combined equal the symmetric key; encrypting a first of the key parts using a first cryptographic algorithm to generate a first encrypted value; encrypting one or more remaining key parts of the plurality of key parts using respective cryptographic algorithms to generate one or more additional encrypted values, wherein each key part encrypted is encrypted using a different cryptographic algorithm; and providing the first encrypted value and the one or more additional encrypted values to an other entity to enable the other entity to derive the symmetric key.

    摘要翻译: 提供了一种用于使得能够导出对称密钥的系统和方法,所述方法包括:获得多个密钥部分,其中所述多个密钥部分在组合时等于所述对称密钥; 使用第一密码算法加密第一密钥部分以生成第一加密值; 使用相应的密码算法加密所述多个密钥部分中的一个或多个剩余的关键部分以生成一个或多个附加的加密值,其中使用不同的加密算法加密加密的每个密钥部分; 以及将第一加密值和所述一个或多个附加加密值提供给另一实体以使所述另一实体能够导出所述对称密钥。

    Masked digital signatures
    2.
    发明授权
    Masked digital signatures 有权
    蒙面的数字签名

    公开(公告)号:US08359468B2

    公开(公告)日:2013-01-22

    申请号:US13172138

    申请日:2011-06-29

    IPC分类号: H04L9/00

    摘要: The present invention relates to digital signature operations using public key schemes in a secure communications system and in particular for use with processors having limited computing power such as ‘smart cards’. This invention describes a method for creating and authenticating a digital signature comprising the steps of selecting a first session parameter k and generating a first short term public key derived from the session parameter k, computing a first signature component r derived from a first mathematical function using the short term public key, selecting a second session parameter t and computing a second signature component s derived from a second mathematical function using the second session parameter t and without using an inverse operation, computing a third signature component using the first and second session parameters and sending the signature components (s, r, c) as a masked digital signature to a receiver computer system. In the receiver computer system computing a recovered second signature component s′ by combining a third signature component with the second signature component to derive signature components (s′, r) as an unmasked digital signature. Verifying these signature components as in a usual EIGamal or ECDSA type signature verification.

    摘要翻译: 本发明涉及在安全通信系统中使用公共密钥方案的数字签名操作,特别是与智能卡等计算能力有限的处理器一起使用。 本发明描述了一种用于创建和认证数字签名的方法,包括以下步骤:选择第一会话参数k并生成从会话参数k导出的第一短期公钥,使用从第一数学函数导出的第一签名组件 短期公钥,选择第二会话参数t并且使用第二会话参数t计算从第二数学函数导出的第二签名组件,并且不使用反向操作,使用第一和第二会话参数来计算第三签名组件 并将签名组件(s,r,c)作为掩蔽的数字签名发送到接收机计算机系统。 在接收机计算机系统中,通过将第三签名组件与第二签名组件组合来计算恢复的第二签名组件s',以将签名组件(s',r)导出为未被屏蔽的数字签名。 验证这些签名组件,如通常的EIGAMAL或ECDSA类型的签名验证。

    Resilient cryptographic scheme
    3.
    发明授权
    Resilient cryptographic scheme 有权
    弹性密码方案

    公开(公告)号:US08233617B2

    公开(公告)日:2012-07-31

    申请号:US12840008

    申请日:2010-07-20

    IPC分类号: H04L9/14 G06F21/24

    CPC分类号: H04L9/3242 H04L9/3249

    摘要: A system and method are provided for enabling a symmetric key to be derived, the method comprising: obtaining a plurality of key parts, wherein the plurality of key parts when combined equal the symmetric key; encrypting a first of the key parts using a first cryptographic algorithm to generate a first encrypted value; encrypting one or more remaining key parts of the plurality of key parts using respective cryptographic algorithms to generate one or more additional encrypted values, wherein each key part encrypted is encrypted using a different cryptographic algorithm; and providing the first encrypted value and the one or more additional encrypted values to an other entity to enable the other entity to derive the symmetric key.

    摘要翻译: 提供了一种用于使得能够导出对称密钥的系统和方法,所述方法包括:获得多个密钥部分,其中所述多个密钥部分在组合时等于所述对称密钥; 使用第一密码算法加密第一密钥部分以生成第一加密值; 使用相应的密码算法加密所述多个密钥部分中的一个或多个剩余的关键部分以生成一个或多个附加的加密值,其中使用不同的加密算法加密加密的每个密钥部分; 以及将第一加密值和所述一个或多个附加加密值提供给另一实体以使所述另一实体能够导出所述对称密钥。

    Two way authentication protocol
    4.
    发明授权
    Two way authentication protocol 有权
    双向认证协议

    公开(公告)号:US06487660B1

    公开(公告)日:2002-11-26

    申请号:US09432166

    申请日:1999-11-02

    IPC分类号: G06F124

    摘要: A method of authenticating a pair of correspondents C,S to permit the exchange of information therebetween, each of the correspondents having a respective private key, e, d and a public key, Qu, and Qs derived from a generator element of a group and a respective ones of the private keys e,d, the method comprising the steps of: a first of the correspondents C generating a session value x; the first correspondent generating a private value t, a public value derived from the private value t and the generator and a shared secret value derived from the private value t and the public key Qs of the second correspondent; the second correspondent generating a challenge value y and transmitting the challenge value y to the first correspondent; the first correspondent in response thereto computing a value h by applying a function H to the challenge value y, the session value x, the public value an of the first correspondent; the first correspondent signing the value h utilizing the private key e; the first correspondent transmitting to the second correspondent the signature including the session value x, and the private value t; and the second correspondent verifying the signature utilizing the public key Qu of the first correspondent and whereby verification of the signature authenticates the first correspondent to the second correspondent.

    摘要翻译: 一种认证一对记者C,S以允许它们之间的信息交换的方法,每个通信对象具有从组的发生器元素导出的相应私钥,e,d和公钥Qu和Q,以及 相应的私钥e,d,该方法包括以下步骤:生成会话值x的通信对象C中的第一个; 生成私有值t的第一通信对象,从私有值t和生成器导出的公有值和从私有值t和第二通信对方的公钥Qs导出的共享秘密值; 第二记者产生质询值y并将询问值y发送给第一通讯员; 响应于第一记者通过将函数H应用于质询值y,会话值x,第一记者的公开值a来计算值h; 第一个记者利用私钥e签名值h; 第一记者向第二记者发送包括会话值x和私有值t的签名; 以及第二记者利用第一记者的公钥Qu验证签名,由此签名的验证对第二通信对象的第一对应者进行认证。

    MASKED DIGITAL SIGNATURES
    6.
    发明申请
    MASKED DIGITAL SIGNATURES 有权
    屏蔽数字签名

    公开(公告)号:US20110258455A1

    公开(公告)日:2011-10-20

    申请号:US13172138

    申请日:2011-06-29

    IPC分类号: H04L9/32

    摘要: The present invention relates to digital signature operations using public key schemes in a secure communications system and in particular for use with processors having limited computing power such as ‘smart cards’. This invention describes a method for creating and authenticating a digital signature comprising the steps of selecting a first session parameter k and generating a first short term public key derived from the session parameter k, computing a first signature component r derived from a first mathematical function using the short term public key, selecting a second session parameter t and computing a second signature component s derived from a second mathematical function using the second session parameter t and without using an inverse operation, computing a third signature component using the first and second session parameters and sending the signature components (s, r, c) as a masked digital signature to a receiver computer system. In the receiver computer system computing a recovered second signature component s′ by combining a third signature component with the second signature component to derive signature components (s′, r) as an unmasked digital signature. Verifying these signature components as in a usual EIGamal or ECDSA type signature verification.

    摘要翻译: 本发明涉及在安全通信系统中使用公共密钥方案的数字签名操作,特别是与具有计算能力有限的处理器(例如“智能卡”)一起使用。 本发明描述了一种用于创建和认证数字签名的方法,包括以下步骤:选择第一会话参数k并生成从会话参数k导出的第一短期公钥,使用从第一数学函数导出的第一签名组件 短期公钥,选择第二会话参数t并且使用第二会话参数t计算从第二数学函数导出的第二签名组件,并且不使用反向操作,使用第一和第二会话参数来计算第三签名组件 并将签名组件(s,r,c)作为掩蔽的数字签名发送到接收机计算机系统。 在接收机计算机系统中,通过将第三签名组件与第二签名组件组合来计算恢复的第二签名组件s',以将签名组件(s',r)导出为未屏蔽的数字签名。 验证这些签名组件,如通常的EIGAMAL或ECDSA类型的签名验证。

    Generation of session keys for El Gamal-like protocols from low hamming weight integers
    7.
    发明授权
    Generation of session keys for El Gamal-like protocols from low hamming weight integers 失效
    从低汉明重量整数生成El Gamal样协议的会话密钥

    公开(公告)号:US06337909B1

    公开(公告)日:2002-01-08

    申请号:US08948796

    申请日:1997-10-10

    IPC分类号: H04L928

    摘要: The public key, either short term “session” key or long term key, is generated by combining a pair of components. A first component is obtained by utilizing an integer with a relatively low Hamming weight as an exponent to facilitate exponentiation. The second component is a precomputed secret value that is of the form resulting from the exponentiation of the generator of the group element by an integer that has the requisite Hamming weight. The two components are combined to provide the public key and the two exponents combined to provide the corresponding private key.

    摘要翻译: 通过组合一对组件来生成公钥,短期“会话”密钥或长期密钥。 通过利用具有相对较低的汉明重量的整数作为指数来获得第一分量以促成取幂。 第二个组件是预先计算的秘密值,其形式是由组元素的生成器乘以具有所需汉明权重的整数而产生的。 组合两个组件以提供公钥和两个指数组合以提供相应的私钥。

    Method and system for multimedia access control enablement
    9.
    发明授权
    Method and system for multimedia access control enablement 失效
    多媒体访问控制功能的方法和系统

    公开(公告)号:US5319705A

    公开(公告)日:1994-06-07

    申请号:US964324

    申请日:1992-10-21

    摘要: A method and system are disclosed for securely distributing a plurality of software files from a software distribution processor to a user processor, while selectively enabling the user processor to only use a subset of a lesser plurality of the software files. This is achieved by employing a customer key which includes a clear customer number and a derived portion derived from the customer number. The customer key is transformed into a second customer key which serves as a key expression for encrypting a file encryption key specifically intended for a respective one of the plurality of files. A plurality of software files can be stored together, for example on a CD-ROM, with each file encrypted under a corresponding file encryption key. The CD-ROM can be distributed to many user processors. When a specific user processor needs to run one of the software files, a request will be transmitted from the user processor to the software distribution processor. In response to that request, an encrypted file encryption key specific for the requested file, will be transmitted to the user processor. This will enable the user processor to decrypt only the requested file from the CD-ROM. All other files on the CD-ROM remain in their encrypted form and cannot be decrypted and used by the file encryption key received from the software distribution processor.

    摘要翻译: 公开了一种用于将多个软件文件从软件分发处理器安全地分发到用户处理器的方法和系统,同时选择性地使得用户处理器仅使用较少多个软件文件的子集。 这是通过采用客户密钥来实现的,客户密钥包括清除客户号码和从客户号码导出的派生部分。 客户密钥被转换成第二客户密钥,其作为用于加密专门针对多个文件中的相应文件的文件加密密钥的关键表达。 可以将多个软件文件一起存储在例如CD-ROM上,每个文件在相应的文件加密密钥下被加密。 CD-ROM可以分发给许多用户处理器。 当特定用户处理器需要运行其中一个软件文件时,将从用户处理器向软件分发处理器发送请求。 响应于该请求,特定于所请求文件的加密文件加密密钥将被发送到用户处理器。 这将使用户处理器只能从CD-ROM解密所请求的文件。 CD-ROM上的所有其他文件保持加密形式,不能被从软件分发处理器接收的文件加密密钥解密和使用。

    Method and apparatus for validating entry of cryptographic keys
    10.
    发明授权
    Method and apparatus for validating entry of cryptographic keys 失效
    用于验证加密密钥的输入的方法和装置

    公开(公告)号:US5214698A

    公开(公告)日:1993-05-25

    申请号:US672265

    申请日:1991-03-20

    IPC分类号: G09C1/00 H04L9/08

    CPC分类号: H04L9/088

    摘要: A cryptographic facility implements a multiple key part import procedure. The installation manager can verify that a key part has been correctly entered and has not been compromised. The security requirement for the procedure is that no single party can subvert the system security by misusing the procedure. This is accomplished by the use of a control-vector-dependent verification pattern to indicate that each key part has been accepted by using the proper control vector and the use of different key switch positions to specify whether the key part is a master key part or an operational key part and whether the key part is a first part or a subsequent key part. The apparatus provides an automatic reset of the key part register at the completion of each key-entry instruction so that each key part can be imported only once. This prevents the same key part from being imported twice as different key part types. The apparatus also prevents a key part from being combined with itself to create a known key. The procedure is fail-safe so that the program cannot steal a key part from a previously failed procedure.

    摘要翻译: 密码工具实现了多重关键部分导入过程。 安装管理员可以验证关键部件是否已正确输入,并且未被泄露。 程序的安全要求是,没有一方可以通过滥用程序颠覆系统安全。 这是通过使用控制向量相关的验证模式来实现的,以通过使用适当的控制向量来指示每个关键部分已被接受,并且使用不同的键开关位置来指定关键部分是主键部分还是主键部分 操作键部分以及关键部分是第一部分还是随后的关键部分。 该装置在完成每个键入指令时提供关键部分寄存器的自动复位,使得每个键部分只能被导入一次。 这样可以防止相同的关键部分作为不同的关键部件类型被导入两次。 该装置还防止关键部分与其自身组合以创建已知密钥。 该过程是故障安全的,以便程序不能从以前失败的过程中窃取关键部分。