Key agreement using a key derivation key
    1.
    发明授权
    Key agreement using a key derivation key 有权
    使用密钥推导密钥的密钥协商

    公开(公告)号:US09088408B2

    公开(公告)日:2015-07-21

    申请号:US13536686

    申请日:2012-06-28

    摘要: Methods, systems, and computer programs for performing key agreement operations in a communication system are described. In some aspects, a wireless network operator accesses a secret key associated with a mobile device. A key derivation function (KDF) is evaluated based on the secret key to produce a key derivation key, and the KDF is evaluated based on the key derivation key to produce an output value. A session key and a challenge value are obtained based on the output value. In some aspects, the mobile device receives the challenge value and accesses a secret key. A KDF is evaluated based on the secret key to produce a key derivation key, and the KDF is evaluated based on the key derivation key to produce an output value. A response value and a session key are obtained based on the output value. The response value is transmitted to the wireless network operator.

    摘要翻译: 描述用于在通信系统中执行密钥协商操作的方法,系统和计算机程序。 在一些方面,无线网络运营商访问与移动设备相关联的秘密密钥。 基于秘密密钥来计算密钥导出函数(KDF)以产生密钥导出密钥,并且基于密钥导出密钥来评估KDF以产生输出值。 基于输出值获得会话密钥和质询值。 在一些方面,移动设备接收挑战值并访问秘密密钥。 基于秘密密钥来评估KDF以产生密钥导出密钥,并且基于密钥导出密钥来评估KDF以产生输出值。 基于输出值获得响应值和会话密钥。 响应值被发送到无线网络运营商。

    KEY AGREEMENT USING A KEY DERIVATION KEY
    2.
    发明申请
    KEY AGREEMENT USING A KEY DERIVATION KEY 有权
    使用关键衍生键的关键协议

    公开(公告)号:US20140006786A1

    公开(公告)日:2014-01-02

    申请号:US13536686

    申请日:2012-06-28

    IPC分类号: H04W12/00

    摘要: Methods, systems, and computer programs for performing key agreement operations in a communication system are described. In some aspects, a wireless network operator accesses a secret key associated with a mobile device. A key derivation function (KDF) is evaluated based on the secret key to produce a key derivation key, and the KDF is evaluated based on the key derivation key to produce an output value. A session key and a challenge value are obtained based on the output value. In some aspects, the mobile device receives the challenge value and accesses a secret key. A KDF is evaluated based on the secret key to produce a key derivation key, and the KDF is evaluated based on the key derivation key to produce an output value. A response value and a session key are obtained based on the output value. The response value is transmitted to the wireless network operator.

    摘要翻译: 描述用于在通信系统中执行密钥协商操作的方法,系统和计算机程序。 在一些方面,无线网络运营商访问与移动设备相关联的秘密密钥。 基于秘密密钥来计算密钥导出函数(KDF)以产生密钥导出密钥,并且基于密钥导出密钥来评估KDF以产生输出值。 基于输出值获得会话密钥和质询值。 在一些方面,移动设备接收挑战值并访问秘密密钥。 基于秘密密钥来评估KDF以产生密钥导出密钥,并且基于密钥导出密钥来评估KDF以产生输出值。 基于输出值获得响应值和会话密钥。 响应值被发送到无线网络运营商。

    Key agreement for wireless communication
    3.
    发明授权
    Key agreement for wireless communication 有权
    无线通信的主要协议

    公开(公告)号:US08971851B2

    公开(公告)日:2015-03-03

    申请号:US13536747

    申请日:2012-06-28

    IPC分类号: H04M3/16

    摘要: Methods, systems, and computer programs for performing key agreement operations in a communication system are described. In some aspects, a wireless network operator receives a mobile device identifier and accesses a secret key associated with the mobile device. A message authentication code function is evaluated based on the secret key to produce an output value. A session key and a challenge value are obtained based on the output value. In some aspects, a mobile device accesses a secret key in response to receiving the challenge value from the wireless network operator. A message authentication code function is evaluated based on the secret key to produce an output value. A response value and a session key are obtained based on the output value. The response value is transmitted to the wireless network operator.

    摘要翻译: 描述用于在通信系统中执行密钥协商操作的方法,系统和计算机程序。 在一些方面,无线网络运营商接收移动设备标识符并访问与移动设备相关联的秘密密钥。 基于秘密密钥来评估消息认证码功能以产生输出值。 基于输出值获得会话密钥和质询值。 在一些方面,响应于从无线网络运营商接收到挑战值,移动设备访问秘密密钥。 基于秘密密钥来评估消息认证码功能以产生输出值。 基于输出值获得响应值和会话密钥。 响应值被发送到无线网络运营商。

    KEY AGREEMENT FOR WIRELESS COMMUNICATION
    4.
    发明申请
    KEY AGREEMENT FOR WIRELESS COMMUNICATION 有权
    无线通信的主要协议

    公开(公告)号:US20140004824A1

    公开(公告)日:2014-01-02

    申请号:US13536747

    申请日:2012-06-28

    IPC分类号: H04W12/06

    摘要: Methods, systems, and computer programs for performing key agreement operations in a communication system are described. In some aspects, a wireless network operator receives a mobile device identifier and accesses a secret key associated with the mobile device. A message authentication code function is evaluated based on the secret key to produce an output value. A session key and a challenge value are obtained based on the output value. In some aspects, a mobile device accesses a secret key in response to receiving the challenge value from the wireless network operator. A message authentication code function is evaluated based on the secret key to produce an output value. A response value and a session key are obtained based on the output value. The response value is transmitted to the wireless network operator.

    摘要翻译: 描述用于在通信系统中执行密钥协商操作的方法,系统和计算机程序。 在一些方面,无线网络运营商接收移动设备标识符并访问与移动设备相关联的秘密密钥。 基于秘密密钥来评估消息认证码功能以产生输出值。 基于输出值获得会话密钥和质询值。 在一些方面,响应于从无线网络运营商接收到挑战值,移动设备访问秘密密钥。 基于秘密密钥来评估消息认证码功能以产生输出值。 基于输出值获得响应值和会话密钥。 响应值被发送到无线网络运营商。

    Power analysis attack countermeasure for the ECDSA
    5.
    发明授权
    Power analysis attack countermeasure for the ECDSA 有权
    ECDSA的功率分析攻击对策

    公开(公告)号:US08660263B2

    公开(公告)日:2014-02-25

    申请号:US13615854

    申请日:2012-09-14

    IPC分类号: H04L9/28

    摘要: Execution of the Elliptic Curve Digital Signature Algorithm (ECDSA) requires determination of a signature, which determination involves arithmetic operations. Some of the arithmetic operations employ a long term cryptographic key. It is the execution of these arithmetic operations that can make the execution of the ECDSA vulnerable to a power analysis attack. In particular, an attacker using a power analysis attack may determine the long term cryptographic key. By modifying the sequence of operations involved in the determination of the signature and the inputs to those operations, power analysis attacks may no longer be applied to determine the long term cryptographic key.

    摘要翻译: 执行椭圆曲线数字签名算法(ECDSA)需要确定签名,该确定涉及算术运算。 一些算术运算采用长期加密密钥。 这些算术运算的执行可以使ECDSA的执行易受力分析攻击。 特别地,使用功率分析攻击的攻击者可以确定长期密码密钥。 通过修改签名确定和与这些操作的输入有关的操作顺序,功率分析攻击可能不再适用于确定长期加密密钥。

    Power analysis countermeasure for the ECMQV key agreement algorithm
    6.
    发明授权
    Power analysis countermeasure for the ECMQV key agreement algorithm 有权
    ECMQV密钥协商算法的功率分析对策

    公开(公告)号:US08645703B2

    公开(公告)日:2014-02-04

    申请号:US13489690

    申请日:2012-06-06

    IPC分类号: H04L9/32 H04K1/00

    摘要: Execution of the ECMQV key agreement algorithm requires determination of an implicit signature, which determination involves arithmetic operations. Some of the arithmetic operations employ a long-term cryptographic key. It is the execution of these arithmetic operations that can make the execution of the ECMQV key agreement algorithm vulnerable to a power analysis attack. In particular, an attacker using a power analysis attack may determine the long-term cryptographic key. By modifying the sequence of operations involved in the determination of the implicit signature and the inputs to those operations, power analysis attacks may no longer be applied to determine the long-term cryptographic key.

    摘要翻译: 执行ECMQV密钥协商算法需要确定隐式签名,该确定涉及算术运算。 一些算术运算采用长期加密密钥。 这些算术运算的执行可以使得ECMQV密钥协商算法的执行容易受到功率分析攻击。 特别地,使用功率分析攻击的攻击者可以确定长期加密密钥。 通过修改确定隐式签名所涉及的操作顺序和对这些操作的输入,功率分析攻击可能不再适用于确定长期加密密钥。

    Power analysis countermeasure for the ECMQV key agreement algorithm
    7.
    发明授权
    Power analysis countermeasure for the ECMQV key agreement algorithm 有权
    ECMQV密钥协商算法的功率分析对策

    公开(公告)号:US08219820B2

    公开(公告)日:2012-07-10

    申请号:US12040212

    申请日:2008-02-29

    IPC分类号: H04K9/32 H04K1/00

    摘要: Execution of the ECMQV key agreement algorithm requires determination of an implicit signature, which determination involves arithmetic operations. Some of the arithmetic operations employ a long-term cryptographic key. It is the execution of these arithmetic operations that can make the execution of the ECMQV key agreement algorithm vulnerable to a power analysis attack. In particular, an attacker using a power analysis attack may determine the long-term cryptographic key. By modifying the sequence of operations involved in the determination of the implicit signature and the inputs to those operations, power analysis attacks may no longer be applied to determine the long-term cryptographic key.

    摘要翻译: 执行ECMQV密钥协商算法需要确定隐式签名,该确定涉及算术运算。 一些算术运算采用长期加密密钥。 这些算术运算的执行可以使得ECMQV密钥协商算法的执行容易受到功率分析攻击。 特别地,使用功率分析攻击的攻击者可以确定长期加密密钥。 通过修改确定隐式签名所涉及的操作顺序和对这些操作的输入,功率分析攻击可能不再适用于确定长期加密密钥。

    Method and apparatus for generating a public key in a manner that counters power analysis attacks
    8.
    发明授权
    Method and apparatus for generating a public key in a manner that counters power analysis attacks 有权
    以计数器功率分析攻击的方式产生公钥的方法和装置

    公开(公告)号:US08050403B2

    公开(公告)日:2011-11-01

    申请号:US12039998

    申请日:2008-02-29

    IPC分类号: H04K1/00

    摘要: A public key for an Elliptic Curve Cryptosystem is generated in a manner that acts as a countermeasure to power analysis attacks. In particular, a known scalar multiplication method is enhanced by, in one aspect, performing a right shift on the private key. The fixed-sequence window method includes creation and handling of a translated private key. Conveniently, as a result of the right shift, the handling of the translated private key is made easier and more efficient.

    摘要翻译: 产生椭圆曲线加密系统的公钥是作为功率分析攻击的对策。 特别地,在一个方面,通过在私钥上执行右移,增强了已知的标量乘法方法。 固定顺序窗口方法包括创建和处理翻译的私钥。 方便地,由于正确的转变,翻译的私钥的处理变得更容易和更有效率。

    Efficient Implementation of Hash Algorithm on a Processor
    9.
    发明申请
    Efficient Implementation of Hash Algorithm on a Processor 有权
    在处理器上有效地实现散列算法

    公开(公告)号:US20120257742A1

    公开(公告)日:2012-10-11

    申请号:US13440264

    申请日:2012-04-05

    IPC分类号: G06F21/24

    摘要: An efficient implementation of SHA-512, and similarly SHA-384, on an ARM processor. The implementation maximizes reuse of the register values between iterations so as to minimize the need to load these values from memory. This is achieved by categorizing the iterations into even and odd ones such that the sequence of computation in the even iteration is reversed in the odd iteration and the register values at the end of one iteration are consumed at the beginning of the following one.

    摘要翻译: 在ARM处理器上SHA-512和类似SHA-384的高效实现。 该实现最大化了迭代之间的寄存器值的重用,以便最小化从存储器加载这些值的需要。 这通过将迭代分类为偶数和奇数来实现,使得偶数迭代中的计算序列在奇数迭代中反转,并且在一次迭代结束时的寄存器值在下一个开始处被消耗。

    Method and apparatus for performing elliptic curve scalar multiplication in a manner that counters power analysis attacks
    10.
    发明授权
    Method and apparatus for performing elliptic curve scalar multiplication in a manner that counters power analysis attacks 有权
    以计数器功率分析攻击的方式执行椭圆曲线标量乘法的方法和装置

    公开(公告)号:US08243919B2

    公开(公告)日:2012-08-14

    申请号:US12039996

    申请日:2008-02-29

    IPC分类号: H04K1/00

    摘要: When multiplicative splitting is used to hide a scalar in an Elliptic Curve scalar Multiplication ECSM operation, the associated modular division operation employs the known Almost Montgomery Inversion algorithm. By including dummy operations in some of the branches of the main iteration loop of the Almost Montgomery Inversion algorithm, all branches of the algorithm may be viewed, from the perspective of a Power Analysis-based attack, as equivalent and, accordingly, devoid of information useful in determining the value of the scalar, which may be a cryptographic private key.

    摘要翻译: 当乘法分割用于隐藏椭圆曲线乘法ECSM操作中的标量时,相关联的模块划分操作采用已知的几乎蒙哥马利反演算法。 通过在几乎蒙哥马利反转算法的主迭代循环的一些分支中包括虚拟操作,从基于功率分析的攻击的角度来看,该算法的所有分支可以等效,因此没有信息 可用于确定标量的值,其可以是密码私钥。