Method for the generation of a digital signature of a message, corresponding generation unit, electronic apparatus and computer program product

    公开(公告)号:US10333718B2

    公开(公告)日:2019-06-25

    申请号:US15441001

    申请日:2017-02-23

    Abstract: A device includes digital signature generation circuitry. The digital signature generation circuitry, in operation, generates a digital signature of a digital message by computing a first public curve point as a scalar product of a first secret integer key and a base point of an elliptic curve and applying a transform to data of the received digital message. The applying the transform to the data of the received digital message includes generating a second secret curve point as a scalar product of a second secret integer key and the base point of the elliptic curve, generating a modified secret integer nonce as a modular multiplication of the second secret integer and a secret integer nonce, generating a third curve point as a scalar product of the secret integer nonce and the second secret curve point and generating a signature component as a function of at least the modified secret nonce, the third curve point, and a hash value generated by applying a hash function to at least the data of the received digital message. The digital signature is generated based on the signature component.

    Method for performing cryptographic operations in a processing device, corresponding processing device and computer program product

    公开(公告)号:US12206778B2

    公开(公告)日:2025-01-21

    申请号:US17857633

    申请日:2022-07-05

    Inventor: Ruggero Susella

    Abstract: One or more keys are derived from a master key by executing a plurality of encryption operations. A first encryption operation uses the master key to encrypt a plaintext input having a plurality of bytes. Multiple intermediate encryption operations are performed using a respective intermediate key generated by a previous encryption operation to encrypt respective plaintext inputs having a number of bytes. At least two bytes of a plaintext input have values based on a respective set of bits of a plurality of sets of bits of an initialization vector, wherein individual bits of the respective set of bits are introduced into respective individual bytes of the plaintext input and the respective set of bits has at least two bits and at most a number of bits equal to the number of bytes of the plaintext input.

    METHOD FOR PERFORMING AN ENCRYPTION OF AN AES TYPE, AND CORRESPONDING SYSTEM AND COMPUTER PROGRAM PRODUCT
    4.
    发明申请
    METHOD FOR PERFORMING AN ENCRYPTION OF AN AES TYPE, AND CORRESPONDING SYSTEM AND COMPUTER PROGRAM PRODUCT 有权
    执行AES类型加密的方法,以及对应系统和计算机程序产品

    公开(公告)号:US20150270967A1

    公开(公告)日:2015-09-24

    申请号:US14660569

    申请日:2015-03-17

    Abstract: A polynomial representation (bi(x)) in an AES finite field ( Z 2  [ x ] ( r  ( x ) ) ) of input bytes (bi) of a state matrix (B) is obtained. A plurality (1) of irreducible polynomials (fi(y)) and a moving map (ψi) are used to map each polynomial (bi(x)) of the polynomial representation into a respective field of polynomials ( Z 2  [ y ] ( f i  ( y ) ) ) computed with respect to one of the irreducible polynomials (fi(y)), to obtain respective moved polynomials (αi(y)). The moved polynomials (αi(y)) are mapped into a polynomial (a(z)) of a polynomial ring ( Z 2  [ z ] ( p  ( z ) ) ) , obtained by applying an isomorphism (ω) between the fields of polynomials ( Z 2  [ y ] ( f i  ( y ) ) ) and the polynomial ring ( Z 2  [ z ] ( p  ( z ) ) ) based upon the Chinese remainder theorem (CRT). AES encryption is applied to the polynomial (a(z)). The polynomial (a(z)) is reconverted into the AES finite field ( Z 2  [ x ] ( r  ( x ) ) ) to obtain an encrypted state matrix (CB).

    Abstract translation: 获得状态矩阵(B)的输入字节(bi)的AES有限域(Z 2 [x](r((x)))中的多项式表示(bi(x))。 使用多个(1)不可约多项式(fi(y))和运动图(ψi)来将多项式表示的各个多项式(bi(x))映射到多项式(Z 2 [y] (fi(y))中的一个计算的(fi(y))),以获得各自的移动多项式(αi(y))。 移动多项式(αi(y))被映射到多项式环(Z 2 [z](p(z)))的多项式(a(z))中,通过在 基于中国余数定理(CRT),多项式(Z 2 [y](fi(y)))和多项式环(Z 2 [z](p(z)))。 AES加密应用于多项式(a(z))。 将多项式(a(z))重新转换为AES有限域(Z 2 [x](r(x))),以获得加密状态矩阵(CB)。

    PROTECTION OF A MODULAR REDUCTION CALCULATION

    公开(公告)号:US20190165928A1

    公开(公告)日:2019-05-30

    申请号:US15827994

    申请日:2017-11-30

    Inventor: Ruggero Susella

    Abstract: A modular reduction calculation on a first number and a second number is protected from side-channel attacks, such as timing attacks. A first intermediate modular reduction result is calculated. A value corresponding to four times the first number is added to the first intermediate modular reduction result, generating a second intermediate modular reduction result. A value corresponding to the first number multiplied by a most significant word of the second intermediate modular reduction result plus 1, is subtracted from the second intermediate modular reduction result, generating a third intermediate modular reduction result. A cryptographic operation is performed using a result of the modular reduction calculation.

    Method for performing an encryption of an AES type, and corresponding system and computer program product
    7.
    发明授权
    Method for performing an encryption of an AES type, and corresponding system and computer program product 有权
    用于执行AES类型的加密的方法以及相应的系统和计算机程序产品

    公开(公告)号:US09425961B2

    公开(公告)日:2016-08-23

    申请号:US14660569

    申请日:2015-03-17

    Abstract: A polynomial representation (bi(x)) in an AES finite field ( Z 2 ⁡ [ x ] ( r ⁡ ( x ) ) ) of input bytes (bi) of a state matrix (B) is obtained. A plurality (1) of irreducible polynomials (fi(y)) and a moving map (ψi) are used to map each polynomial (bi(x)) of the polynomial representation into a respective field of polynomials ( Z 2 ⁡ [ y ] ( f i ⁡ ( y ) ) ) computed with respect to one of the irreducible polynomials (fi(y)), to obtain respective moved polynomials (αi(y)). The moved polynomials (αi(y)) are mapped into a polynomial (a(z)) of a polynomial ring ( Z 2 ⁡ [ z ] ( p ⁡ ( z ) ) ) , obtained by applying an isomorphism (ω) between the fields of polynomials ( Z 2 ⁡ [ y ] ( f i ⁡ ( y ) ) ) and the polynomial ring ( Z 2 ⁡ [ z ] ( p ⁡ ( z ) ) ) based upon the Chinese remainder theorem (CRT). AES encryption is applied to the polynomial (a(z)). The polynomial (a(z)) is reconverted into the AES finite field ( Z 2 ⁡ [ x ] ( r ⁡ ( x ) ) ) to obtain an encrypted state matrix (CB).

    Abstract translation: 获得状态矩阵(B)的输入字节(bi)的AES有限域(Z 2⁡[x](r⁡(x)))中的多项式表示(bi(x))。 使用多个(1)不可约多项式(fi(y))和运动图(ψi)将多项式表示的各个多项式(bi(x))映射到多项式的相应的多项式(Z 2⁡[y] (fi(y))),以获得相应的移动多项式(αi(y)))。 移动多项式(αi(y))被映射到多项式环(Z 2⁡[z](p⁡(z)))的多项式(a(z))中,通过在 基于中国余数定理(CRT),多项式(Z 2⁡[y](fi⁡(y)))和多项式环(Z 2⁡[z](p⁡(z)))。 AES加密应用于多项式(a(z))。 将多项式(a(z))重新转换为AES有限域(Z 2⁡[x](r⁡(x))),以获得加密状态矩阵(CB)。

    Method for encrypting a message through the computation of mathematical functions comprising modular multiplications
    8.
    发明授权
    Method for encrypting a message through the computation of mathematical functions comprising modular multiplications 有权
    通过计算包括模乘法的数学函数来加密消息的方法

    公开(公告)号:US09152383B2

    公开(公告)日:2015-10-06

    申请号:US13669213

    申请日:2012-11-05

    CPC classification number: G06F7/728 G06F2207/7238 H04L9/3006 H04L9/302

    Abstract: An embodiment concerns a method for encrypting a message through a cryptographic algorithm including a computation of a mathematical function including the computation of one or more modular multiplications. Such a cryptographic algorithm has a respective module. The method, carried out with an electronic device, includes: providing a first parameter; generating a random number; calculating a Montgomery parameter based on said first parameter and on a integer multiple of said random number; generating a representation of the message to be encrypted in a Montgomery domain through a Montgomery conversion function applied to the message and to the Montgomery parameter; carrying out the calculation of the mathematical function on the message represented in the Montgomery domain.

    Abstract translation: 实施例涉及通过密码算法加密消息的方法,包括计算包括一个或多个模乘法的计算的数学函数。 这样的密码算法具有相应的模块。 该方法用电子设备进行,包括:提供第一参数; 产生随机数; 基于所述第一参数和所述随机数的整数倍计算蒙哥马利参数; 通过应用于消息的蒙哥马利转换功能和蒙哥马利参数生成要在蒙哥马利域加密的消息的表示; 对Montgomery域中表示的消息进行数学函数的计算。

Patent Agency Ranking