-
公开(公告)号:US20090323944A1
公开(公告)日:2009-12-31
申请号:US12119248
申请日:2008-05-12
申请人: Scott A. VANSTONE , Ashok VADEKAR , Robert J. LAMBERT , Robert P. GALLANT , Daniel R. BROWN , Alfred MENEZES
发明人: Scott A. VANSTONE , Ashok VADEKAR , Robert J. LAMBERT , Robert P. GALLANT , Daniel R. BROWN , Alfred MENEZES
IPC分类号: H04L9/14
CPC分类号: H04L9/0869 , H04L2209/26 , H04L2209/46
摘要: A potential bias in the generation of a private key is avoided by selecting the key and comparing it against the system parameters. If a predetermined condition is attained it is accepted. If not it is rejected and a new key is generated.
摘要翻译: 通过选择密钥并将其与系统参数进行比较来避免私钥生成中的潜在偏差。 如果达到预定条件,则被接受。 如果不是,则被拒绝并生成新的密钥。
-
公开(公告)号:US20080310625A1
公开(公告)日:2008-12-18
申请号:US12135865
申请日:2008-06-09
申请人: Scott A. VANSTONE , Alfred Menezes
发明人: Scott A. VANSTONE , Alfred Menezes
IPC分类号: H04L9/30
CPC分类号: G07F7/1008 , G06F7/725 , G06Q20/341 , G06Q20/40975 , G07F7/082 , H04L9/3066 , H04L9/3247 , H04L2209/56
摘要: A digital signature scheme for a “smart” card utilizes a set of prestored signing elements and combines pairs of the elements to produce a new session pair. The combination of the elements is performed partly on the card and partly on the associated transaction device so that the exchange of information between card and device does not disclose the identity of the signing elements. The signing elements are selected in a deterministic but unpredictable manner so that each pair of elements is used once. Further signing pairs are generated by implementing the signing over an anomalous elliptic curve encryption scheme and applying a Frobenius Operator to the normal basis representation of one of the elements.
摘要翻译: 用于“智能”卡的数字签名方案利用一组预先存储的签名元素并且组合成对的元素以产生新的会话对。 元件的组合部分地在卡上部分地执行并且部分地在相关联的交易设备上执行,使得卡和设备之间的信息交换没有公开签名元件的身份。 以确定性但不可预测的方式选择签名元素,使得每对元素被使用一次。 通过实现异常椭圆曲线加密方案的签名并将Frobenius运算符应用于其中一个元素的正常基础表示来生成进一步的签名对。
-
公开(公告)号:US20120257758A1
公开(公告)日:2012-10-11
申请号:US13527891
申请日:2012-06-20
IPC分类号: H04L9/08
CPC分类号: H04L9/0844 , G06F7/725 , H04L9/0841 , H04L9/3066 , H04L9/3252
摘要: A method of determining the integrity of a message exchanged between a pair of correspondents. The message is secured by embodying the message in a function of a public key derived from a private key selected by one of the correspondents. The method comprises first obtaining the public key. The public key is then subjected to at least one mathematical test to determine whether the public key satisfies predefined mathematical characteristics. Messages utilizing the public key are accepted if the public key satisfies the predefined mathematical characteristics.
摘要翻译: 一种确定在一对记者之间交换的消息的完整性的方法。 通过将消息体现在由其中一个记者选择的私钥派生的公共密钥的功能中来保护消息。 该方法包括首先获得公钥。 然后对公钥进行至少一个数学测试,以确定公钥是否满足预定义的数学特性。 如果公钥满足预定义的数学特征,则接受使用公钥的消息。
-
公开(公告)号:US20100023775A1
公开(公告)日:2010-01-28
申请号:US11939022
申请日:2007-11-13
申请人: Scott A. VANSTONE
发明人: Scott A. VANSTONE
IPC分类号: H04L9/32
CPC分类号: H04L9/3066 , H04L9/3252 , H04L2209/30
摘要: An improved compression scheme for compressing an ECDSA signature is provided. The scheme substitutes the integer s in a signature (r, s) by a smaller value c. The value c is derived from s and another value d, d being small enough such that c is smaller than s. The compressed signature (r, c) is verified by computing a value using r and e, e being a hash of a message m, and using this value with a value R recovered from r to derive the value d. The value s can then be recovered and the full signature then recovered and verified.
摘要翻译: 提供了一种用于压缩ECDSA签名的改进的压缩方案。 该方案用签名(r,s)中的整数s代替较小的值c。 值c从s导出,另一个值d,d足够小,使得c小于s。 通过使用r和e计算值来验证压缩签名(r,c),e是消息m的散列,并且使用具有从r恢复的值R的该值导出值d。 然后可以恢复值s,然后恢复和验证完整的签名。
-
公开(公告)号:US20120290836A1
公开(公告)日:2012-11-15
申请号:US13557968
申请日:2012-07-25
CPC分类号: H04L9/32 , G06F7/725 , H04L9/0838 , H04L9/3066 , H04L9/3247
摘要: A public key encryption system exchanges information between a pair of correspondents. The recipient performs computations on the received data to recover the transmitted data or verify the identity of the sender. The data transferred includes supplementary information that relates to intermediate steps in the computations performed by the recipient.
摘要翻译: 公开密钥加密系统在一对记者之间交换信息。 收件人对接收到的数据执行计算,以恢复发送的数据或验证发送者的身份。 传送的数据包括与由接收者执行的计算中的中间步骤有关的补充信息。
-
公开(公告)号:US20120281826A1
公开(公告)日:2012-11-08
申请号:US13552373
申请日:2012-07-18
IPC分类号: H04L9/14
CPC分类号: H04L9/3242 , H04L9/3249
摘要: A system and method are provided for enabling a symmetric key to be derived, the method comprising: obtaining a plurality of key parts, wherein the plurality of key parts when combined equal the symmetric key; encrypting a first of the key parts using a first cryptographic algorithm to generate a first encrypted value; encrypting one or more remaining key parts of the plurality of key parts using respective cryptographic algorithms to generate one or more additional encrypted values, wherein each key part encrypted is encrypted using a different cryptographic algorithm; and providing the first encrypted value and the one or more additional encrypted values to an other entity to enable the other entity to derive the symmetric key.
摘要翻译: 提供了一种用于使得能够导出对称密钥的系统和方法,所述方法包括:获得多个密钥部分,其中所述多个密钥部分在组合时等于所述对称密钥; 使用第一密码算法加密第一密钥部分以生成第一加密值; 使用相应的密码算法加密所述多个密钥部分中的一个或多个剩余的关键部分,以生成一个或多个附加的加密值,其中使用不同的密码算法加密加密的每个密钥部分; 以及将第一加密值和所述一个或多个附加加密值提供给另一实体以使所述另一实体能够导出所述对称密钥。
-
公开(公告)号:US20130246805A1
公开(公告)日:2013-09-19
申请号:US13618451
申请日:2012-09-14
IPC分类号: G06F21/00
CPC分类号: G06F21/00 , H04L9/0841
摘要: Improper re-use of a static Diffie-Hellman (DH) private key may leak information about the key. The leakage is prevented by a key derivation function (KDF), but standards do not agree on key derivation functions. The module for performing a DH private key operation must somehow support multiple different KDF standards. The present invention provides an intermediate approach that neither attempts to implement all possible KDF operations, nor provide unprotected access to the raw DH private key operation. Instead, the module performs parts of the KDF operation, as indicated by the application using the module. This saves the module from implementing the entire KDF for each KDF needed. Instead, the module implements only re-usable parts that are common to most KDFs. Furthermore, when new KDFs are required, the module may be able to support them if they built on the parts that the module has implemented.
摘要翻译: 静态Diffie-Hellman(DH)私钥的不正确使用可能会泄漏关键字的信息。 通过密钥导出功能(KDF)来防止泄漏,但是标准对密钥导出函数并不一致。 用于执行DH私钥操作的模块必须以某种方式支持多种不同的KDF标准。 本发明提供了一种中间方法,既不试图实现所有可能的KDF操作,也不提供对原始DH私钥操作的不受保护的访问。 相反,模块将执行KDF操作的部分,如使用该模块的应用程序所示。 这样可以节省模块实现所需的每个KDF的整个KDF。 相反,该模块只能实现大多数KDF常用的可重复使用的部件。 此外,当需要新的KDF时,如果模块构建在模块实现的部件上,则模块可能能够支持它们。
-
公开(公告)号:US20130073857A1
公开(公告)日:2013-03-21
申请号:US13618358
申请日:2012-09-14
IPC分类号: H04L9/32
CPC分类号: H04L9/3236 , H04L9/002 , H04L9/3247 , H04L63/123 , H04L2209/04 , H04L2209/08 , H04L2209/20
摘要: A cryptosystem prevents replay attacks within existing authentication protocols, susceptible to such attacks but containing a random component, without requiring modification to said protocols. The entity charged with authentication maintains a list of previously used bit patterns, extracted from a portion of the authentication message connected to the random component. If the bit pattern has been seen before, the message is rejected; if the bit pattern has not been seen before, the bit pattern is added to the stored list and the message is accepted.
摘要翻译: 密码系统防止现有认证协议中的重放攻击,容易受到这种攻击但包含随机组件,而不需要修改所述协议。 充电认证的实体维护从连接到随机组件的认证消息的一部分中提取的先前使用的位模式的列表。 如果之前已经看到位模式,则消息被拒绝; 如果以前没有看到位模式,则将位模式添加到存储的列表中,并且该消息被接受。
-
公开(公告)号:US20120089844A1
公开(公告)日:2012-04-12
申请号:US13315509
申请日:2011-12-09
IPC分类号: H04L9/32
CPC分类号: H04L9/3236 , H04L9/002 , H04L9/3247 , H04L63/123 , H04L2209/04 , H04L2209/08 , H04L2209/20
摘要: A cryptosystem prevents replay attacks within existing authentication protocols, susceptible to such attacks but containing a random component, without requiring modification to said protocols. The entity charged with authentication maintains a list of previously used bit patterns, extracted from a portion of the authentication message connected to the random component. If the bit pattern has been seen before, the message is rejected; if the bit pattern has not been seen before, the bit pattern is added to the stored list and the message is accepted.
摘要翻译: 密码系统防止现有认证协议中的重放攻击,容易受到这种攻击但包含随机组件,而不需要修改所述协议。 充电认证的实体维护从连接到随机组件的认证消息的一部分中提取的先前使用的位模式的列表。 如果之前已经看到位模式,则消息被拒绝; 如果以前没有看到位模式,则将位模式添加到存储的列表中,并且该消息被接受。
-
-
-
-
-
-
-
-