DIGITAL SIGNATURE ON A SMARTCARD
    2.
    发明申请
    DIGITAL SIGNATURE ON A SMARTCARD 审中-公开
    智能卡上的数字签名

    公开(公告)号:US20080310625A1

    公开(公告)日:2008-12-18

    申请号:US12135865

    申请日:2008-06-09

    IPC分类号: H04L9/30

    摘要: A digital signature scheme for a “smart” card utilizes a set of prestored signing elements and combines pairs of the elements to produce a new session pair. The combination of the elements is performed partly on the card and partly on the associated transaction device so that the exchange of information between card and device does not disclose the identity of the signing elements. The signing elements are selected in a deterministic but unpredictable manner so that each pair of elements is used once. Further signing pairs are generated by implementing the signing over an anomalous elliptic curve encryption scheme and applying a Frobenius Operator to the normal basis representation of one of the elements.

    摘要翻译: 用于“智能”卡的数字签名方案利用一组预先存储的签名元素并且组合成对的元素以产生新的会话对。 元件的组合部分地在卡上部分地执行并且部分地在相关联的交易设备上执行,使得卡和设备之间的信息交换没有公开签名元件的身份。 以确定性但不可预测的方式选择签名元素,使得每对元素被使用一次。 通过实现异常椭圆曲线加密方案的签名并将Frobenius运算符应用于其中一个元素的正常基础表示来生成进一步的签名对。

    STRENGTHENED PUBLIC KEY PROTOCOL
    3.
    发明申请
    STRENGTHENED PUBLIC KEY PROTOCOL 有权
    加强公共密钥协议

    公开(公告)号:US20120257758A1

    公开(公告)日:2012-10-11

    申请号:US13527891

    申请日:2012-06-20

    IPC分类号: H04L9/08

    摘要: A method of determining the integrity of a message exchanged between a pair of correspondents. The message is secured by embodying the message in a function of a public key derived from a private key selected by one of the correspondents. The method comprises first obtaining the public key. The public key is then subjected to at least one mathematical test to determine whether the public key satisfies predefined mathematical characteristics. Messages utilizing the public key are accepted if the public key satisfies the predefined mathematical characteristics.

    摘要翻译: 一种确定在一对记者之间交换的消息的完整性的方法。 通过将消息体现在由其中一个记者选择的私钥派生的公共密钥的功能中来保护消息。 该方法包括首先获得公钥。 然后对公钥进行至少一个数学测试,以确定公钥是否满足预定义的数学特性。 如果公钥满足预定义的数学特征,则接受使用公钥的消息。

    COMPRESSED ECDSA SIGNATURES
    4.
    发明申请
    COMPRESSED ECDSA SIGNATURES 有权
    压缩的ECDSA标志

    公开(公告)号:US20100023775A1

    公开(公告)日:2010-01-28

    申请号:US11939022

    申请日:2007-11-13

    申请人: Scott A. VANSTONE

    发明人: Scott A. VANSTONE

    IPC分类号: H04L9/32

    摘要: An improved compression scheme for compressing an ECDSA signature is provided. The scheme substitutes the integer s in a signature (r, s) by a smaller value c. The value c is derived from s and another value d, d being small enough such that c is smaller than s. The compressed signature (r, c) is verified by computing a value using r and e, e being a hash of a message m, and using this value with a value R recovered from r to derive the value d. The value s can then be recovered and the full signature then recovered and verified.

    摘要翻译: 提供了一种用于压缩ECDSA签名的改进的压缩方案。 该方案用签名(r,s)中的整数s代替较小的值c。 值c从s导出,另一个值d,d足够小,使得c小于s。 通过使用r和e计算值来验证压缩签名(r,c),e是消息m的散列,并且使用具有从r恢复的值R的该值导出值d。 然后可以恢复值s,然后恢复和验证完整的签名。

    ACCELERATED SIGNATURE VERIFICATION ON AN ELLIPTIC CURVE
    5.
    发明申请
    ACCELERATED SIGNATURE VERIFICATION ON AN ELLIPTIC CURVE 有权
    在ELLIPTIC曲线上加速签名验证

    公开(公告)号:US20120290836A1

    公开(公告)日:2012-11-15

    申请号:US13557968

    申请日:2012-07-25

    IPC分类号: H04L9/00 H04L9/32

    摘要: A public key encryption system exchanges information between a pair of correspondents. The recipient performs computations on the received data to recover the transmitted data or verify the identity of the sender. The data transferred includes supplementary information that relates to intermediate steps in the computations performed by the recipient.

    摘要翻译: 公开密钥加密系统在一对记者之间交换信息。 收件人对接收到的数据执行计算,以恢复发送的数据或验证发送者的身份。 传送的数据包括与由接收者执行的计算中的中间步骤有关的补充信息。

    RESILIENT CRYPTOGRAPHIC SCHEME
    6.
    发明申请
    RESILIENT CRYPTOGRAPHIC SCHEME 有权
    灵活的CRYPTOGRAPHIC计划

    公开(公告)号:US20120281826A1

    公开(公告)日:2012-11-08

    申请号:US13552373

    申请日:2012-07-18

    IPC分类号: H04L9/14

    CPC分类号: H04L9/3242 H04L9/3249

    摘要: A system and method are provided for enabling a symmetric key to be derived, the method comprising: obtaining a plurality of key parts, wherein the plurality of key parts when combined equal the symmetric key; encrypting a first of the key parts using a first cryptographic algorithm to generate a first encrypted value; encrypting one or more remaining key parts of the plurality of key parts using respective cryptographic algorithms to generate one or more additional encrypted values, wherein each key part encrypted is encrypted using a different cryptographic algorithm; and providing the first encrypted value and the one or more additional encrypted values to an other entity to enable the other entity to derive the symmetric key.

    摘要翻译: 提供了一种用于使得能够导出对称密钥的系统和方法,所述方法包括:获得多个密钥部分,其中所述多个密钥部分在组合时等于所述对称密钥; 使用第一密码算法加密第一密钥部分以生成第一加密值; 使用相应的密码算法加密所述多个密钥部分中的一个或多个剩余的关键部分,以生成一个或多个附加的加密值,其中使用不同的密码算法加密加密的每个密钥部分; 以及将第一加密值和所述一个或多个附加加密值提供给另一实体以使所述另一实体能够导出所述对称密钥。

    SECURE INTERFACE FOR VERSATILE KEY DERIVATION FUNCTION SUPPORT
    7.
    发明申请
    SECURE INTERFACE FOR VERSATILE KEY DERIVATION FUNCTION SUPPORT 有权
    安全接口,用于多个主要衍生功能支持

    公开(公告)号:US20130246805A1

    公开(公告)日:2013-09-19

    申请号:US13618451

    申请日:2012-09-14

    IPC分类号: G06F21/00

    CPC分类号: G06F21/00 H04L9/0841

    摘要: Improper re-use of a static Diffie-Hellman (DH) private key may leak information about the key. The leakage is prevented by a key derivation function (KDF), but standards do not agree on key derivation functions. The module for performing a DH private key operation must somehow support multiple different KDF standards. The present invention provides an intermediate approach that neither attempts to implement all possible KDF operations, nor provide unprotected access to the raw DH private key operation. Instead, the module performs parts of the KDF operation, as indicated by the application using the module. This saves the module from implementing the entire KDF for each KDF needed. Instead, the module implements only re-usable parts that are common to most KDFs. Furthermore, when new KDFs are required, the module may be able to support them if they built on the parts that the module has implemented.

    摘要翻译: 静态Diffie-Hellman(DH)私钥的不正确使用可能会泄漏关键字的信息。 通过密钥导出功能(KDF)来防止泄漏,但是标准对密钥导出函数并不一致。 用于执行DH私钥操作的模块必须以某种方式支持多种不同的KDF标准。 本发明提供了一种中间方法,既不试图实现所有可能的KDF操作,也不提供对原始DH私钥操作的不受保护的访问。 相反,模块将执行KDF操作的部分,如使用该模块的应用程序所示。 这样可以节省模块实现所需的每个KDF的整个KDF。 相反,该模块只能实现大多数KDF常用的可重复使用的部件。 此外,当需要新的KDF时,如果模块构建在模块实现的部件上,则模块可能能够支持它们。

    ONE WAY AUTHENTICATION
    8.
    发明申请
    ONE WAY AUTHENTICATION 有权
    一种方式认证

    公开(公告)号:US20130073857A1

    公开(公告)日:2013-03-21

    申请号:US13618358

    申请日:2012-09-14

    IPC分类号: H04L9/32

    摘要: A cryptosystem prevents replay attacks within existing authentication protocols, susceptible to such attacks but containing a random component, without requiring modification to said protocols. The entity charged with authentication maintains a list of previously used bit patterns, extracted from a portion of the authentication message connected to the random component. If the bit pattern has been seen before, the message is rejected; if the bit pattern has not been seen before, the bit pattern is added to the stored list and the message is accepted.

    摘要翻译: 密码系统防止现有认证协议中的重放攻击,容易受到这种攻击但包含随机组件,而不需要修改所述协议。 充电认证的实体维护从连接到随机组件的认证消息的一部分中提取的先前使用的位模式的列表。 如果之前已经看到位模式,则消息被拒绝; 如果以前没有看到位模式,则将位模式添加到存储的列表中,并且该消息被接受。

    ONE WAY AUTHENTICATION
    9.
    发明申请
    ONE WAY AUTHENTICATION 有权
    一种方式认证

    公开(公告)号:US20120089844A1

    公开(公告)日:2012-04-12

    申请号:US13315509

    申请日:2011-12-09

    IPC分类号: H04L9/32

    摘要: A cryptosystem prevents replay attacks within existing authentication protocols, susceptible to such attacks but containing a random component, without requiring modification to said protocols. The entity charged with authentication maintains a list of previously used bit patterns, extracted from a portion of the authentication message connected to the random component. If the bit pattern has been seen before, the message is rejected; if the bit pattern has not been seen before, the bit pattern is added to the stored list and the message is accepted.

    摘要翻译: 密码系统防止现有认证协议中的重放攻击,容易受到这种攻击但包含随机组件,而不需要修改所述协议。 充电认证的实体维护从连接到随机组件的认证消息的一部分中提取的先前使用的位模式的列表。 如果之前已经看到位模式,则消息被拒绝; 如果以前没有看到位模式,则将位模式添加到存储的列表中,并且该消息被接受。