-
公开(公告)号:US08359469B2
公开(公告)日:2013-01-22
申请号:US13315509
申请日:2011-12-09
IPC分类号: H04L9/00
CPC分类号: H04L9/3236 , H04L9/002 , H04L9/3247 , H04L63/123 , H04L2209/04 , H04L2209/08 , H04L2209/20
摘要: A cryptosystem prevents replay attacks within existing authentication protocols, susceptible to such attacks but containing a random component, without requiring modification to said protocols. The entity charged with authentication maintains a list of previously used bit patterns, extracted from a portion of the authentication message connected to the random component. If the bit pattern has been seen before, the message is rejected; if the bit pattern has not been seen before, the bit pattern is added to the stored list and the message is accepted.
-
公开(公告)号:US08095792B2
公开(公告)日:2012-01-10
申请号:US11542106
申请日:2006-10-04
IPC分类号: H04L9/32
CPC分类号: H04L9/3236 , H04L9/002 , H04L9/3247 , H04L63/123 , H04L2209/04 , H04L2209/08 , H04L2209/20
摘要: A cryptosystem prevents replay attacks within existing authentication protocols, susceptible to such attacks but containing a random component, without requiring modification to said protocols. The entity charged with authentication maintains a list of previously used bit patterns, extracted from a portion of the authentication message connected to the random component. If the bit pattern has been seen before, the message is rejected; if the bit pattern has not been seen before, the bit pattern is added to the stored list and the message is accepted.
摘要翻译: 密码系统防止现有认证协议中的重放攻击,容易受到这种攻击但包含随机组件,而不需要修改所述协议。 充电认证的实体维护从连接到随机组件的认证消息的一部分中提取的先前使用的位模式的列表。 如果之前已经看到位模式,则消息被拒绝; 如果以前没有看到位模式,则将位模式添加到存储的列表中,并且该消息被接受。
-
公开(公告)号:US09455832B2
公开(公告)日:2016-09-27
申请号:US12230799
申请日:2008-09-04
CPC分类号: H04L9/3066 , H04L9/3242 , H04L9/3252
摘要: A portion of the signed message in an ECPVS is kept truly confidential by dividing the message being signed into at least three parts, wherein one portion is visible, another portion is recoverable by any entity and carries the necessary redundancy for verification, and at least one additional portion is kept confidential. The additional portion is kept confidential by encrypting such portion using a key generated from information specific to that verifying entity. In this way, any entity with access to the signer's public key can verify the signature by checking for a specific characteristic, such as a certain amount of redundancy in the one recovered portion, but cannot recover the confidential portion, only the specific entity can do so. Message recovery is also provided in an elliptic curve signature using a modification of the well analyzed ECDSA signing equation instead of, e.g. the Schnorr equation used in traditional PV signature schemes.
-
公开(公告)号:US08964971B2
公开(公告)日:2015-02-24
申请号:US12171398
申请日:2008-07-11
申请人: Scott A. Vanstone , Daniel R. Brown
发明人: Scott A. Vanstone , Daniel R. Brown
CPC分类号: H04L9/3073 , G06F17/2264 , H04L2209/16 , H04L2209/30 , H04L2209/608
摘要: A method of representing crytographic values in text form is described. The text representation is formed from words selected from a vocabulary, which may include a collection of pseudowords. The text representations can be further transformed to a paragraph in an apparently grammatically correct form.
摘要翻译: 描述了以文本形式表示crytographic值的方法。 文本表示由从词汇中选择的词形成,其可以包括伪字集合。 文本表示可以进一步转换为一个明显的语法正确形式的段落。
-
公开(公告)号:US08953787B2
公开(公告)日:2015-02-10
申请号:US13527891
申请日:2012-06-20
CPC分类号: H04L9/0844 , G06F7/725 , H04L9/0841 , H04L9/3066 , H04L9/3252
摘要: A method of determining the integrity of a message exchanged between a pair of correspondents. The message is secured by embodying the message in a function of a public key derived from a private key selected by one of the correspondents. The method comprises first obtaining the public key. The public key is then subjected to at least one mathematical test to determine whether the public key satisfies predefined mathematical characteristics. Messages utilizing the public key are accepted if the public key satisfies the predefined mathematical characteristics.
-
公开(公告)号:US08938617B2
公开(公告)日:2015-01-20
申请号:US13618358
申请日:2012-09-14
CPC分类号: H04L9/3236 , H04L9/002 , H04L9/3247 , H04L63/123 , H04L2209/04 , H04L2209/08 , H04L2209/20
摘要: A cryptosystem prevents replay attacks within existing authentication protocols, susceptible to such attacks but containing a random component, without requiring modification to said protocols. The entity charged with authentication maintains a list of previously used bit patterns, extracted from a portion of the authentication message connected to the random component. If the bit pattern has been seen before, the message is rejected; if the bit pattern has not been seen before, the bit pattern is added to the stored list and the message is accepted.
摘要翻译: 密码系统防止现有认证协议中的重放攻击,容易受到这种攻击但包含随机组件,而不需要修改所述协议。 充电认证的实体维护从连接到随机组件的认证消息的一部分中提取的先前使用的位模式的列表。 如果之前已经看到位模式,则消息被拒绝; 如果以前没有看到位模式,则将位模式添加到存储的列表中,并且该消息被接受。
-
公开(公告)号:US08806197B2
公开(公告)日:2014-08-12
申请号:US13478288
申请日:2012-05-23
申请人: Marinus Struik , Daniel R. Brown , Scott A. Vanstone , Robert P. Gallant , Adrian Antipa , Robert J. Lambert
发明人: Marinus Struik , Daniel R. Brown , Scott A. Vanstone , Robert P. Gallant , Adrian Antipa , Robert J. Lambert
IPC分类号: H04L29/06
CPC分类号: H04L9/3066 , G06F7/725 , H04L9/30 , H04L9/3252
摘要: Accelerated computation of combinations of group operations in a finite field is provided by arranging for at least one of the operands to have a relatively small bit length. In a elliptic curve group, verification that a value representative of a point R corresponds the sum of two other points uG and vG is obtained by deriving integers w,z of reduced bit length and so that v=w/z. The verification equality R=uG+vQ may then be computed as −zR+(uz mod n) G+wQ=O with z and w of reduced bit length. This is beneficial in digital signature verification where increased verification can be attained.
-
公开(公告)号:US08705735B2
公开(公告)日:2014-04-22
申请号:US13527060
申请日:2012-06-19
申请人: Minghua Qu , Scott A. Vanstone
发明人: Minghua Qu , Scott A. Vanstone
IPC分类号: H04L9/08
CPC分类号: H04L9/3263 , H04L9/0844 , H04L9/3247
摘要: A method of generating a public key in a secure digital communication system, having at least one trusted entity CA and subscriber entities A. The trusted entity selects a unique identity distinguishing each entity A. The trusted entity then generates a public key reconstruction public data of the entity A by mathematically combining public values obtained from respective private values of the trusted entity and the entity A. The unique identity and public key reconstruction public data of the entity A serve as A's implicit certificate. The trusted entity combines the implicit certificate information with a mathematical function to derive an entity information ƒ and generates a value kA by binding ƒ with private values of the trusted entity. The trusted entity transmits the value kA to the entity to permit A to generate a private key from kA, A's private value and A's implicit certificate.
摘要翻译: 一种在具有至少一个可信实体CA和订户实体A的安全数字通信系统中生成公共密钥的方法。可信实体选择区分每个实体A的唯一标识。然后,可信实体生成公共密钥重建公共数据 实体A通过数学地组合从可信实体的相应私有值和实体A获得的公共值。实体A的唯一身份和公钥重建公共数据用作A的隐式证书。 可信实体将隐式证书信息与数学函数组合以导出实体信息ƒ并通过将ƒ与可信实体的私有值绑定来生成值kA。 可信实体将值kA发送给实体,以允许A从kA,A的私有值和A的隐式证书生成私钥。
-
公开(公告)号:US08582772B2
公开(公告)日:2013-11-12
申请号:US13461586
申请日:2012-05-01
申请人: Daniel R. Brown , Scott A. Vanstone
发明人: Daniel R. Brown , Scott A. Vanstone
摘要: An authenticated RFID system is provided that uses elliptic curve cryptography (ECC) to reduce the signature size and read/write times when compared to traditional public key implementations such as RSA. Either ECDSA or ECPVS can be used to reduce the signature size and ECPVS can be used to hide a portion of the RFID tag that contains sensitive product identifying information. As a result, smaller tags can be used or multiple signatures can be written at different stages in a manufacturing or supply chain. A key management system is used to distribute the verification keys and aggregate signature schemes are also provided for adding multiple signatures to the RFID tags, for example in a supply chain.
-
公开(公告)号:US08548165B2
公开(公告)日:2013-10-01
申请号:US13283463
申请日:2011-10-27
申请人: Scott A. Vanstone , Daniel R. Brown
发明人: Scott A. Vanstone , Daniel R. Brown
CPC分类号: H04L9/3066 , H04L9/3252 , H04L9/3263 , H04L2209/30 , H04L2209/605
摘要: A computer implemented method of compressing a digitally represented cryptographic value. The method comprising the steps of: (a) selecting a secret value; (b) performing a cryptographic operation on the secret value to generate the cryptographic value; (c) determining whether the cryptographic value satisfies the pre-determined criteria; and (d) repeating the sequence of steps starting at step (a) until the cryptographic value satisfies the pre-determined criteria.
摘要翻译: 一种压缩数字化密码值的计算机实现方法。 该方法包括以下步骤:(a)选择秘密值; (b)对秘密值执行密码操作以产生密码值; (c)确定密码值是否满足预定标准; 和(d)重复从步骤(a)开始的步骤序列,直到密码值满足预定标准。
-
-
-
-
-
-
-
-
-