Cryptography – Communication system using cryptography
Reexamination Certificate
2005-12-16
2009-12-29
Song, Hosuk (Department: 2435)
Cryptography
Communication system using cryptography
C380S028000, C713S189000
Reexamination Certificate
active
07639808
ABSTRACT:
An elliptic curve cryptosystem apparatus performing an elliptic curve cryptosystem process has a coordinate transforming unit for transforming coordinates (X:Y:Z) on a point P on an elliptic curve over a finite field GF(p^m) to coordinates (r1×(X−s1):r2×(Y−s2):r3×(Z−s3)) (where, p is a prime number, m is an integer not less than 1, r1, r2and r3are integers not less than 1 and not larger than (p−1), s1, s2and s3are integer not less than 0 and not larger than (p−1), and a code “^” represents power), and a scalar multiplication operating unit for performing scalar multiplication on the point on the elliptic curve transformed by the coordinate transforming unit, wherein at least one of the parameters s1, s2and s3has a value other than 0. The apparatus can perform the scalar multiplication in the elliptic curve cryptosystem, with resistance to side channel attacks.
REFERENCES:
patent: 5854759 (1998-12-01), Kaliski et al.
patent: 6212279 (2001-04-01), Reiter et al.
patent: 7162033 (2007-01-01), Coron
patent: 2002-540483 (2002-11-01), None
Jean-Sébastien Coron, “Resistance against Differential Power Analysis for Elliptic Curve Cryptosystems”, Crytographic Hardware and Embedded Systems 1999 (CHES 1999), Lecture Notes in Computer Science, vol. 1717, Springer-Verlag, pp. 292-302.
Tetsuya Izu et al., “A Fast Parallel Elliptic Curve Multiplication Resistant against Side Channel Attacks”, Public-Key Cryptography 2002 (PKC2002), Lecture Notes in Computer Science, vol. 2274, pp. 280-296, Springer-Verlag.
Marc Joye et al., “Protections against Differential Analysis for Elliptic Curve Cryptography—An Algebraic Approach”, Cryptographic Hardware and Embedded Systems 2001 (CHES2001), Lecture Notes in Computer Science, vol. 2162, pp. 377-390, Springer-Verlag.
Louis Goubin, “A Refined Power-Analysis Attack on Elliptic Curve Cryptosystems”, Public-Key Cryptography 2003 (PKC2003), Lecture Notes in Computer Science, vol. 2567, Springer-Verlag, pp. 199-211.
Christophe Clavier et al., “Universal Exponentiation Algorithm—A First Step towardsProvableSPA-Resistance”, Cryptographic Hardware and Embedded Systems 2001 (CHES2001), Lecture Notes in Computer Science, vol. 2162, Springer-Verlag, pp. 300-308.
Katsuyuki Okeya et al., “On Assumptions of Implementational Attacks and Their Practicality”, Proceedings of the 2003 Symposium on Cryptography and Information Security, Jan. 26-29, 2003, English translation.
Itoh Kouichi
Izu Tetsuya
Takenaka Masahiko
Torii Naoya
Fujitsu Limited
Song Hosuk
Westerman Hattori Daniels & Adrian LLP
LandOfFree
Elliptic curve cryptosystem apparatus, elliptic curve... does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Elliptic curve cryptosystem apparatus, elliptic curve..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Elliptic curve cryptosystem apparatus, elliptic curve... will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-4146252