Cryptography – Particular algorithmic function encoding
Reexamination Certificate
2007-04-03
2007-04-03
Vu, Kim (Department: 2135)
Cryptography
Particular algorithmic function encoding
C380S030000, C380S044000, C380S277000, C380S278000
Reexamination Certificate
active
09710987
ABSTRACT:
An apparatus for operating a cryptographic engine may include a key generation module for creating key pairs for encrypting substantive content to be shared between two users over a secured or unsecured communication link. The key generation module may include a point-modification module as part of an elliptic curve module for creating and processing keys. The point-modification module preferably employs a point-halving algorithm for creating and processing keys but may also employ any one or a combination of a variety of other algorithms. Hash functions may be used to further process ephemeral secrets or ephemeral keys that may be used for transactions, sessions, or other comparatively short time increments of communication. The keys generated by the key generation module may be configured to be processable by an encryption system for divulging independently to two independent parties a secret to be shared by the two independent parties. A point-halving algorithm may be provided to reduce the operation count of a cryptographic process.
REFERENCES:
patent: 5442707 (1995-08-01), Miyaji et al.
patent: 5805703 (1998-09-01), Crandall
patent: 5812438 (1998-09-01), Lan et al.
patent: 5854759 (1998-12-01), Kaliski et al.
patent: 5892912 (1999-04-01), Suzuki et al.
patent: 5982895 (1999-11-01), Dworkin et al.
patent: 6038581 (2000-03-01), Aoki et al.
patent: 6141420 (2000-10-01), Vanstone et al.
patent: 6163841 (2000-12-01), Venkatesan et al.
patent: 6212277 (2001-04-01), Miyaji
patent: 6252959 (2001-06-01), Paar et al.
patent: 6263081 (2001-07-01), Miyaji et al.
patent: 6337909 (2002-01-01), Vanstone et al.
patent: 6480606 (2002-11-01), Kurumatani
patent: 98302286 (1998-10-01), None
patent: WO 96/04602 (1996-02-01), None
patent: WO 01/04742 (2001-01-01), None
Noam D. Elkies, “Explicit modular towers” Harvard University, 1998.
Erik Woodward Knudsen, “Elliptic Scalar Multiplication Using Point Halving”, Nov. 1999.
Lopez et al., “on computing a multiple of an elliptic curve point”, 1998.
Kaliski jr. et al. “Efficient finite field basis conversion involving dual bases” 1999.
Koyama et al. Elliptic Curve Cryptosystems and Their Applications, IEICE Transactions on Information and Systems, Jan. 1992.
Elkies Noam D. Explicit modular towers, Dept. of Mathematics, Harvard University, 1998.
Schroeppel, R. et al. “Fast Key Exchange with Elliptic Curve Systems,” Advances in Cryptology- CRYPTO'95, Aug. 31, 1995, pp. 43-56.
Vanstone, S.A. et al., “Elliptic Curve Cryptosystems Using Curves of Smooth Order Over the Ring Zn,” IEEE Trans. On Information Theory, vol. 43, No. 4, Jul. 1994, pp. 1231-1237.
Knudson, E., “Elliptic Scalar Multiplication Using Point Halving,” Asiacrypt '99, Nov. 14, 1999, pp. 134-149.
“Efficient Algorithms for Elliptic Curve Cryptosystems,” 1997 Jorge Guarjardo excerpt, Advances in Cryptology—Crypto 1997, © 1998 Springer-Verlag, pp. 242-356.
“New Public-Key Schemes Based on Elliptic Curves over the Ring Zn,” 1991Kenji Koyama excerpt, Advances in Cryptology—Crypto 1991, © 1998 Springer-Verlag, pp. 252-266.
“Integer Division in Residue Number Systems,” 1994 Hitz, M.A. and Kaltofen, E., excerpt IEEE Transactions on Computers, © 1995 IEEE, pp. 983-989.
Dada Beemnet W
Vu Kim
LandOfFree
Elliptic curve point ambiguity resolution apparatus and method does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Elliptic curve point ambiguity resolution apparatus and method, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Elliptic curve point ambiguity resolution apparatus and method will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3747625