Encryption operating apparatus and method having...

Information security – Monitoring or scanning of software or data including attack... – Intrusion detection

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C726S026000, C726S028000

Reexamination Certificate

active

07065788

ABSTRACT:
Ciphertext X and a constant C having relationships C>p and C>q with respect to secret keys p and q are input, and correction values C−dpand C−dq(dp=d mod (p−1), dq=d mod (q−1)) are obtained. Then, the ciphertext X is multiplied by the constant C. A remainder operation using the secret key p or q as a remainder value is conducted with respect to the multiplication result. A modular exponentiation operation based on a Chinese remainder theorem is conducted with respect to the remainder operation result, and a correction operation using a correction value C−dpor C−dqis conducted. Thereafter, plaintext Y before being encrypted is calculated.

REFERENCES:
patent: 4723284 (1988-02-01), Munck et al.
patent: 4979832 (1990-12-01), Ritter
patent: 5048086 (1991-09-01), Bianco et al.
patent: 5142577 (1992-08-01), Pastor
Kocher, Paul C., “Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems”,Advances in Cryptology-CRYPTO '96, Lecture Notes in Computer Science, vol. 1109, Springer-Verlag, pp. 104-113.
Kocher, Paul, et al., “Differential Power Analysis”,Advances in Cryptology-CRYPTO '99, Lecture Notes in Computer Science, vol. 1666, Springer-Verlag, pp. 388-397.
Okamoto, Eiji, “Power Remainder Operation Using Chinese Remainder Theorem; Introduction to Encryption Theory”, published Kyoritsu Shuppan, 1993, pp. 96-97 (with English language translation).
Menezes, A.J., “Handbook of Applied Cryptography”, CRC press, 1997, pp. 612-613.
Montgomery, Peter L., “Modular Multiplication Without Trial Division”, Mathematics of Computation 44, No. 170, 1985pp. 519-521.
Itoh, K., et al., “Fast Implementation of Public-Key Cryptography on a DSP TMS320C6201”,Y.Kurihara-Cryptographic Hardware and Embedded Systems, CHES '99Lecture Notes in Computer Science, vol. 1717, Springer-Verlig, pp. 61-72.
Schindler, Werner, “A Timing Attack Against RSA with the Chinese Remainder Theorem”, Cryptographic Hardware And Embedded Systems, 2nd International Workshop, CHES 200, Worchester MA, Aug. 17-18, 2000, Proceedings, Lecture Notes In Computer Science, Berlin: Springer, DE, vol. 1965, Aug. 17, 2000, pp. 109-124.
Walter, C.D., “Mongomery Exponentiation Needs No Final Substractions”, Electronics Letters, IEE Stevenage, GB, vol. 35, No. 21, Oct. 14, 1999.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Encryption operating apparatus and method having... does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Encryption operating apparatus and method having..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Encryption operating apparatus and method having... will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-3617278

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.