Method and apparatus for generating a public key in a manner...

Cryptography – Particular algorithmic function encoding – Public key

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C380S028000, C380S044000, C380S279000, C380S282000

Reexamination Certificate

active

08050403

ABSTRACT:
A public key for an Elliptic Curve Cryptosystem is generated in a manner that acts as a countermeasure to power analysis attacks. In particular, a known scalar multiplication method is enhanced by, in one aspect, performing a right shift on the private key. The fixed-sequence window method includes creation and handling of a translated private key. Conveniently, as a result of the right shift, the handling of the translated private key is made easier and more efficient.

REFERENCES:
patent: 6490352 (2002-12-01), Schroeppel
patent: 6876745 (2005-04-01), Kurumatani
patent: 7308096 (2007-12-01), Okeya et al.
patent: 7373506 (2008-05-01), Asano et al.
patent: 7505587 (2009-03-01), Izu et al.
patent: 7669052 (2010-02-01), Asano et al.
patent: 7676037 (2010-03-01), Jung et al.
patent: 2005/0078821 (2005-04-01), Jin et al.
patent: 2005/0232428 (2005-10-01), Little et al.
patent: 2009/0074179 (2009-03-01), Futa et al.
patent: 15848 687 (2005-06-01), None
patent: 1548687 (2005-06-01), None
patent: 1 729 442 (2006-05-01), None
patent: 1729442 (2006-06-01), None
patent: 1601132 (2006-11-01), None
patent: 1816624 (2006-11-01), None
patent: 1587237 (2006-12-01), None
patent: 0135573 (2001-05-01), None
patent: WO 01/35573 (2001-05-01), None
patent: 2007005563 (2007-01-01), None
Ciet M. et al., “(Virtually) Free Randomization Techniques for Elliptic Curve Cryptography”, Lecture Notes in Computer Science, Springer, DE, vol. 2836, Oct. 10, 2003.
Bodo Moller, “Algorithms for Multi-exponentiation”, Lecture Notes in Computer Science, Springer, DE, vol. 2259, Jan. 1, 2001.
Okeya K. et al., “Use of Montgomery Trick in Precomputation of Multi-Scalar Multiplication in Elliptic Curve Cryptosystems”, IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Engineering Sciences Society, Tokyo, JP, vol. E86-A, No. 1, Jan. 1, 2003.
Okeya K. et al., “Fast Multi-scalar Multiplication Methods on Elliptic Curves with Precomputation Strategy Using Montgomery Trick”, Cryptographic hardward and embedded systems, International Workship, Aug. 13, 2002.
Theriault N., “SPA resistant left-to-right integer recordings,” Jan. 1, 2006, Selected Areas in Cryptography Lecture Notes in Computer Science; LNCS, Springer, Berlin, pp. 345-358.
Izu et al., “Improved Elliptic Curve Multiplication Methods Resistant against Side Channel Attacks”, Progress in Cryptology-indocrypt. International Conference Incryptology in India, Dec. 16, 2002.
Ciet M. et al., “Preventing differential analysis in GLV elliptic curve scalar multiplication”, Cryptographic Hardware and Embedded Systems, Internationalworkship, Aug. 13, 2002.
Gallant RP et al., “Faster Point Multiplication on Elliptic Curves with efficient Endomorphisms”, Advances in Cryptography, Crypto 2001. 21st Annual international Cryptology Conference, Santa Barbara, CA, Aug. 19-23, 2001.
Hagai Bar-El, Introduction to Side Channel Attacks White Paper, Discretix Technologies Ltd Advanced Embedded Security, www.discretix.com.
Thomas S. Messerges, Ezzy A Dabbish and Robert H Sloan, Investigations of Power Analysis Attacks on Smartcards, USENIX Workshop on Smartcard Technology, Chicago, Illinois, USA, May 10-11, 1999.
EPO, Extended European Search Report, regarding application No. 08733545.1 dated Oct. 13, 2010.
Nicolas Theriault Ed et al., SPA Resistant Left-to-Right Integer Recodings, Jan. 1, 2006, Selected Areas in Cryptography Lecture Notes in Computer Science; LNCS, Springer, Berlin, DE, pp. 345-358.
Chaehoon Lim Ed et al., New Method for Securing Elliptic Scalar Multiplication Against Side-Channel Attacks, Jun. 22, 2004, Information Security and Privacy; [Lecture Notes in Computer Science; LNCS], Springer-Verlag, Berlin/Heidelberg, pp. 289-300.
Katsuyuki Okeya et al., Efficient Representations on Koblitz Curves with Resistance to Side Channel Attacks, Jun. 30, 2005, Information Security and Privacy; [Lecture Notes in Computer Science; LNCS], Springer-Verlag, Berlin/Heidelberg; pp. 218-229.
Schroeppel R et al., Fast Key Exchange with Elliptic Curve Systems, Advances in Cryptology—Crypto '95 Santa Barbara, Aug. 27-31, 1995; [Proceedings of the Annual International Cryptology Conference (Crypto)], Berlin, Springer, DE, vol. Conf. 15, Aug. 27, 1995, pp. 43-56.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Method and apparatus for generating a public key in a manner... does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Method and apparatus for generating a public key in a manner..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method and apparatus for generating a public key in a manner... will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-4279215

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.