Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Central trusted authority provides computer authentication
Reexamination Certificate
2007-07-24
2007-07-24
Peeso, Thomas (Department: 2132)
Electrical computers and digital processing systems: support
Multiple computer communication using cryptography
Central trusted authority provides computer authentication
C713S161000, C713S164000
Reexamination Certificate
active
10734231
ABSTRACT:
A method of decrypting a message encrypted using a truncated ring cryptosystem. The method comprises selecting a window parameter T determining a plurality of windows of a predetermined size, each window being shifted by an amount less than or equal to the window parameter T. A decryption candidate is determined for each possible window. Each decryption candidate is tested to determine whether it is a valid message. The result of the decryption is chosen to be a valid message found in the previous step or if no valid message is found it is indicated that the message could not be decrypted. By this method, a constant number of decryption candidates are determined for each decryption.
REFERENCES:
patent: 6081597 (2000-06-01), Hoffstein et al.
Proos, John A., “Imperfect Decryption and an Attack on the NTRU Encryption Scheme,”University of Waterloo, Waterloo, Canada, Jan. 7, 2003.
Consortium for Efficient Embedded Security, EESS #1: Implementation Aspects of NTRUEncrypt and NTRUSign, Version 1, Nov. 2002.
Hess, E; Janssen, N; Meyer, B; Schuetze, T. “Information Leakage Attacks Against Smart Card Implementations of Cryptographic Algorithms and Countermeasures—A Survey”, Proceedings of Eurosmart Security Conference, pp. 55-64, Marseilles, 2000, European Smart Card Industry Assoc., 2000.
Shamir, A. “Protecting Smart Cards from Passive Power Analysis with Detached Power Supplies”, in Proceedings of Cryptographic Hardware and Embedded Systems—CHES 2000, pp. 71-77, LNCS vol. 1965, C.K. Koc et al, Eds., Springer-Verlag, 2000.
Kocher, P.C. “Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems”, in Advances in Cryptology—CRYPT'96, LNCS vol. 1109, N. Koblitz, Ed., pp. 104-113, Springer-Verlag, 1996.
Proos John A.
Struik Marinus
Vanstone Scott A.
Blake Cassels & Graydon LLP
Certicom Corp.
Orange John R.S.
Peeso Thomas
Slaney Brett J.
LandOfFree
Method and apparatus for protecting NTRU against a timing... does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Method and apparatus for protecting NTRU against a timing..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method and apparatus for protecting NTRU against a timing... will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3753551