Method for XZ-elliptic curve cryptography

Cryptography – Particular algorithmic function encoding

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C380S030000, C380S044000, C380S259000, C380S263000, C380S277000, C380S278000, C380S282000, C380S286000

Reexamination Certificate

active

07379546

ABSTRACT:
Given a set of elliptic curve points defined over a field F(p) and represented in projective coordinate, a method is presented which allows the embedding of data bits in both the X-coordinate and the Z-coordinate of the elliptic curve point when represented in projective coordinate. This makes the number of points that satisfy an elliptic curve equation and which can be used in the corresponding cryptosystem proportional to p2rather than p. This can be used to either increase security by making the bit positions where data bits are embedded known only to the sender and receiver. Alternatively, it can be used to increase the number of data bits that can be encrypted per single elliptic curve point encryption. In another alternative, it can also be used to reduce p. Also, it can be used as a countermeasure by randomizing the bit positions where data bits are embedded. A similar formulation can be developed for elliptic curves over fields F(2m), as well as special elliptic curves such as Montgomery curves.

REFERENCES:
patent: 4200770 (1980-04-01), Hellman et al.
patent: 6088453 (2000-07-01), Shimbo
patent: 6424712 (2002-07-01), Vanstone et al.
patent: 6876745 (2005-04-01), Kurumatani
patent: 7162033 (2007-01-01), Coron
patent: 2001/0046291 (2001-11-01), Vanstone et al.
patent: 2002/0065574 (2002-05-01), Nakada
patent: 2003/0059042 (2003-03-01), Okeya et al.
patent: 2003/0123656 (2003-07-01), Izu et al.
patent: 2003/0142820 (2003-07-01), Futa et al.
patent: 2004/0114756 (2004-06-01), Moller et al.
patent: 2004/0228478 (2004-11-01), Joye
patent: 2004/0247114 (2004-12-01), Joye
Coron, “Resistance Against Differential Power Analysis for Elliptic Curve Cryptosystems”, Springer-Verlag, 1999.
Okeya et al. “Power Analysis Breaks Elliptic Curve Cryptosystems even Secure against the Timing Attack”, Hitachi, Ltd, 2000.
Izu et al. “A Fast Elliptic Curve Multiplication Resistant against Side Channel Attacks”, Fujitsu Laboratories Ltd, 2002.
Joye et al. “Protection against Differential Analysis for Elliptic Curve Cryptography” Gemplus Card International, 2001.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Method for XZ-elliptic curve cryptography does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Method for XZ-elliptic curve cryptography, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method for XZ-elliptic curve cryptography will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-2769712

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.