Cryptography – Particular algorithmic function encoding
Reexamination Certificate
2008-05-27
2008-05-27
Vu, Kim (Department: 2135)
Cryptography
Particular algorithmic function encoding
C380S030000, C380S044000, C380S259000, C380S263000, C380S277000, C380S278000, C380S282000, C380S286000
Reexamination Certificate
active
07379546
ABSTRACT:
Given a set of elliptic curve points defined over a field F(p) and represented in projective coordinate, a method is presented which allows the embedding of data bits in both the X-coordinate and the Z-coordinate of the elliptic curve point when represented in projective coordinate. This makes the number of points that satisfy an elliptic curve equation and which can be used in the corresponding cryptosystem proportional to p2rather than p. This can be used to either increase security by making the bit positions where data bits are embedded known only to the sender and receiver. Alternatively, it can be used to increase the number of data bits that can be encrypted per single elliptic curve point encryption. In another alternative, it can also be used to reduce p. Also, it can be used as a countermeasure by randomizing the bit positions where data bits are embedded. A similar formulation can be developed for elliptic curves over fields F(2m), as well as special elliptic curves such as Montgomery curves.
REFERENCES:
patent: 4200770 (1980-04-01), Hellman et al.
patent: 6088453 (2000-07-01), Shimbo
patent: 6424712 (2002-07-01), Vanstone et al.
patent: 6876745 (2005-04-01), Kurumatani
patent: 7162033 (2007-01-01), Coron
patent: 2001/0046291 (2001-11-01), Vanstone et al.
patent: 2002/0065574 (2002-05-01), Nakada
patent: 2003/0059042 (2003-03-01), Okeya et al.
patent: 2003/0123656 (2003-07-01), Izu et al.
patent: 2003/0142820 (2003-07-01), Futa et al.
patent: 2004/0114756 (2004-06-01), Moller et al.
patent: 2004/0228478 (2004-11-01), Joye
patent: 2004/0247114 (2004-12-01), Joye
Coron, “Resistance Against Differential Power Analysis for Elliptic Curve Cryptosystems”, Springer-Verlag, 1999.
Okeya et al. “Power Analysis Breaks Elliptic Curve Cryptosystems even Secure against the Timing Attack”, Hitachi, Ltd, 2000.
Izu et al. “A Fast Elliptic Curve Multiplication Resistant against Side Channel Attacks”, Fujitsu Laboratories Ltd, 2002.
Joye et al. “Protection against Differential Analysis for Elliptic Curve Cryptography” Gemplus Card International, 2001.
Dada Beemnet W
King Fahd University of Petroleum and Minerals
Lowe Hauptman & Ham & Berner, LLP
Vu Kim
LandOfFree
Method for XZ-elliptic curve cryptography does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Method for XZ-elliptic curve cryptography, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method for XZ-elliptic curve cryptography will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-2769712