Method of elliptic curve cryptographic key agreement using...

Cryptography – Particular algorithmic function encoding – Public key

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C380S001000, C708S490000

Reexamination Certificate

active

07062044

ABSTRACT:
A method of generating a cryptographic key in an authenticated manner using coefficient splitting. Select a prime number p and an elliptic curve of either a first class or a second class. Select a point P. The first user generates ra, wa, and Ra=raP and Wa=waP via coefficient splitting. The second user generates rb, wb, and Rb=rbP and Wb=wbP via coefficient splitting. After the users have exchanged the points Ra, Wa, Rb, Wb, the first user generates ca, ga, and caWb, and gaRbvia coefficient splitting, and the second user generates cb, gb, and cbWaand gbRavia coefficient splitting. Each user then sums the corresponding results to form K and derives the cryptographic key from K in the same user-definable manner. An unauthenticated key exchange method is also presented.

REFERENCES:
patent: 4200770 (1980-04-01), Hellman et al.
patent: 6212279 (2001-04-01), Reiter et al.
patent: 6490352 (2002-12-01), Schroeppel
patent: 6618483 (2003-09-01), Vanstone et al.
patent: 6778666 (2004-08-01), Kuzmich et al.
patent: 6782100 (2004-08-01), Vanstone et al.
patent: 6898284 (2005-05-01), Solinas
patent: 6993136 (2006-01-01), Solinas
Karpynskyy et al, “Elliptic Curve Parameters Generation”, Feb. 2004, TCSET '2004, p. 294-295.
Menezes et al, “Reducing Elliptic Curve Logarithms to Logarithms in a Finite Field”, 1991, ACM, p. 80-89.
Menezes, “Elliptic Curve Public Key Cryptosystems”, 1993, Kluwer Academic Publishers, p. 13-34.
Enge, “Elliptic Curves and Their Applications to Cryptography, An Introduction”, 1999, Kluwer Academic Publishers, p. 125-152.
Rosing, “Implementing Elliptic Curve Cryptography”, 1999, Manning Publications Co., p. 129-163.
Francois Morain, Jorge Olivos, “Speeding up the Computations on an Elliptic Curve Using Addition-Subtraction Chains”, Theoretical Informatics & Appls. vol. 24 No. 6 1990, pp. 531-544.
Chae Hoon Lim, Pil Joong Lee, “More Flexible Exponentiation with Precomputation”, Crypto-q4, Salinger-Verlag, 1994, pp. 95-107.
R. Gallant, R. Lambert, S. Vanstone, “Faster Point Multiplication on Elliptical Curves with Efficient Endomorphisms”, Centre for Applied Cryptographic Research, Corr 20000-S3, 2000.
Laurie Law, Alfred Menezes, Minghua Qu, Jerry Solinas, Scott Vanstone, “An Efficient Protocol for Authenticated Key Agreement”, COPP-98-05, Dept. of C&O, Univ. of Waterloo, Canada 1998.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Method of elliptic curve cryptographic key agreement using... does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Method of elliptic curve cryptographic key agreement using..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method of elliptic curve cryptographic key agreement using... will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-3704506

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.