Cryptography – Particular algorithmic function encoding – Public key
Reexamination Certificate
2006-06-13
2006-06-13
Revak, Christopher (Department: 2131)
Cryptography
Particular algorithmic function encoding
Public key
C380S001000, C708S490000
Reexamination Certificate
active
07062044
ABSTRACT:
A method of generating a cryptographic key in an authenticated manner using coefficient splitting. Select a prime number p and an elliptic curve of either a first class or a second class. Select a point P. The first user generates ra, wa, and Ra=raP and Wa=waP via coefficient splitting. The second user generates rb, wb, and Rb=rbP and Wb=wbP via coefficient splitting. After the users have exchanged the points Ra, Wa, Rb, Wb, the first user generates ca, ga, and caWb, and gaRbvia coefficient splitting, and the second user generates cb, gb, and cbWaand gbRavia coefficient splitting. Each user then sums the corresponding results to form K and derives the cryptographic key from K in the same user-definable manner. An unauthenticated key exchange method is also presented.
REFERENCES:
patent: 4200770 (1980-04-01), Hellman et al.
patent: 6212279 (2001-04-01), Reiter et al.
patent: 6490352 (2002-12-01), Schroeppel
patent: 6618483 (2003-09-01), Vanstone et al.
patent: 6778666 (2004-08-01), Kuzmich et al.
patent: 6782100 (2004-08-01), Vanstone et al.
patent: 6898284 (2005-05-01), Solinas
patent: 6993136 (2006-01-01), Solinas
Karpynskyy et al, “Elliptic Curve Parameters Generation”, Feb. 2004, TCSET '2004, p. 294-295.
Menezes et al, “Reducing Elliptic Curve Logarithms to Logarithms in a Finite Field”, 1991, ACM, p. 80-89.
Menezes, “Elliptic Curve Public Key Cryptosystems”, 1993, Kluwer Academic Publishers, p. 13-34.
Enge, “Elliptic Curves and Their Applications to Cryptography, An Introduction”, 1999, Kluwer Academic Publishers, p. 125-152.
Rosing, “Implementing Elliptic Curve Cryptography”, 1999, Manning Publications Co., p. 129-163.
Francois Morain, Jorge Olivos, “Speeding up the Computations on an Elliptic Curve Using Addition-Subtraction Chains”, Theoretical Informatics & Appls. vol. 24 No. 6 1990, pp. 531-544.
Chae Hoon Lim, Pil Joong Lee, “More Flexible Exponentiation with Precomputation”, Crypto-q4, Salinger-Verlag, 1994, pp. 95-107.
R. Gallant, R. Lambert, S. Vanstone, “Faster Point Multiplication on Elliptical Curves with Efficient Endomorphisms”, Centre for Applied Cryptographic Research, Corr 20000-S3, 2000.
Laurie Law, Alfred Menezes, Minghua Qu, Jerry Solinas, Scott Vanstone, “An Efficient Protocol for Authenticated Key Agreement”, COPP-98-05, Dept. of C&O, Univ. of Waterloo, Canada 1998.
Morelli Robert D.
Revak Christopher
The United States of America as represented by the National Secu
LandOfFree
Method of elliptic curve cryptographic key agreement using... does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Method of elliptic curve cryptographic key agreement using..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method of elliptic curve cryptographic key agreement using... will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3704506