Public key method of encoding data

Cryptography – Particular algorithmic function encoding – Public key

Patent

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

H04L 930

Patent

active

058355987

ABSTRACT:
A computerized public key process for encoding data makes it possible to achieve an even greater data privacy than known public key processes. The process achieves this by the fact that the public key is a number n that is the product of two large primary numbers p and q, and the private key includes these two primary numbers, and the data set m is encoded by breaking it down into the blocks m.sub.1, . . . , m.sub.k that are interpreted as numbers smaller than n, and the encoded data set includes the coefficients a.sub.k-1, . . . a.sub.0 of the polynomial P(x)=x.sup.k +a.sub.k-1 x.sup.k-1 + . . . +a.sub.1 x+a.sub.0 : =(x-m.sub.1).multidot. . . . .multidot.(x-m.sub.k) mod n. Decoding is accomplished by first determining the zero positions of the polynomials P(x) mod p in finite field GF(p) and P(x) mod q in finite field GF(q) with the help of the private key and then combining them with the help of the Chinese remainder theorem to yield solutions of the equation P(x)=0 mod n, where the blocks m.sub.1, . . . m.sub.k of data set m are contained in the quantity of solutions of the equation P(x)=0 mod n thus calculated. This invention can be used in all fields where the known public key methods are also used.

REFERENCES:
patent: 4459435 (1984-07-01), Foldvary et al.
patent: 4625076 (1986-11-01), Okamoto et al.
patent: 4633036 (1986-12-01), Hellman et al.
patent: 5142579 (1992-08-01), Anderson
patent: 5199070 (1993-03-01), Matsuzaki et al.
patent: 5220606 (1993-06-01), Greenberg
patent: 5263085 (1993-11-01), Shamir
patent: 5272755 (1993-12-01), Miyaji et al.
patent: 5297206 (1994-03-01), Orton
patent: 5307404 (1994-04-01), Yatsunami
patent: 5351297 (1994-09-01), Miyaji et al.
Rivest, R. et al., "A Method for Obtaining Digital Signatures and Public-Key Cryptosystems", Communications of the ACM, vol. 21, No. 2 (Feb. 1978), pp. 120-126.
Diffie, W. et al., "New Directions in Cryptography", IEEE Transactions on Information Theory, vol. IT-22, No. 6, Nov. 1976, pp. 644-654.
Ben-Or, "Probabilistic Algorithms in Finite Fields", CH-1695-6/81/0000/0394$00.75 1981 IEEE, pp. 394-398.
Brecht, B., "The Future Has Already Started or Public Key Cryptography", pp. 97-106.
Koyama, K., Security and Unique Decipherability of Two-Dimensional Public Key Cryptosystems Jul. (1990).
Sakai, R., New Key Generation Algorithm for RSA Cryptosystem, pp. 90-97. (Jan. 1994).
Ein Gerat mit vielen Pluspunkten, pp. 61-62. (Mar. 1994.
Rabin, M., Digitalized Signatures and Public-Key Functions as Intractable as Factorization, Massachusetts Institute of Technology Laboratory for Computer Science pp. 1-16. (Jan. 1979).
Rivest, R. et al., A method for Obtaining Digital Signatures and Public-Key Cryptosystems, pp. 121-126. (Feb. 1978).
Symposium on Foundations of Computer Science, IEEE Catalog No. 81CH1695-6, Library of Congress No. 80-646634, Computer Society No. 376, pp. 394-398. Oct. 1981.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Public key method of encoding data does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Public key method of encoding data, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Public key method of encoding data will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-1525423

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.