Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Particular communication authentication technique
Patent
1998-06-23
2000-12-19
Hayes, Gail O.
Electrical computers and digital processing systems: support
Multiple computer communication using cryptography
Particular communication authentication technique
H04L 900
Patent
active
061638412
ABSTRACT:
A technique for generating, for a given message to be signed, an authentic cryptographic signature that can be authenticated, by a recipient of the signed message, as having originated from a signor of the message; and appropriately authenticating such a signature. Specifically, this technique, given a message, such as, e.g., a numerical product copy identifier (83, 93), forms an authentic signature (87, 97), based on public-key cryptosystem, through use of generator value selected from points on an elliptic curve over a finite field. The authentic signature is generated using the generator value in conjunction with three keys; namely, a public key, a private key and a secret key, and thus substantially increases the security associated with cryptographic signatures generated through a conventional two-key public-key cryptosystem. A unique product copy indicia can be formed by concatenating the identifier, for a given product copy, with its corresponding authentic signature. During subsequent user installation of that copy to a computer, the user enters the indicia when prompted by execution of an installation program which, in turn, privately authenticates the signature contained in the indicia in order to continue or prematurely terminate the installation.
REFERENCES:
patent: 5299262 (1994-03-01), Brickell et al.
patent: 5581616 (1996-12-01), Crandall
patent: 5638447 (1997-06-01), Micali
patent: 5737424 (1998-04-01), Elteto et al.
Okamoto et al, "An Efficient Digital Signature Scheme Based on an Elliptic Curve Over the Ring ZN", Proceedings of the Annual International Cryptology Conference, Berlin, Germany, vol. Conf. 12, Aug. 16, 1992, pp. 54-65.
Desmedt Yvo G. "Threshold Cryptography." ETT. Jul. 1994. pp. 35-43.
Menezes, Alfred, Paul van Oorshcot, and Scott Vanstone. "Handbook of applied cryptography." CRC Press. 1997. pp. 297 and 348.
Miller, Ray A. "The cryptographic mathematics of Enigma." Center for Cryptologic History, National Security Agency. Date unknown. all pages.
Botes, J. J. and W. T. Pezhorn. "Public-key cryptosystems based on elliptic curves." IEEE. 1993. all pages.
Montgomery Peter L.
Venkatesan Ramarathnam R.
DiLorenzo Anthony
Hayes Gail O.
Michaelson Peter L.
Microsoft Corporation
LandOfFree
Technique for producing privately authenticatable cryptographic does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Technique for producing privately authenticatable cryptographic , we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Technique for producing privately authenticatable cryptographic will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-278051