CA2381937A1 - Procede destine a generer des nombres pseudo-aleatoires et procede de signature electronique - Google Patents

Procede destine a generer des nombres pseudo-aleatoires et procede de signature electronique Download PDF

Info

Publication number
CA2381937A1
CA2381937A1 CA002381937A CA2381937A CA2381937A1 CA 2381937 A1 CA2381937 A1 CA 2381937A1 CA 002381937 A CA002381937 A CA 002381937A CA 2381937 A CA2381937 A CA 2381937A CA 2381937 A1 CA2381937 A1 CA 2381937A1
Authority
CA
Canada
Prior art keywords
points
numbers
pseudorandom numbers
elliptic curves
generating pseudorandom
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
CA002381937A
Other languages
English (en)
Inventor
Erwin Hess
Pascale Serf
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Siemens AG
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Publication of CA2381937A1 publication Critical patent/CA2381937A1/fr
Abandoned legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F7/00Methods or arrangements for processing data by operating upon the order or content of the data handled
    • G06F7/58Random or pseudo-random number generators
    • G06F7/582Pseudo-random number generators
    • G06F7/584Pseudo-random number generators using finite field arithmetic, e.g. using a linear feedback shift register
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/065Encryption by serially and continuously modifying data stream elements, e.g. stream cipher systems, RC4, SEAL or A5/3
    • H04L9/0656Pseudorandom key sequence combined element-for-element with data sequence, e.g. one-time-pad [OTP] or Vernam's cipher
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • H04L9/3066Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F7/00Methods or arrangements for processing data by operating upon the order or content of the data handled
    • G06F7/60Methods or arrangements for performing computations using a digital non-denominational number representation, i.e. number representation without radix; Computing devices using combinations of denominational and non-denominational quantity representations, e.g. using difunction pulse trains, STEELE computers, phase computers
    • G06F7/72Methods or arrangements for performing computations using a digital non-denominational number representation, i.e. number representation without radix; Computing devices using combinations of denominational and non-denominational quantity representations, e.g. using difunction pulse trains, STEELE computers, phase computers using residue arithmetic
    • G06F7/724Finite field arithmetic
    • G06F7/725Finite field arithmetic over elliptic curves

Abstract

L'invention concerne un procédé destiné à générer des nombres pseudo-aléatoires et un procédé de signature électronique. Le procédé selon l'invention destiné à générer des nombres pseudo-aléatoires consiste à déterminer des points sur au moins deux courbes elliptiques différentes, et à créer à chaque fois un nombre pseudo-aléatoire par association des points. L'association des points de différentes courbes elliptiques en un nombre pseudo-aléatoire ne permet pas de déduire les courbes elliptiques individuelles à partir des nombres pseudo-aléatoires ainsi créés, par conséquent, la sécurité cryptographique du procédé selon l'invention est augmentée de manière considérable, étant donné que le calcul de logarithmes discrets est rendu impossible.
CA002381937A 1999-08-18 2000-08-16 Procede destine a generer des nombres pseudo-aleatoires et procede de signature electronique Abandoned CA2381937A1 (fr)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
DE19939059.2 1999-08-18
DE19939059 1999-08-18
PCT/DE2000/002776 WO2001013218A1 (fr) 1999-08-18 2000-08-16 Procede destine a generer des nombres pseudo-aleatoires et procede de signature electronique

Publications (1)

Publication Number Publication Date
CA2381937A1 true CA2381937A1 (fr) 2001-02-22

Family

ID=7918727

Family Applications (1)

Application Number Title Priority Date Filing Date
CA002381937A Abandoned CA2381937A1 (fr) 1999-08-18 2000-08-16 Procede destine a generer des nombres pseudo-aleatoires et procede de signature electronique

Country Status (4)

Country Link
EP (1) EP1222527A1 (fr)
JP (1) JP2003507761A (fr)
CA (1) CA2381937A1 (fr)
WO (1) WO2001013218A1 (fr)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2256702A1 (fr) 2009-05-28 2010-12-01 Dmitri Pakhomov Écriture de carte portable, système de carte et procédé d'utilisation d'une écriture de carte portable

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7646872B2 (en) 2004-04-02 2010-01-12 Research In Motion Limited Systems and methods to securely generate shared keys
WO2006076804A1 (fr) 2005-01-21 2006-07-27 Certicom Corp. Generation de nombre aleatoire par courbe elliptique
FR2897451A1 (fr) * 2006-02-13 2007-08-17 France Telecom Dispositif et procede de cryptographie pour generer des nombres pseudo-aletoires
DE102006017911B4 (de) 2006-04-18 2023-01-26 creditPass GmbH Elektronisches Bezahlsystem und Verfahren zum Ausführen eines Bezahlvorgangs
WO2010019593A1 (fr) 2008-08-11 2010-02-18 Assa Abloy Ab Communications par interface wiegand sécurisées
US10452877B2 (en) 2016-12-16 2019-10-22 Assa Abloy Ab Methods to combine and auto-configure wiegand and RS485

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2256702A1 (fr) 2009-05-28 2010-12-01 Dmitri Pakhomov Écriture de carte portable, système de carte et procédé d'utilisation d'une écriture de carte portable

Also Published As

Publication number Publication date
WO2001013218A1 (fr) 2001-02-22
EP1222527A1 (fr) 2002-07-17
JP2003507761A (ja) 2003-02-25

Similar Documents

Publication Publication Date Title
JP3862500B2 (ja) 直接埋め込み方式による高速楕円曲線暗号化の方法と装置
Khalique et al. Implementation of elliptic curve digital signature algorithm
EP2279579B1 (fr) Système crytographique à corps de galois fermé
US8184803B2 (en) Hash functions using elliptic curve cryptography
JPS5950068B2 (ja) 公開キ−式の暗号装置
KR20000071078A (ko) 유한 필드상의 이산 대수 암호시스템의 원분 다항식 구조
Reyad Text message encoding based on elliptic curve cryptography and a mapping methodology
Murthy et al. Cryptographic applications of Brahmagupta-Bha/spl tilde/skara equation
Dawahdeh et al. A new modification for menezes-vanstone elliptic curve cryptosystem
US6480606B1 (en) Elliptic curve encryption method and system
Boruah et al. Implementation of ElGamal Elliptic Curve Cryptography over prime field using C
Hwu et al. An efficient identity-based cryptosystem for end-to-end mobile security
Nabil et al. Hardware implementation of elliptic curve digital signature algorithm (ECDSA) on Koblitz curves
CA2381937A1 (fr) Procede destine a generer des nombres pseudo-aleatoires et procede de signature electronique
KR100326226B1 (ko) 행렬그룹공개키생성방법
JP3706398B2 (ja) 楕円曲線による署名、認証及び秘密通信方式
Lakshmivarahan Algorithms for public key cryptosystems: theory and application
Thomas et al. Analysis of elliptic curve scalar multiplication in secure communications
Gopalakrishna et al. IMPLEMENTATION OF DOUBLE ENCRYPTION USING ELGAMAL AND KNAPSACK ALGORITHM ON FPGA FOR NODES IN WIRELESS SENSOR NETWORKS
McCullagh Crytographic applications of bilinear maps
JPH11161164A (ja) 公開鍵暗号方式と暗号化装置および復号装置
Lalmohan et al. Design and Implementation of Secure Stream Cipher based on Elliptic Curves on Time Shared Basis
Nagaraju et al. Efficient design and FPGA implementation of ECPBSG algorithm for a secure communication applications
JP2003513312A (ja) スカラーによる因子類の乗算のための方法
Nithin et al. Stream Ciphers Based on the Elliptic Curves

Legal Events

Date Code Title Description
FZDE Discontinued