AU2001284673A1 - Cryptography private key storage and recovery method and apparatus - Google Patents

Cryptography private key storage and recovery method and apparatus

Info

Publication number
AU2001284673A1
AU2001284673A1 AU2001284673A AU8467301A AU2001284673A1 AU 2001284673 A1 AU2001284673 A1 AU 2001284673A1 AU 2001284673 A AU2001284673 A AU 2001284673A AU 8467301 A AU8467301 A AU 8467301A AU 2001284673 A1 AU2001284673 A1 AU 2001284673A1
Authority
AU
Australia
Prior art keywords
sub
private key
parameter set
disclosed
recovery method
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
AU2001284673A
Inventor
Michael John Sabin
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Atmel Corp
Original Assignee
Atmel Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Atmel Corp filed Critical Atmel Corp
Publication of AU2001284673A1 publication Critical patent/AU2001284673A1/en
Abandoned legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • H04L9/3006Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters
    • H04L9/302Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters involving the integer factorization problem, e.g. RSA or quadratic sieve [QS] schemes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0894Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/12Details relating to cryptographic hardware or logic circuitry
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y04INFORMATION OR COMMUNICATION TECHNOLOGIES HAVING AN IMPACT ON OTHER TECHNOLOGY AREAS
    • Y04SSYSTEMS INTEGRATING TECHNOLOGIES RELATED TO POWER NETWORK OPERATION, COMMUNICATION OR INFORMATION TECHNOLOGIES FOR IMPROVING THE ELECTRICAL POWER GENERATION, TRANSMISSION, DISTRIBUTION, MANAGEMENT OR USAGE, i.e. SMART GRIDS
    • Y04S40/00Systems for electrical power generation, transmission, distribution or end-user application management characterised by the use of communication or information technologies, or communication or information technology specific aspects supporting them
    • Y04S40/20Information technology specific aspects, e.g. CAD, simulation, modelling, system security

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computing Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Storage Device Security (AREA)
  • Complex Calculations (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Vending Machines For Individual Products (AREA)
  • Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)
  • Refuse Collection And Transfer (AREA)
  • Medical Preparation Storing Or Oral Administration Devices (AREA)
  • Stored Programmes (AREA)
  • Exchange Systems With Centralized Control (AREA)
  • Lock And Its Accessories (AREA)

Abstract

Disclosed herein is a system and method for storage and recovery of a private key in a cryptographic system by providing a parameterization of the private key that uses less storage space than the full CRT parameter set {p, q, d<SUB>p</SUB>, d<SUB>q</SUB>, v} and that provides better computational efficiency than the minimal parameter set {p, q}. Also disclosed is a system and method for storage and recovery of a private key in a cryptographic system by providing a parameterization of the private key that uses less storage space than the full non-CRT parameter set {n, d} and that provides better computational efficiency than the minimal parameter set {p, q}. Furthermore, disclosed herein is a means for computing the parameters d<SUB>p</SUB>, d<SUB>q</SUB>, and d in a manner such that the computational sequence is independent of the values of the prime factors p and q, thereby reducing vulnerability to attacks that exploit such dependence.
AU2001284673A 2000-07-28 2001-07-26 Cryptography private key storage and recovery method and apparatus Abandoned AU2001284673A1 (en)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
US09627927 2000-07-28
US09/627,927 US6959091B1 (en) 2000-07-28 2000-07-28 Cryptography private key storage and recovery method and apparatus
PCT/US2001/023676 WO2002011360A2 (en) 2000-07-28 2001-07-26 Cryptography private key storage and recovery method and apparatus

Publications (1)

Publication Number Publication Date
AU2001284673A1 true AU2001284673A1 (en) 2002-02-13

Family

ID=24516709

Family Applications (1)

Application Number Title Priority Date Filing Date
AU2001284673A Abandoned AU2001284673A1 (en) 2000-07-28 2001-07-26 Cryptography private key storage and recovery method and apparatus

Country Status (17)

Country Link
US (1) US6959091B1 (en)
EP (1) EP1305907B1 (en)
JP (1) JP2004505548A (en)
KR (1) KR100737667B1 (en)
CN (1) CN1314223C (en)
AT (1) ATE320124T1 (en)
AU (1) AU2001284673A1 (en)
CA (1) CA2417520A1 (en)
CY (1) CY1105328T1 (en)
DE (1) DE60117813T2 (en)
DK (1) DK1305907T3 (en)
ES (1) ES2255568T3 (en)
HK (1) HK1062510A1 (en)
NO (1) NO20030415L (en)
PT (1) PT1305907E (en)
RU (1) RU2279766C2 (en)
WO (1) WO2002011360A2 (en)

Families Citing this family (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6959091B1 (en) * 2000-07-28 2005-10-25 Atmel Corporation Cryptography private key storage and recovery method and apparatus
FR2841411B1 (en) * 2002-06-19 2004-10-29 Gemplus Card Int ELECTRONIC KEY GENERATION METHOD FOR PUBLIC KEY CRYTOGRAPHY AND SECURE PORTABLE OBJECT IMPLEMENTING THE METHOD
EP1540880B1 (en) * 2002-09-11 2006-03-08 Giesecke & Devrient GmbH Protected cryptographic calculation
US7634659B2 (en) * 2002-09-20 2009-12-15 Cable Television Laboratories, Inc. Roaming hardware paired encryption key generation
EP1920324A1 (en) 2005-08-19 2008-05-14 Nxp B.V. Circuit arrangement for and method of performing an inversion operation in a cryptographic calculation
CN101421972B (en) * 2006-04-12 2011-06-08 艾利森电话股份有限公司 Data packet compressing and ciphering method, node and apparatus in remote communication network
EP2115933A2 (en) * 2007-02-27 2009-11-11 THOMSON Licensing A method and a device for generating compressed rsa moduli
EP1998491A1 (en) * 2007-05-31 2008-12-03 Thomson Licensing Method for calculating compressed RSA moduli
TWI350454B (en) * 2007-12-10 2011-10-11 Phison Electronics Corp Anti-attacking method for private key, controller and storage device executing the same
US9444622B2 (en) * 2008-09-15 2016-09-13 Hewlett Packard Enterprise Development Lp Computing platform with system key
US8737617B2 (en) * 2009-09-29 2014-05-27 Panasonic Corporation Encryption apparatus, decryption apparatus, encryption method, decryption method, and encryption/decryption system
CN104506506B (en) * 2014-12-15 2017-12-29 齐宇庆 A kind of electronic information security storage system and storage method
FR3088452B1 (en) * 2018-11-08 2023-01-06 Idemia France METHOD FOR VERIFYING THE INTEGRITY OF A PAIR OF CRYPTOGRAPHIC KEYS AND CRYPTOGRAPHIC DEVICE

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5848159A (en) 1996-12-09 1998-12-08 Tandem Computers, Incorporated Public key cryptographic apparatus and method
US6154541A (en) * 1997-01-14 2000-11-28 Zhang; Jinglong F Method and apparatus for a robust high-speed cryptosystem
FR2759806B1 (en) * 1997-02-19 1999-04-23 Gemplus Card Int CRYPTOGRAPHIC SYSTEM COMPRISING AN ENCRYPTION AND DECRYPTION SYSTEM AND A KEY SEQUEST SYSTEM, AND APPARATUS AND DEVICES THEREOF
JPH1127253A (en) * 1997-07-07 1999-01-29 Hitachi Ltd Key recovery system, key recovery device, recording medium for storing key recovery program and key recovery method
US6708273B1 (en) * 1997-09-16 2004-03-16 Safenet, Inc. Apparatus and method for implementing IPSEC transforms within an integrated circuit
US6081598A (en) * 1997-10-20 2000-06-27 Microsoft Corporation Cryptographic system and method with fast decryption
US6959091B1 (en) * 2000-07-28 2005-10-25 Atmel Corporation Cryptography private key storage and recovery method and apparatus

Also Published As

Publication number Publication date
ES2255568T3 (en) 2006-07-01
NO20030415D0 (en) 2003-01-27
WO2002011360A2 (en) 2002-02-07
CN1466830A (en) 2004-01-07
KR20030075146A (en) 2003-09-22
WO2002011360A3 (en) 2002-06-13
PT1305907E (en) 2006-07-31
JP2004505548A (en) 2004-02-19
RU2279766C2 (en) 2006-07-10
US6959091B1 (en) 2005-10-25
KR100737667B1 (en) 2007-07-09
CN1314223C (en) 2007-05-02
EP1305907A2 (en) 2003-05-02
NO20030415L (en) 2003-03-28
DE60117813T2 (en) 2006-10-05
ATE320124T1 (en) 2006-03-15
HK1062510A1 (en) 2004-11-05
DK1305907T3 (en) 2006-06-26
CY1105328T1 (en) 2010-03-03
DE60117813D1 (en) 2006-05-04
CA2417520A1 (en) 2002-02-07
EP1305907B1 (en) 2006-03-08

Similar Documents

Publication Publication Date Title
US10749675B2 (en) Homomorphic white box system and method for using same
CN103414682B (en) The method for cloud storage of a kind of data and system
Vigila et al. Implementation of text based cryptosystem using elliptic curve cryptography
CA2308170A1 (en) Masked digital signatures
Winternitz Producing a one-way hash function from DES
AU2001284673A1 (en) Cryptography private key storage and recovery method and apparatus
Hong et al. Homomorphic encryption scheme based on elliptic curve cryptography for privacy protection of cloud computing
CN1355974A (en) Countermeasure to power attack and timing attack on cryptographic operations
EP0792043A3 (en) Method of sharing cryptokey
CN102629924A (en) Private information retrieval method in environment of a plurality of servers
CN112511304A (en) Power data privacy communication method based on hybrid encryption algorithm
CN109450640A (en) Two side&#39;s endorsement methods and system based on SM2
CN105721156A (en) General Encoding Functions For Modular Exponentiation Encryption Schemes
Liu et al. Asymmetric cryptosystem by using modular arithmetic operation based on double random phase encoding
WO2001084766A3 (en) System and method for encryption using transparent keys
Hwang et al. Authenticated encryption schemes with message linkage
CN109214972A (en) A kind of image encryption method based on chaos pseudo random DNA enhancing
KR101601684B1 (en) Method for implementing symmetric key encryption algorithm against power analysis attacks
US7424114B2 (en) Method for enhancing security of public key encryption schemas
CN113114454B (en) Efficient privacy outsourcing k-means clustering method
Astya et al. Image encryption and decryption using elliptic curve cryptography
Shankar et al. Image encryption for mobile devices
US7505585B2 (en) Method of generating cryptographic key using elliptic curve and expansion in joint sparse form and using same
Novamizanti et al. Designing secured data using a combination of LZW compression, RSA encryption, and DCT steganography
Berlin et al. A novel encryption technique for securing text files