AU2002221940A1 - Method and device for detecting a key pair and for generating rsa keys - Google Patents
Method and device for detecting a key pair and for generating rsa keysInfo
- Publication number
- AU2002221940A1 AU2002221940A1 AU2002221940A AU2194002A AU2002221940A1 AU 2002221940 A1 AU2002221940 A1 AU 2002221940A1 AU 2002221940 A AU2002221940 A AU 2002221940A AU 2194002 A AU2194002 A AU 2194002A AU 2002221940 A1 AU2002221940 A1 AU 2002221940A1
- Authority
- AU
- Australia
- Prior art keywords
- sub
- modulus
- prime
- minus
- multiplicative inverse
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
- H04L9/3006—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters
- H04L9/302—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters involving the integer factorization problem, e.g. RSA or quadratic sieve [QS] schemes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
Landscapes
- Engineering & Computer Science (AREA)
- Computing Systems (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Mobile Radio Communication Systems (AREA)
- Storage Device Security (AREA)
- Crystals, And After-Treatments Of Crystals (AREA)
- Power Conversion In General (AREA)
- Measurement Of Resistance Or Impedance (AREA)
- Complex Calculations (AREA)
- Circuits Of Receivers In General (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
- Lock And Its Accessories (AREA)
Abstract
In a method of determining a pair of numbers comprising a first number and a second number, in which the first number may be a first key and the second number may be a second key of an encryption system and the second number is the multiplicative inverse with respect to a modulus of the first number, said modulus being equal to the product of a first prime number and a second prime number, the first number is selected first. Thereafter, a first sub-number for the second number is computed as a multiplicative inverse of the first number with respect to a first sub-modulus that is equal to the first prime number minus 1 divided by the greatest common divisor of the first prime number minus 1 and the second prime number minus 1. Then, a second sub-number for the second number is computed as multiplicative inverse of the first number with respect to a second sub-modulus that is equal to the second prime number minus 1, with said first sub-modulus and said second sub-modulus being relatively prime. Finally, the second number is determined using the first sub-number and the second sub-number by means of the Chinese remainder theorem. By utilization of the Chinese remainder theorem, the operation of forming the multiplicative inverse is transformed to two corresponding operations with shorter numbers and a fast combination step, so that an acceleration by the factor of 4 is obtained as compared to a method without Chinese remainder theorem.
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
DE10061697.6 | 2000-12-12 | ||
DE10061697A DE10061697A1 (en) | 2000-12-12 | 2000-12-12 | Method and device for determining a key pair and for generating RSA keys |
PCT/EP2001/014350 WO2002049266A2 (en) | 2000-12-12 | 2001-12-06 | Method and device for detecting a key pair and for generating rsa keys |
Publications (1)
Publication Number | Publication Date |
---|---|
AU2002221940A1 true AU2002221940A1 (en) | 2002-06-24 |
Family
ID=7666716
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
AU2002221940A Abandoned AU2002221940A1 (en) | 2000-12-12 | 2001-12-06 | Method and device for detecting a key pair and for generating rsa keys |
Country Status (8)
Country | Link |
---|---|
US (1) | US7248692B2 (en) |
EP (1) | EP1346509B1 (en) |
JP (1) | JP3854226B2 (en) |
CN (1) | CN100388663C (en) |
AT (1) | ATE422278T1 (en) |
AU (1) | AU2002221940A1 (en) |
DE (2) | DE10061697A1 (en) |
WO (1) | WO2002049266A2 (en) |
Families Citing this family (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
DE10222212A1 (en) | 2002-05-16 | 2003-12-04 | Giesecke & Devrient Gmbh | Spying-proof modular inversion |
US6969198B2 (en) | 2002-11-06 | 2005-11-29 | Nissan Motor Co., Ltd. | Low-friction sliding mechanism |
DE10253285B4 (en) * | 2002-11-15 | 2018-11-15 | Giesecke+Devrient Mobile Security Gmbh | Concealment of a secret value |
US8442219B2 (en) * | 2004-03-31 | 2013-05-14 | Jesse Lipson | Public key cryptographic methods and systems |
US7725715B2 (en) * | 2005-02-24 | 2010-05-25 | Access Business Group International Llc | System and method for three-phase data encryption |
US20080019508A1 (en) * | 2005-05-03 | 2008-01-24 | Jesse Lipson | Public key cryptographic methods and systems with rebalancing |
US8170216B2 (en) * | 2008-06-18 | 2012-05-01 | Apple Inc. | Techniques for validating and sharing secrets |
US9893885B1 (en) * | 2015-03-13 | 2018-02-13 | Amazon Technologies, Inc. | Updating cryptographic key pair |
US9674162B1 (en) | 2015-03-13 | 2017-06-06 | Amazon Technologies, Inc. | Updating encrypted cryptographic key pair |
US10003467B1 (en) | 2015-03-30 | 2018-06-19 | Amazon Technologies, Inc. | Controlling digital certificate use |
US9479340B1 (en) | 2015-03-30 | 2016-10-25 | Amazon Technologies, Inc. | Controlling use of encryption keys |
FR3088452B1 (en) * | 2018-11-08 | 2023-01-06 | Idemia France | METHOD FOR VERIFYING THE INTEGRITY OF A PAIR OF CRYPTOGRAPHIC KEYS AND CRYPTOGRAPHIC DEVICE |
CN112288447A (en) * | 2020-10-30 | 2021-01-29 | 北京每日优鲜电子商务有限公司 | Article information display method and device, electronic equipment and computer readable medium |
GB2608103A (en) | 2021-06-15 | 2022-12-28 | Continental Automotive Gmbh | Method and system to retrieve public keys in a memory constrained system |
Family Cites Families (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5046094A (en) * | 1989-02-02 | 1991-09-03 | Kabushiki Kaisha Toshiba | Server-aided computation method and distributed information processing unit |
US5905799A (en) * | 1994-07-20 | 1999-05-18 | Bell Atlantic Network Services, Inc. | Programmed computer for identity verification, forming joint signatures and session key agreement in an RSA public cryptosystem |
US5999627A (en) * | 1995-01-07 | 1999-12-07 | Samsung Electronics Co., Ltd. | Method for exponentiation in a public-key cryptosystem |
JP2624634B2 (en) * | 1995-03-08 | 1997-06-25 | 日本電信電話株式会社 | Encryption device and decryption device, encryption / decryption device, and encryption system |
FR2737369A1 (en) * | 1995-07-26 | 1997-01-31 | Trt Telecom Radio Electr | SYSTEM FOR COMMUNICATING ENCRYPTED MESSAGES ACCORDING TO A METHOD OF R.S.A. |
US6282290B1 (en) * | 1997-03-28 | 2001-08-28 | Mykotronx, Inc. | High speed modular exponentiator |
CA2267721C (en) * | 1998-03-26 | 2002-07-30 | Nippon Telegraph And Telephone Corporation | Scheme for fast realization of encryption, decryption and authentication |
US6473508B1 (en) * | 1998-12-22 | 2002-10-29 | Adam Lucas Young | Auto-recoverable auto-certifiable cryptosystems with unescrowed signature-only keys |
FR2788650B1 (en) * | 1999-01-14 | 2001-02-16 | Gemplus Card Int | PUBLIC AND PRIVATE KEY CRYPTOGRAPHIC PROCESS |
GB9902687D0 (en) * | 1999-02-08 | 1999-03-31 | Hewlett Packard Co | Cryptographic protocol |
DE60021985T2 (en) * | 1999-05-27 | 2006-06-08 | Koninklijke Philips Electronics N.V. | METHOD OF DEVICE FOR SAFE PRODUCTION OF PUBLIC / SECRET KEY PAIRS |
FR2799851B1 (en) * | 1999-10-14 | 2002-01-25 | Gemplus Card Int | COUNTER-MEASUREMENT METHOD IN AN ELECTRONIC COMPONENT USING A RSA-TYPE PUBLIC KEY CRYPTOGRAPHY ALGORITHM |
FR2807246B1 (en) | 2000-03-28 | 2002-12-27 | Gemplus Card Int | METHOD FOR GENERATING ELECTRONIC KEYS FROM FIRST WHOLE NUMBERS BETWEEN THEM AND DEVICE FOR IMPLEMENTING THE METHOD |
-
2000
- 2000-12-12 DE DE10061697A patent/DE10061697A1/en not_active Withdrawn
-
2001
- 2001-12-06 CN CNB018199127A patent/CN100388663C/en not_active Expired - Fee Related
- 2001-12-06 EP EP01270975A patent/EP1346509B1/en not_active Expired - Lifetime
- 2001-12-06 AT AT01270975T patent/ATE422278T1/en not_active IP Right Cessation
- 2001-12-06 JP JP2002550648A patent/JP3854226B2/en not_active Expired - Fee Related
- 2001-12-06 DE DE50114693T patent/DE50114693D1/en not_active Expired - Lifetime
- 2001-12-06 WO PCT/EP2001/014350 patent/WO2002049266A2/en active Application Filing
- 2001-12-06 AU AU2002221940A patent/AU2002221940A1/en not_active Abandoned
-
2003
- 2003-05-30 US US10/449,371 patent/US7248692B2/en not_active Expired - Lifetime
Also Published As
Publication number | Publication date |
---|---|
CN1483260A (en) | 2004-03-17 |
DE50114693D1 (en) | 2009-03-19 |
JP3854226B2 (en) | 2006-12-06 |
CN100388663C (en) | 2008-05-14 |
WO2002049266A3 (en) | 2002-12-27 |
JP2004516506A (en) | 2004-06-03 |
DE10061697A1 (en) | 2002-06-27 |
US7248692B2 (en) | 2007-07-24 |
EP1346509A2 (en) | 2003-09-24 |
EP1346509B1 (en) | 2009-02-04 |
US20040125949A1 (en) | 2004-07-01 |
ATE422278T1 (en) | 2009-02-15 |
WO2002049266A2 (en) | 2002-06-20 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
AU2002221940A1 (en) | Method and device for detecting a key pair and for generating rsa keys | |
SE8204697L (en) | RSA PUBLIC KEY CRYPING SYSTEM, INCLUDING MICROPROCESSOR OR SIMILAR FOR MAINTAINING BIG SLIM PRIMALS | |
HK1129005A1 (en) | Secure modular exponentiation with leak minimization for smartcards and other cryptosystems | |
EP0752770A3 (en) | Cryptographic apparatus with double feedforward hash function | |
CA2054037A1 (en) | Cryptographic system allowing encrypted communication between users with a secure mutual cipher key determined without user interaction | |
EP1473615A3 (en) | Secure communication with a keyboard or related device | |
CN101632255A (en) | Cryptographic method and system | |
WO1999034552A3 (en) | Cryptographic system and method with fast decryption | |
GB2399904B (en) | Side channel attack prevention in data processing apparatus | |
AU6596701A (en) | Cryptographic method and cryptographic device | |
WO2001084766A3 (en) | System and method for encryption using transparent keys | |
WO2005034421A3 (en) | Information transfer system, encryption device, and decryption device using elliptic curve | |
AU5074201A (en) | Generation of a mathematically constrained key using a one-way function | |
WO2007020564A3 (en) | Circuit arrangement and method for rsa key generation | |
Xiao et al. | Research and implementation of four-prime RSA digital signature algorithm | |
IL164320A (en) | Challenge-based authentication without requiring knowledge of secret authentication data | |
WO2002011360A3 (en) | Cryptography private key storage and recovery method and apparatus | |
US7177423B2 (en) | Method and apparatus for exponentiation in an RSA cryptosystem | |
DE60038042D1 (en) | Ones complement-encryption combiner | |
WO2005048008A2 (en) | Enhanced natural montgomery exponent masking | |
JPH11225138A (en) | Encryption processing unit encryption processing method and recording medium recoding the method | |
FR2842052B1 (en) | CRYPTOGRAPHIC METHOD AND DEVICES FOR REDUCING CALCULATION DURING TRANSACTIONS | |
WO2008114310A1 (en) | Incorporating device having fault attack countermeasure function | |
Rogaway | Design and analysis of message authentication codes | |
RU2071180C1 (en) | Public-key method for message encryption and device which implements said method |