AU2002221940A1 - Method and device for detecting a key pair and for generating rsa keys - Google Patents

Method and device for detecting a key pair and for generating rsa keys

Info

Publication number
AU2002221940A1
AU2002221940A1 AU2002221940A AU2194002A AU2002221940A1 AU 2002221940 A1 AU2002221940 A1 AU 2002221940A1 AU 2002221940 A AU2002221940 A AU 2002221940A AU 2194002 A AU2194002 A AU 2194002A AU 2002221940 A1 AU2002221940 A1 AU 2002221940A1
Authority
AU
Australia
Prior art keywords
sub
modulus
prime
minus
multiplicative inverse
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
AU2002221940A
Inventor
Jean-Pierre Seifert
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Infineon Technologies AG
Original Assignee
Infineon Technologies AG
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Infineon Technologies AG filed Critical Infineon Technologies AG
Publication of AU2002221940A1 publication Critical patent/AU2002221940A1/en
Abandoned legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • H04L9/3006Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters
    • H04L9/302Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters involving the integer factorization problem, e.g. RSA or quadratic sieve [QS] schemes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords

Landscapes

  • Engineering & Computer Science (AREA)
  • Computing Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Storage Device Security (AREA)
  • Crystals, And After-Treatments Of Crystals (AREA)
  • Power Conversion In General (AREA)
  • Measurement Of Resistance Or Impedance (AREA)
  • Complex Calculations (AREA)
  • Circuits Of Receivers In General (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
  • Lock And Its Accessories (AREA)

Abstract

In a method of determining a pair of numbers comprising a first number and a second number, in which the first number may be a first key and the second number may be a second key of an encryption system and the second number is the multiplicative inverse with respect to a modulus of the first number, said modulus being equal to the product of a first prime number and a second prime number, the first number is selected first. Thereafter, a first sub-number for the second number is computed as a multiplicative inverse of the first number with respect to a first sub-modulus that is equal to the first prime number minus 1 divided by the greatest common divisor of the first prime number minus 1 and the second prime number minus 1. Then, a second sub-number for the second number is computed as multiplicative inverse of the first number with respect to a second sub-modulus that is equal to the second prime number minus 1, with said first sub-modulus and said second sub-modulus being relatively prime. Finally, the second number is determined using the first sub-number and the second sub-number by means of the Chinese remainder theorem. By utilization of the Chinese remainder theorem, the operation of forming the multiplicative inverse is transformed to two corresponding operations with shorter numbers and a fast combination step, so that an acceleration by the factor of 4 is obtained as compared to a method without Chinese remainder theorem.
AU2002221940A 2000-12-12 2001-12-06 Method and device for detecting a key pair and for generating rsa keys Abandoned AU2002221940A1 (en)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
DE10061697.6 2000-12-12
DE10061697A DE10061697A1 (en) 2000-12-12 2000-12-12 Method and device for determining a key pair and for generating RSA keys
PCT/EP2001/014350 WO2002049266A2 (en) 2000-12-12 2001-12-06 Method and device for detecting a key pair and for generating rsa keys

Publications (1)

Publication Number Publication Date
AU2002221940A1 true AU2002221940A1 (en) 2002-06-24

Family

ID=7666716

Family Applications (1)

Application Number Title Priority Date Filing Date
AU2002221940A Abandoned AU2002221940A1 (en) 2000-12-12 2001-12-06 Method and device for detecting a key pair and for generating rsa keys

Country Status (8)

Country Link
US (1) US7248692B2 (en)
EP (1) EP1346509B1 (en)
JP (1) JP3854226B2 (en)
CN (1) CN100388663C (en)
AT (1) ATE422278T1 (en)
AU (1) AU2002221940A1 (en)
DE (2) DE10061697A1 (en)
WO (1) WO2002049266A2 (en)

Families Citing this family (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE10222212A1 (en) 2002-05-16 2003-12-04 Giesecke & Devrient Gmbh Spying-proof modular inversion
US6969198B2 (en) 2002-11-06 2005-11-29 Nissan Motor Co., Ltd. Low-friction sliding mechanism
DE10253285B4 (en) * 2002-11-15 2018-11-15 Giesecke+Devrient Mobile Security Gmbh Concealment of a secret value
US8442219B2 (en) * 2004-03-31 2013-05-14 Jesse Lipson Public key cryptographic methods and systems
US7725715B2 (en) * 2005-02-24 2010-05-25 Access Business Group International Llc System and method for three-phase data encryption
US20080019508A1 (en) * 2005-05-03 2008-01-24 Jesse Lipson Public key cryptographic methods and systems with rebalancing
US8170216B2 (en) * 2008-06-18 2012-05-01 Apple Inc. Techniques for validating and sharing secrets
US9893885B1 (en) * 2015-03-13 2018-02-13 Amazon Technologies, Inc. Updating cryptographic key pair
US9674162B1 (en) 2015-03-13 2017-06-06 Amazon Technologies, Inc. Updating encrypted cryptographic key pair
US10003467B1 (en) 2015-03-30 2018-06-19 Amazon Technologies, Inc. Controlling digital certificate use
US9479340B1 (en) 2015-03-30 2016-10-25 Amazon Technologies, Inc. Controlling use of encryption keys
FR3088452B1 (en) * 2018-11-08 2023-01-06 Idemia France METHOD FOR VERIFYING THE INTEGRITY OF A PAIR OF CRYPTOGRAPHIC KEYS AND CRYPTOGRAPHIC DEVICE
CN112288447A (en) * 2020-10-30 2021-01-29 北京每日优鲜电子商务有限公司 Article information display method and device, electronic equipment and computer readable medium
GB2608103A (en) 2021-06-15 2022-12-28 Continental Automotive Gmbh Method and system to retrieve public keys in a memory constrained system

Family Cites Families (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5046094A (en) * 1989-02-02 1991-09-03 Kabushiki Kaisha Toshiba Server-aided computation method and distributed information processing unit
US5905799A (en) * 1994-07-20 1999-05-18 Bell Atlantic Network Services, Inc. Programmed computer for identity verification, forming joint signatures and session key agreement in an RSA public cryptosystem
US5999627A (en) * 1995-01-07 1999-12-07 Samsung Electronics Co., Ltd. Method for exponentiation in a public-key cryptosystem
JP2624634B2 (en) * 1995-03-08 1997-06-25 日本電信電話株式会社 Encryption device and decryption device, encryption / decryption device, and encryption system
FR2737369A1 (en) * 1995-07-26 1997-01-31 Trt Telecom Radio Electr SYSTEM FOR COMMUNICATING ENCRYPTED MESSAGES ACCORDING TO A METHOD OF R.S.A.
US6282290B1 (en) * 1997-03-28 2001-08-28 Mykotronx, Inc. High speed modular exponentiator
CA2267721C (en) * 1998-03-26 2002-07-30 Nippon Telegraph And Telephone Corporation Scheme for fast realization of encryption, decryption and authentication
US6473508B1 (en) * 1998-12-22 2002-10-29 Adam Lucas Young Auto-recoverable auto-certifiable cryptosystems with unescrowed signature-only keys
FR2788650B1 (en) * 1999-01-14 2001-02-16 Gemplus Card Int PUBLIC AND PRIVATE KEY CRYPTOGRAPHIC PROCESS
GB9902687D0 (en) * 1999-02-08 1999-03-31 Hewlett Packard Co Cryptographic protocol
DE60021985T2 (en) * 1999-05-27 2006-06-08 Koninklijke Philips Electronics N.V. METHOD OF DEVICE FOR SAFE PRODUCTION OF PUBLIC / SECRET KEY PAIRS
FR2799851B1 (en) * 1999-10-14 2002-01-25 Gemplus Card Int COUNTER-MEASUREMENT METHOD IN AN ELECTRONIC COMPONENT USING A RSA-TYPE PUBLIC KEY CRYPTOGRAPHY ALGORITHM
FR2807246B1 (en) 2000-03-28 2002-12-27 Gemplus Card Int METHOD FOR GENERATING ELECTRONIC KEYS FROM FIRST WHOLE NUMBERS BETWEEN THEM AND DEVICE FOR IMPLEMENTING THE METHOD

Also Published As

Publication number Publication date
CN1483260A (en) 2004-03-17
DE50114693D1 (en) 2009-03-19
JP3854226B2 (en) 2006-12-06
CN100388663C (en) 2008-05-14
WO2002049266A3 (en) 2002-12-27
JP2004516506A (en) 2004-06-03
DE10061697A1 (en) 2002-06-27
US7248692B2 (en) 2007-07-24
EP1346509A2 (en) 2003-09-24
EP1346509B1 (en) 2009-02-04
US20040125949A1 (en) 2004-07-01
ATE422278T1 (en) 2009-02-15
WO2002049266A2 (en) 2002-06-20

Similar Documents

Publication Publication Date Title
AU2002221940A1 (en) Method and device for detecting a key pair and for generating rsa keys
SE8204697L (en) RSA PUBLIC KEY CRYPING SYSTEM, INCLUDING MICROPROCESSOR OR SIMILAR FOR MAINTAINING BIG SLIM PRIMALS
HK1129005A1 (en) Secure modular exponentiation with leak minimization for smartcards and other cryptosystems
EP0752770A3 (en) Cryptographic apparatus with double feedforward hash function
CA2054037A1 (en) Cryptographic system allowing encrypted communication between users with a secure mutual cipher key determined without user interaction
EP1473615A3 (en) Secure communication with a keyboard or related device
CN101632255A (en) Cryptographic method and system
WO1999034552A3 (en) Cryptographic system and method with fast decryption
GB2399904B (en) Side channel attack prevention in data processing apparatus
AU6596701A (en) Cryptographic method and cryptographic device
WO2001084766A3 (en) System and method for encryption using transparent keys
WO2005034421A3 (en) Information transfer system, encryption device, and decryption device using elliptic curve
AU5074201A (en) Generation of a mathematically constrained key using a one-way function
WO2007020564A3 (en) Circuit arrangement and method for rsa key generation
Xiao et al. Research and implementation of four-prime RSA digital signature algorithm
IL164320A (en) Challenge-based authentication without requiring knowledge of secret authentication data
WO2002011360A3 (en) Cryptography private key storage and recovery method and apparatus
US7177423B2 (en) Method and apparatus for exponentiation in an RSA cryptosystem
DE60038042D1 (en) Ones complement-encryption combiner
WO2005048008A2 (en) Enhanced natural montgomery exponent masking
JPH11225138A (en) Encryption processing unit encryption processing method and recording medium recoding the method
FR2842052B1 (en) CRYPTOGRAPHIC METHOD AND DEVICES FOR REDUCING CALCULATION DURING TRANSACTIONS
WO2008114310A1 (en) Incorporating device having fault attack countermeasure function
Rogaway Design and analysis of message authentication codes
RU2071180C1 (en) Public-key method for message encryption and device which implements said method