EP0980607A1 - Auf einer hash-funktion basierender pseudozufallsgenerator für geheimübertragunssysteme welche eine zufallszahl benötigen - Google Patents

Auf einer hash-funktion basierender pseudozufallsgenerator für geheimübertragunssysteme welche eine zufallszahl benötigen

Info

Publication number
EP0980607A1
EP0980607A1 EP98924379A EP98924379A EP0980607A1 EP 0980607 A1 EP0980607 A1 EP 0980607A1 EP 98924379 A EP98924379 A EP 98924379A EP 98924379 A EP98924379 A EP 98924379A EP 0980607 A1 EP0980607 A1 EP 0980607A1
Authority
EP
European Patent Office
Prior art keywords
random
message
secret
signature
key
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
EP98924379A
Other languages
English (en)
French (fr)
Inventor
David Naccache
David M'ra Hi
Françoise LEVY-DIT-VEHEL
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Gemplus SA
Original Assignee
Gemplus SCA
Gemplus Card International SA
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Gemplus SCA, Gemplus Card International SA filed Critical Gemplus SCA
Publication of EP0980607A1 publication Critical patent/EP0980607A1/de
Withdrawn legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F7/00Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
    • G07F7/08Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
    • G07F7/10Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data
    • G07F7/1008Active credit-cards provided with means to personalise their use, e.g. with PIN-introduction/comparison system
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/34Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
    • G06Q20/341Active cards, i.e. cards including their own processing means, e.g. including an IC or chip
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/409Device specific authentication in transaction processing
    • G06Q20/4097Device specific authentication in transaction processing using mutual authentication between devices and transaction partners
    • G06Q20/40975Device specific authentication in transaction processing using mutual authentication between devices and transaction partners using encryption therefor
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0838Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
    • H04L9/0841Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • H04L9/3252Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures using DSA or related signature schemes, e.g. elliptic based signatures, ElGamal or Schnorr schemes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/20Manipulating the length of blocks of bits, e.g. padding or block truncation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/80Wireless

Definitions

  • the present invention describes a system making it possible to generate digital signatures or cryptograms requiring the drawing of hazards (typically DSA, El-Gamal, Fiat-Shamir, Guillou-Quisquater for signatures, El-Gamal and McEliece for encryption), by signature or encryption devices (typically microprocessors) devoid of hardware or software resources allowing the drawing of risks.
  • hazards typically DSA, El-Gamal, Fiat-Shamir, Guillou-Quisquater for signatures, El-Gamal and McEliece for encryption
  • signature or encryption devices typically microprocessors
  • a great limitation of smart cards as a support for implementing public key algorithms is the need (frequently encountered), to have a device generating random numbers on board the card. Indeed, the development of such a device, also called generator, turns out to be complex and often unstable (sensitivity to phenomena external to the card such as the ambient temperature or the voltage applied to the card). In the case where such cryptographic systems are implemented on a computer, other phenomena, due to the very nature of the software random generators disturb the quality of the hazards.
  • a very popular hazard generation method consists of measuring the time elapsed between two keyboard keys pressed by the user. Recent cases of fraud show that this kind of generator can be biased by simulating the keyboard using a fraudulent device whose time between the various keys is known to the attacker.
  • the present invention provides an alternative solution allowing the implementation of cryptographic systems requiring the drawing of a good quality hazard on software or hardware platforms:
  • the first family of applications concerns signature schemes of the El-Gamal type.
  • the DSA algorithm Once illustrated in the context of the DSA, the application of the present invention to other algorithms of the same family can easily be implemented by a person skilled in the art. In the following, it is called the DSA algorithm.
  • DSA Digital Signature Standard
  • US Patent No. 5,231,668 entitled “Digital Signature Algorithm” was proposed by the US National Institute of Standards and Technology to provide an appropriate basis for applications requiring a digital signature instead classic signatures.
  • a DSA signature is a pair of large numbers represented in a computer by strings of binary digits.
  • the digital signature is calculated using a series of calculation rules (the DSA) and a set of parameters in a way to certify both the identity of the signatory and the integrity of the data.
  • the DSA is used to generate and verify signatures.
  • the signature generation process makes use of a private key (in order to produce a digital signature).
  • the verification process uses a public key which corresponds to the secret key without however being identical to it.
  • Each user has a pair of keys (public, secret). It is assumed that public keys are known to all, while secret keys are never disclosed.
  • Anyone has the ability to verify a user's signature using their public key, but signatures cannot be generated other than by using the user's secret key.
  • a prime module q such that 2 ⁇ q ⁇ 2 and p-1 is a multiple of q.
  • the integers p, q and g are system parameters that can be published and / or shared by a group of users.
  • the keys, secret and public, of a signatory are respectively x and y.
  • the parameters x and k are used for the generation of the signature and must be kept secrets.
  • the parameter k must be regenerated for each signature.
  • the second family also relates to signature schemes; these are schemas derived from zero disclosure protocols
  • a second family of signature algorithms to which the invention applies are those derived from zero disclosure protocols (typically Fiat-Shamir or Guillou-Quisquater patented in the United States respectively under the references 4.748.668 and 5.140.634) . Also, only one of these protocols will be described. Once applied to the Guillou and Quisquater algorithm, the extension of the invention to other algorithms of this family is obvious to those skilled in the art.
  • the parameters of the Guillou-Quisquater algorithm are:
  • the third family of applications concerns public key encryption schemes requiring a hazard.
  • the first encryption algorithm requiring a hazard described below is that of El Gamal.
  • the parameters of this algorithm are:
  • a first p module (at least 512 bits); ⁇ A number g, of order p-1 odulo p (ie such that, for any integer u, 0 ⁇ u ⁇ p-1, g u ⁇ 1 mod p;
  • y g x mod p; ⁇ A number k randomly generated or pseudo randomly such that 0 ⁇ k ⁇ q.
  • the integers p and g are system parameters that can be published, and / or shared by a group of users.
  • the public encryption key is the number y
  • the secret decryption key is the number x.
  • the parameter k is used for the generation of the cryptogram, and must not be disclosed. In addition, it must be regenerated each time it is encrypted.
  • the cipher of a message m, 0 ⁇ m ⁇ p-1, is the pair of integers (r, s), where: To find the message m, the receiver of the cryptograms (which has x), calculates: s / r x mod p, which is precisely m.
  • a second encryption algorithm requiring the generation of a hazard is the McEliece scheme, based on a problem in code theory, more precisely using a particular class of codes known as Goppa codes.
  • the general idea is to disguise a Goppa code as any linear code; there is indeed an efficient algorithm for decoding a Goppa code but on the other hand decoding a general linear code is a difficult problem.
  • the receiver knowing the information which has made it possible to disguise the code, will therefore be able to decipher the message by decoding the Goppa code obtained.
  • a secret key composed of: • A generator matrix G of a binary Goppa code of size n and dimension k correcting t errors and the corresponding decoding algorithm;
  • An RSA cryptogram is a large number represented in a computer by strings of binary or hexadecimal digits.
  • the cryptogram is calculated using a software (program) and / or hardware (electronic circuit) calculation resource implementing a series of calculation rules (the encryption algorithm) to be applied during the processing of a set of parameters accessible to all in order to hide the content of the data processed.
  • the cryptogram is decrypted using a software or hardware calculation resource implementing a series of calculation rules (the decryption algorithm) applied (by the receiver of the cryptogram) to a set of parameters. secrets and the cryptogram.
  • the encryption process uses a public key to produce the cryptogram.
  • the decryption process uses a private key which corresponds to the secret key without however being identical to it.
  • Each user has a pair of keys (public, secret) and it is assumed that the public keys are known to all while the secret keys are never revealed.
  • anyone has the ability to encrypt a message for a user using the user's public key, but cryptograms cannot be decrypted other than by using the user's secret key.
  • the parameters of the RSA algorithm are:
  • the exponent e is accessible to everyone while the “decryption exponent” d must remain secret.
  • the security of the algorithm allows for a choice of parameters made in the rules of the art to ensure in the general case of the encryption of messages the size of the module and having no special relationships between them confidentiality between the sender and receiver of the encrypted information.
  • the exact methods of message padding may vary depending on standards, application needs, or the level of security required.
  • the fifth family concerns the blindness factors and blank signatures.
  • a basic functionality, called primitive by those skilled in the art, used in many cryptographic schemes and protocols is the mechanism for signing a blank message.
  • This functionality discovered and patented by Chaum (US patent n ° 4,759,063 and European patent n ° 0139313) makes it possible to have a message signed without the signer being able to read the message. It requires the generation of a blindness factor, making it possible to conceal the message, known only to the requester of the signature.
  • the mechanism used applies to both El Gamal-type signature schemes and RSA.
  • the random makeup method is used for example in the case where a device A wants to subcontract operations to a device B while not wishing to reveal the operands completely to it.
  • A can camouflage the number to be reduced modulo n by multiplying it by a random multiple of the module.
  • the two devices perform the following operations:
  • the two devices can then use the secret “key” quantity to exchange messages over a secure channel using a symmetric encryption algorithm taking as parameters the “key” quantity and the message to be encrypted.
  • the main advantage of the inventive method compared to the previous proposals in terms of digital signatures or encryption lies in the ability to calculate signatures or perform encryption operations without requiring a random generator on board the signing circuit or encrypting.
  • the present invention relates to a cryptographic system, normally requiring the drawing of a hazard k, the hazard being an integer; the system is characterized in that it is implemented by replacing said random k by the quantity h (m
  • the cryptographic system of the invention comprises at least:
  • the random error vector e, renewed by the encryptor at each encryption is derived from the quantity h (m), where m is the message to encrypt.
  • i) as necessary so that the length of the concatenated k A is at least equal to 1/6 of the size of the module n (in the case of RSA encryption for example) or else generate k h (m
  • ⁇ ) and expand it; b. Compose m r such that m r size (m)
  • said protocol comprises at least the following steps: a.
  • a first device, wishing to send the message m, calculates g h (m
  • a second device, receiver, generates a hazard a and calculates b 2 g a mod p; c.
  • the two devices exchange b x and b 2 and compute key d.
  • the first device figures c f (m, key) where f is a symmetric encryption mechanism; the first device sends c to the second device which decrypts it and finds m.
  • the communicating devices are smart cards, PCMCIA cards, badges, contactless cards or any other portable device.
  • the communication between said devices implementing the invention is carried out by means of exchanges of electronic signals, radio waves or infrared signals.
  • the invention is presented in a more detailed manner by taking up the notations used in the description of the families of applications.
  • h will take as its parameter a secret datum, namely the secret key of the signer, and a public datum, the message to be signed.
  • h will take as parameter only the message to sign.
  • m is the hash of the message M to be signed
  • x the signer's secret key.
  • the rest of the generation of the signature (r, s) is carried out in an identical manner to the original process. Similarly, the verification of the generated signature remains unchanged.
  • k h (m
  • B the hash of the message M to be signed
  • B the secret key of the signatory.
  • the rest of the generation of the signature (d, D) is carried out in an identical manner to the original process. Similarly, the verification of the generated signature remains unchanged.
  • the McEliece algorithm is then carried out as described above.
  • the decryption also remains unchanged.
  • this method of generating e solves the problem of encrypting the same message twice. Indeed, in the case of the generic McEliece, it is unwise to encrypt the same message twice (therefore with two different error vectors), because we can guess part of the support of the error vectors, and consequently find the clear message more easily.
  • the invention applies as follows to the fourth family, which relates to cryptographic schemes requiring random padding: - as specified, a recommendable security measure is to “pad” the messages with a random sequence. But here again, if the sequence varies for several ciphers of the same message, an attack is still possible revealing the clear message.
  • k.j_ h (m
  • ⁇ ) then expand k before concatenating it to the message; ⁇ Compose m r such that m r size (m)
  • the invention applies as follows to the sixth family, which relates to said key exchange schemes based on the Diffie-Hellman method.
  • the device also called a device, which wishes to send a message m, uses, instead of a hazard, the quantity h (m
  • FIG. 1 describes the flow diagram of a signature or decryption apparatus implementing the system proposed by the present invention.
  • FIG. 2 describes the flowchart of a verification or encryption apparatus implementing the system proposed by the present invention.
  • FIG. 3 represents the data exchanged by the signature device and the verification device.
  • FIG. 4 represents the data exchanged by the encryption device and the decryption device.
  • each signature / decryption device (typically a smart card) consists of a processing unit (CPU), a communication interface, a random access memory (RAM) and / or a non-volatile memory.
  • the CPU and / or ROM of the signature / decryption device contain calculation programs or resources corresponding to the stages of the signature / decryption algorithm (rules for calculating and using the hash function, multiplication, squared, addition, modular inverse and modular reduction). Some of these operations can be grouped together: for example, modular reduction can be directly integrated into multiplication.
  • the RAM contains the message M to which the hash function or the calculation rules for the generation of signatures or the calculation rules for the generation of cryptograms apply.
  • the E (E) PROM contains at least the parameters m, x and k generated and used as specified in the description which follows.
  • the CPU controls, via the address and data buses, the communication interface, the memory read and write operations.
  • each signature device is protected from the outside world by physical protections. These protections should be sufficient to prevent any unauthorized entity from obtaining the secret key.
  • the techniques most used today in this area are the integration of the chip into a security module and the equipment of the chips with devices capable of detecting variations in temperature, light as well as voltages and frequencies. abnormal clock. Particular design techniques, such as scrambling the memory access, are also used.
  • the verification device consists of at least one processing unit (CPU) and memory resources.
  • the CPU controls, via the address and data buses, the communication interface, the memory read and write operations.
  • the authority's CPU and / or ROM contain calculation programs or resources allowing the signature or encryption protocol to be implemented (calculation rules and hash, multiplication, exponentiation and modular reduction function). Some of these operations can be grouped together (for example, the modular reduction can be directly integrated into the multiplication).

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • Accounting & Taxation (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • Theoretical Computer Science (AREA)
  • Signal Processing (AREA)
  • Finance (AREA)
  • Microelectronics & Electronic Packaging (AREA)
  • Storage Device Security (AREA)
EP98924379A 1997-05-07 1998-05-05 Auf einer hash-funktion basierender pseudozufallsgenerator für geheimübertragunssysteme welche eine zufallszahl benötigen Withdrawn EP0980607A1 (de)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
FR9706198A FR2763194B1 (fr) 1997-05-07 1997-05-07 Generateur pseudo-aleatoire base sur une fonction de hachage pour systemes cryptographiques necessitant le tirage d'aleas
FR9706198 1997-05-07
PCT/FR1998/000901 WO1998051038A1 (fr) 1997-05-07 1998-05-05 Generateur pseudo-aleatoire base sur une fonction de hachage pour systemes cryptographiques necessitant le tirage d'aleas

Publications (1)

Publication Number Publication Date
EP0980607A1 true EP0980607A1 (de) 2000-02-23

Family

ID=9507074

Family Applications (1)

Application Number Title Priority Date Filing Date
EP98924379A Withdrawn EP0980607A1 (de) 1997-05-07 1998-05-05 Auf einer hash-funktion basierender pseudozufallsgenerator für geheimübertragunssysteme welche eine zufallszahl benötigen

Country Status (7)

Country Link
EP (1) EP0980607A1 (de)
JP (1) JP2001507479A (de)
CN (1) CN1262830A (de)
AU (1) AU7659598A (de)
CA (1) CA2288767A1 (de)
FR (1) FR2763194B1 (de)
WO (1) WO1998051038A1 (de)

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
FR2788909B1 (fr) * 1999-01-27 2004-02-20 France Telecom Procede d'authentification ou de signature a nombre de calculs reduit
FR2814577B1 (fr) * 2000-09-22 2003-09-12 Laurent Francois Ernest Pele Boitier lecteur de carte a memoire connectable a un autre boitier homologue pour permettre le dialogue entre 2 cartes a puce
JP4550438B2 (ja) * 2004-01-21 2010-09-22 三菱電機株式会社 被認証装置、認証システム、認証方法および認証集積回路
FR2917197B1 (fr) * 2007-06-07 2009-11-06 Thales Sa Procede de masquage du resultat d'une operation de multiplication modulaire et dispositif associe.
US9621525B2 (en) * 2014-06-02 2017-04-11 Qualcomm Incorporated Semi-deterministic digital signature generation
US11120167B2 (en) * 2019-03-25 2021-09-14 Micron Technology, Inc. Block chain based validation of memory commands

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5299262A (en) * 1992-08-13 1994-03-29 The United States Of America As Represented By The United States Department Of Energy Method for exponentiating in cryptographic systems
US5432852A (en) * 1993-09-29 1995-07-11 Leighton; Frank T. Large provably fast and secure digital signature schemes based on secure hash functions

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
See references of WO9851038A1 *

Also Published As

Publication number Publication date
CN1262830A (zh) 2000-08-09
WO1998051038A1 (fr) 1998-11-12
AU7659598A (en) 1998-11-27
FR2763194B1 (fr) 2000-07-28
CA2288767A1 (fr) 1998-11-12
JP2001507479A (ja) 2001-06-05
FR2763194A1 (fr) 1998-11-13

Similar Documents

Publication Publication Date Title
EP2345202B1 (de) Digitales signaturverfahren in zwei schritten
US7912216B2 (en) Elliptic curve cryptosystem optimization using two phase key generation
EP1151576B1 (de) Kryptographisches verfahren unter verwendung eines öffentlichen und eines privaten schlüssels
FR2759226A1 (fr) Protocole de verification d'une signature numerique
FR2760583A1 (fr) Systeme de verification de cartes de donnees
EP1459479A2 (de) Kryptographisches system für eine gruppensignatur
JP2004512570A (ja) 非安全な暗号加速器を用いる方法と装置
EP1224765B1 (de) Gegenmassnahme in einem elektronischen baustein zur ausführung eines kryptoalgorithmus mit öffentlichem schlüssel vom rsa-typ
EP0666664B1 (de) Verfahren zur digitalen Unterschrift und Authentifizierung von Nachrichten unter Verwendung eines diskreten Logarithmus mit verringerter Anzahl von modularen Multiplikationen
FR2788909A1 (fr) Procede d'authentification ou de signature a nombre de calculs reduit
EP0980607A1 (de) Auf einer hash-funktion basierender pseudozufallsgenerator für geheimübertragunssysteme welche eine zufallszahl benötigen
EP1829279A2 (de) Verfahren und einrichtung zum ausführen einer kryptographischen kalkulation
EP1520370B1 (de) Kryptographisches verfahren und einrichtungen zur ermöglichung von berechnungen während transaktionen
WO2003055134A9 (fr) Procede cryptographique permettant de repartir la charge entre plusieurs entites et dispositifs pour mettre en oeuvre ce procede
EP1325584A1 (de) Verfahren zur kodierung langer nachrichten für auf rsa basierende digitalsignaturmethoden
FR2818846A1 (fr) Procede de contre-mesure dans un composant electronique mettant en oeuvre un algorithme de cryptographie
EP0962069B1 (de) Kryptographische vorrichtung mit verschlüsselungs und entschlüsselungssystem und schlüsselhinterlegungssystem
EP1325585A1 (de) Verfahren zur beschleunigten übertragung einer digitalsignatur
WO2003021864A2 (fr) Procede de reduction de la taille d'une signature rsa ou rabin
WO2003044619A2 (en) A method of sale auditing in private transaction of e-goods
Song et al. A distributed E-Business system based on conic curve
FR2818473A1 (fr) Procedes de contre-mesure dans un composant electronique mettant en oeuvre un algorithme de cryptographie a cle publique de type rsa
AU2771500A (en) Cyclotomic polynominal construction of discrete logarithm cryptosystems over finite fields

Legal Events

Date Code Title Description
PUAI Public reference made under article 153(3) epc to a published international application that has entered the european phase

Free format text: ORIGINAL CODE: 0009012

17P Request for examination filed

Effective date: 19991207

AK Designated contracting states

Kind code of ref document: A1

Designated state(s): AT BE CH DE DK ES FI FR GB GR IE IT LI LU MC NL PT SE

17Q First examination report despatched

Effective date: 20020322

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: THE APPLICATION IS DEEMED TO BE WITHDRAWN

18D Application deemed to be withdrawn

Effective date: 20031210