FR3111038B1 - Traitements cryptographiques pour chiffrer ou déchiffrer des données - Google Patents

Traitements cryptographiques pour chiffrer ou déchiffrer des données Download PDF

Info

Publication number
FR3111038B1
FR3111038B1 FR2005595A FR2005595A FR3111038B1 FR 3111038 B1 FR3111038 B1 FR 3111038B1 FR 2005595 A FR2005595 A FR 2005595A FR 2005595 A FR2005595 A FR 2005595A FR 3111038 B1 FR3111038 B1 FR 3111038B1
Authority
FR
France
Prior art keywords
key
equal
product
forming
elliptic curve
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
FR2005595A
Other languages
English (en)
French (fr)
Other versions
FR3111038A1 (fr
Inventor
Christophe Giraud
Emmanuelle Dottax
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Idemia France SAS
Original Assignee
Idemia France SAS
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Idemia France SAS filed Critical Idemia France SAS
Priority to FR2005595A priority Critical patent/FR3111038B1/fr
Priority to EP21175809.9A priority patent/EP3917073A1/fr
Priority to JP2021088757A priority patent/JP7635073B2/ja
Priority to US17/330,554 priority patent/US11552796B2/en
Priority to KR1020210068253A priority patent/KR20210146829A/ko
Publication of FR3111038A1 publication Critical patent/FR3111038A1/fr
Application granted granted Critical
Publication of FR3111038B1 publication Critical patent/FR3111038B1/fr
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0838Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
    • H04L9/0841Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0866Generation of secret information including derivation or calculation of cryptographic keys or passwords involving user or device identifiers, e.g. serial number, physical or biometrical information, DNA, hand-signature or measurable physical characteristics
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0869Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0877Generation of secret information including derivation or calculation of cryptographic keys or passwords using additional device, e.g. trusted platform module [TPM], smartcard, USB or hardware security module [HSM]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/14Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • H04L9/3006Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters
    • H04L9/3013Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters involving the discrete logarithm problem, e.g. ElGamal or Diffie-Hellman systems
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • H04L9/3066Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • H04L9/3242Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving keyed hash functions, e.g. message authentication codes [MACs], CBC-MAC or HMAC
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • H04W12/043Key management, e.g. using generic bootstrapping architecture [GBA] using a trusted network node as an anchor
    • H04W12/0431Key distribution or pre-distribution; Key agreement
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/80Wireless

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Theoretical Computer Science (AREA)
  • Computing Systems (AREA)
  • Physics & Mathematics (AREA)
  • Mathematical Analysis (AREA)
  • Mathematical Optimization (AREA)
  • Mathematical Physics (AREA)
  • Pure & Applied Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Algebra (AREA)
  • Power Engineering (AREA)
  • Storage Device Security (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Telephonic Communication Services (AREA)
FR2005595A 2020-05-27 2020-05-27 Traitements cryptographiques pour chiffrer ou déchiffrer des données Active FR3111038B1 (fr)

Priority Applications (5)

Application Number Priority Date Filing Date Title
FR2005595A FR3111038B1 (fr) 2020-05-27 2020-05-27 Traitements cryptographiques pour chiffrer ou déchiffrer des données
EP21175809.9A EP3917073A1 (fr) 2020-05-27 2021-05-25 Établissement efficace de sessions sécurisées pour l'anonymat dans les réseaux 5g
JP2021088757A JP7635073B2 (ja) 2020-05-27 2021-05-26 データを暗号化又は復号化するための暗号処理イベント
US17/330,554 US11552796B2 (en) 2020-05-27 2021-05-26 Cryptographic processing events for encrypting or decrypting data
KR1020210068253A KR20210146829A (ko) 2020-05-27 2021-05-27 데이터 암호화 또는 복호화를위한 암호화 처리 이벤트

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
FR2005595 2020-05-27
FR2005595A FR3111038B1 (fr) 2020-05-27 2020-05-27 Traitements cryptographiques pour chiffrer ou déchiffrer des données

Publications (2)

Publication Number Publication Date
FR3111038A1 FR3111038A1 (fr) 2021-12-03
FR3111038B1 true FR3111038B1 (fr) 2023-05-12

Family

ID=72885635

Family Applications (1)

Application Number Title Priority Date Filing Date
FR2005595A Active FR3111038B1 (fr) 2020-05-27 2020-05-27 Traitements cryptographiques pour chiffrer ou déchiffrer des données

Country Status (5)

Country Link
US (1) US11552796B2 (https=)
EP (1) EP3917073A1 (https=)
JP (1) JP7635073B2 (https=)
KR (1) KR20210146829A (https=)
FR (1) FR3111038B1 (https=)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US12089035B2 (en) * 2021-08-23 2024-09-10 Qualcomm Incorporated Physical channel encryption using secret keys
US20250016552A1 (en) * 2021-10-04 2025-01-09 Telefonaktiebolaget Lm Ericsson (Publ) Conveying Data to a Communication Network
US20240195635A1 (en) * 2022-12-12 2024-06-13 Intel Corporation Roots of trust in intellectual property (ip) blocks in a system on a chip (soc)

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
MY155814A (en) * 2009-07-10 2015-11-30 Certicom Corp System and method for performing serialization of devices
CN114282928B (zh) 2016-02-23 2026-02-17 恩链控股有限公司 基于区块链系统结合钱包管理系统的加密密钥存储和转移
AU2018305843B2 (en) 2017-07-25 2020-07-02 Telefonaktiebolaget Lm Ericsson (Publ) Subscription concealed identifier
JP6634171B2 (ja) 2018-05-11 2020-01-22 株式会社bitFlyer Blockchain 公開鍵の信頼性を証明するための装置、方法及びそのためのプログラム
CN112119609B (zh) * 2018-05-14 2024-12-24 区块链控股有限公司 用于传达秘密的方法和系统

Also Published As

Publication number Publication date
FR3111038A1 (fr) 2021-12-03
US20210377025A1 (en) 2021-12-02
KR20210146829A (ko) 2021-12-06
JP7635073B2 (ja) 2025-02-25
US11552796B2 (en) 2023-01-10
EP3917073A1 (fr) 2021-12-01
JP2021193793A (ja) 2021-12-23

Similar Documents

Publication Publication Date Title
US11575501B2 (en) Preserving aggregation using homomorphic encryption and trusted execution environment, secure against malicious aggregator
US9673975B1 (en) Cryptographic key splitting for offline and online data protection
US10178090B2 (en) System and methods for protecting keys using garbled circuits
FR3111038B1 (fr) Traitements cryptographiques pour chiffrer ou déchiffrer des données
JP5184489B2 (ja) 命令レベルのソフトウェア暗号化のための方法及び装置
WO2021114927A1 (zh) 保护隐私安全的多方联合进行特征评估的方法及装置
US20210297232A1 (en) Method and apparatus for performing operation using encrypted data
JP2009501470A5 (https=)
GB2580406A (en) A client-server computer system
JP2018522291A (ja) 信頼できないコンピュータ上でプライベートプログラムを実行するためのシステム及びプロセス
CA2400223A1 (en) Validation protocol and system
US20100322416A1 (en) System, apparatus and method for license key permutation
US11101981B2 (en) Generating a pseudorandom number based on a portion of shares used in a cryptographic operation
CN113326518B (zh) 一种数据处理方法及装置
GB2604190A (en) Methods for aggregating credit across interactions
CN103258152A (zh) 执行包括已加密指令的软件应用程序的系统、装置和方法
CN110505054B (zh) 一种基于动态白盒的数据处理方法、装置及设备
JP7839496B2 (ja) 暗号通信システム
CN114547648A (zh) 一种数据匿踪查询方法及系统
CN113572604B (zh) 一种发送密钥的方法、装置、系统及电子设备
CN114513302A (zh) 一种数据加解密方法及设备
CN112913184A (zh) 计算基于块密码的加密方案系统和方法的密钥轮换周期
CN110798313A (zh) 基于秘密动态共享的包含秘密的数的协同生成方法及系统
US20190109828A1 (en) Data processing method, device and system, and storage medium
WO2016102202A1 (en) Cryptographic system and method

Legal Events

Date Code Title Description
PLFP Fee payment

Year of fee payment: 2

PLSC Publication of the preliminary search report

Effective date: 20211203

PLFP Fee payment

Year of fee payment: 3

PLFP Fee payment

Year of fee payment: 4

PLFP Fee payment

Year of fee payment: 5

PLFP Fee payment

Year of fee payment: 6