Computation of a modular multiplication with an electronic circuit
    1.
    发明公开
    Computation of a modular multiplication with an electronic circuit 有权
    Modulare Multiplikationsrechnung mit einer elektronischen Schaltung

    公开(公告)号:EP1845442A1

    公开(公告)日:2007-10-17

    申请号:EP06112507.6

    申请日:2006-04-11

    CPC classification number: G06F7/728 G06F7/722

    Abstract: The invention concerns a computing method performed by an electronic circuit and an electronic circuit for computing a modular operation with at least one operand (R) having a binary representation, at least comprising iteratively for each bit of this operand: doubling (33) the value of an intermediate result (Z) stored in a first memory element by shifting the bits of the intermediate result towards the most significant bit; and while (34) the most significant bit of the intermediate result is one, updating this intermediate result by subtracting the modulus (n) stored in a second memory element.

    Abstract translation: 本发明涉及一种由电子电路和电子电路执行的计算方法,该电子电路用至少一个具有二进制表示的操作数(R)来计算模块化操作,至少包括对该操作数的每一位进行迭代:将该值加倍(33) 通过将中间结果的位移向最高有效位来存储在第一存储元件中的中间结果(Z); 而当(34)中间结果的最高有效位为1时,通过减去存储在第二存储元件中的模数(n)来更新该中间结果。

    Improvements in the use of bilinear mappings in cryptographic applications
    2.
    发明公开
    Improvements in the use of bilinear mappings in cryptographic applications 有权
    安东尼·冯·比利亚伦·安德森

    公开(公告)号:EP1675300A1

    公开(公告)日:2006-06-28

    申请号:EP05103305.8

    申请日:2005-04-22

    CPC classification number: H04L9/08 H04L9/3073 H04L9/321 H04L2209/80 H04W12/06

    Abstract: Cryptographic methods are known that involve the computation of a non-degenerate bilinear mapping of first and second elements (P 1 , Q 1 ) one of which comprises a secret of a first entity (A). For a mapping implemented as, for example, a Tate pairing, the mapping is computable by applying a predetermined function (f) to the first and second elements (P 1 , Q 1 ) and then exponentiating the result with a known exponent (e pub ). Improvements in respect of computational loading, size of output, and security are enabled for the first party (A) by arranging for the first entity to carry out (12) only part of the mapping, a second entity (B) being used to complete computation (13) of the mapping. Cryptographic applications using these improvements are also disclosed.

    Abstract translation: 已知密码学方法涉及第一和第二元素(P 1,Q 1)的非简并双线性映射的计算,其中之一包括第一实体(A)的秘密。 对于实现为例如Tate配对的映射,可以通过将预定函数(f)应用于第一和第二元素(P 1,Q 1)然后用已知指数(e pub)对结果进行指数来计算该映射 )。 对于第一方(A),通过安排第一实体仅执行部分映射(12)来实现计算负载,输出大小和安全性的改进,第二实体(B)用于完成 映射的计算(13)。 还公开了使用这些改进的加密应用。

    Chiffrement par blocs du contenu d'une mémoire externe à un processeur
    3.
    发明公开
    Chiffrement par blocs du contenu d'une mémoire externe à un processeur 审中-公开
    吸烟者艾滋病艾滋病毒感染者

    公开(公告)号:EP1615369A1

    公开(公告)日:2006-01-11

    申请号:EP05106110.9

    申请日:2005-07-05

    Abstract: L'invention concerne un procédé et élément de chiffrement par un processeur intégré de données à stocker dans une mémoire (4), consistant à appliquer à chaque bloc de données à chiffrer (P) un algorithme de chiffrement (B) fonction d'au moins une clé (K) propre au circuit intégré, et avant d'y appliquer l'algorithme de chiffrement, à combiner le bloc de données à chiffrer avec le résultat d'une fonction (IVGEN) de l'adresse de stockage (A, I) du bloc chiffré (C) dans la mémoire et d'une quantité numérique (R) différente de la clé de chiffrement.

    Abstract translation: 该方法包括将加密算法(B)应用于要加密的数据块(P),其中该算法是集成电路特有的密钥(K)的函数。 数据块与存储器(4)中的加密块的存储地址(A)的功能(IV GEN)的结果相结合,与加密密钥不同的索引(I)和数字量(R) ,然后应用算法。 还包括以下独立权利要求:(A)通过实施用于将要存储在存储器(B)中的集成处理器数据进行加密的方法来加密数据块的方法,智能卡包括电子组件,该电子组件包括: 存储器外部集成电路。

    Method of processing information to be confidentially transmitted
    4.
    发明公开
    Method of processing information to be confidentially transmitted 审中-公开
    Verfahren zur InformationsverarbeitungfürvertraulicheÜbertragung

    公开(公告)号:EP1775880A1

    公开(公告)日:2007-04-18

    申请号:EP05425713.4

    申请日:2005-10-11

    CPC classification number: G06F7/725 H04L9/3073 H04L2209/08

    Abstract: A method of processing information (INFO) to be confidentially transmitted from a first module (C) to a second module (D) provides that a first scalar multiplication (SCAL-MLTr) may be carried out in order to obtain a first result [r]P) . This first scalar - multiplication comprises a plurality of generation steps of ordered factors (Q 0 , Q 1 ) from which a plurality of first partial sums (SUM1r, SUM2r) are required to be built.
    The method also comprises the carrying out of a second scalar multiplication (SCAL-MLTm) in order to obtain a second result ([m]P). This second multiplication provides that a plurality of second partial sums (SUM1m, SUM2m) may be built.
    A piece of encrypted information is obtained by processing the information (INFO) based on the results of said scalar multiplications.
    The method is characterized in that in order to build the second partial sums of the second scalar multiplication the same ordered factors being obtained by the generation step of the first scalar multiplication are employed.

    Abstract translation: 一种处理从第一模块(C)到第二模块(D)保密地发送的信息(INFO)的方法,可以执行第一标量乘法(SCAL-MLTr),以获得第一结果[r ] P)。 该第一标量乘法包括要求构建多个第一部分和(SUM1r,SUM2r)的有序因子(Q 0,Q 1)的多个生成步骤。 该方法还包括执行第二标量乘法(SCAL-MLTm)以获得第二结果([m] P))。 该第二乘法规定可以构建多个第二部分和(SUM1m,SUM2m)。 通过基于所述标量乘法的结果处理信息(INFO)来获得加密信息。 该方法的特征在于,为了构建第二标量乘法的第二部分和,采用通过第一标量乘法的生成步骤获得的相同有序因子。

    Method and system for establishing secure communication
    5.
    发明公开
    Method and system for establishing secure communication 审中-公开
    Vorrichtung und Verfahren zum Aufbau einer sicheren Kommunikation

    公开(公告)号:EP1533971A1

    公开(公告)日:2005-05-25

    申请号:EP03425738.6

    申请日:2003-11-18

    Abstract: A method for establishing a communication between a first electronic device (SIM) associated with a first Trusted Authority (TA-SIM) and a second electronic device (ME).
    The method comprises the steps of:

    making a first key (Ksyk SIM ) available to the first device for the communication between the first Authority and the first device;
    providing a second Trusted Authority (TA-ME), associated with the second device and distinct and autonomous with respect to said first Authority; such second Authority may generate a second key (Ksyk ME ) in order to communicate with the second device.

    Furthermore, the method comprises the steps of:

    making the second key available to the second device;
    providing the first and second device with a communication key (Ks) to be used in said communication, through at least one of said first and second Authorities.

    Abstract translation: 一种用于建立与第一信任授权(TA-SIM)和第二电子设备(ME)相关联的第一电子设备(SIM)之间的通信的方法。 该方法包括以下步骤:使第一密钥(KsykSIM)可用于第一设备用于第一权限和第一设备之间的通信; 提供与所述第二设备相关联的第二可信管理机构(TA-ME),并且针对所述第一机构具有不同且自主的; 这样的第二权限可以生成第二密钥(KsykME)以便与第二设备进行通信。 此外,该方法包括以下步骤:使第二密钥可用于第二设备; 通过所述第一和第二权限中的至少一个向所述第一和第二设备提供要在所述通信中使用的通信密钥(Ks)。

    Method for establishing an encrypted communication by means of keys
    6.
    发明公开
    Method for establishing an encrypted communication by means of keys 审中-公开
    Verfahren zum Erzeugen einerverschlüsseltenKommunikation mittelsSchlüssel

    公开(公告)号:EP1519530A1

    公开(公告)日:2005-03-30

    申请号:EP03425626.3

    申请日:2003-09-29

    Abstract: Method of establishing an encrypted communication by means of keys between a first electronic device (SIM) associated to a first trusted authority (TA-SIM) and a second electronic device (ME).
    The method comprises the steps of:

    generating a first secret key (Ks) associated to the first device for the management of said communication;
    generating, at least in part by means of said first authority, a second secret key (Ks) associated to the second device for the management of said communication.

    The method is characterised in that the step of generation of the first key is performed at least in part by means of a second trusted authority (TA-ME) associated to the second device that is distinct and autonomous from said first authority. Or, the generation of the first key is performed, at least in part, by the second device passing through the second trusted authority.

    Abstract translation: 通过与第一信任机构(TA-SIM)和第二电子设备(ME)相关联的第一电子设备(SIM)之间的密钥建立加密通信的方法。 该方法包括以下步骤:产生与第一设备相关联的用于管理所述通信的第一密钥(Ks); 至少部分地通过所述第一权限产生与所述第二设备相关联的用于管理所述通信的第二秘密密钥(Ks)。 该方法的特征在于,生成第一密钥的步骤至少部分地通过与第二设备相关联的第二可信管理机构(TA-ME)执行,所述第二可信管理机构(TA-ME)与所述第一授权机构是不同的和自主的 。 或者,至少部分地由第二设备通过第二可信管理机构来执行第一密钥的生成。

    Encoding/decoding apparatus
    7.
    发明公开
    Encoding/decoding apparatus 审中-公开
    Kodier- und Dekodiervorrichtung

    公开(公告)号:EP2015505A2

    公开(公告)日:2009-01-14

    申请号:EP08012447.2

    申请日:2008-07-10

    CPC classification number: H04L9/0637 G09C1/00 H04L2209/122 H04L2209/125

    Abstract: An encoding/decoding apparatus comprises a central processing unit and an encryption/decryption accelerator coupled to the central processing unit The accelerator comprises an input for input data to be encrypted/decrypted, an arithmetic logic unit coupled to said input for performing selectable operations on data obtained from said input data and an output for encrypted/decrypted data coupled to said arithmetic logic unit.

    Abstract translation: 编码/解码装置包括中央处理单元和耦合到中央处理单元的加密/解密加速器。加速器包括用于要加密/解密的输入数据的输入,耦合到所述输入的算术逻辑单元,用于对数据进行可选择的操作 从所述输入数据获得的输出和与所述算术逻辑单元耦合的加密/解密数据的输出。

    Method and Hardware Device for Implementing a one-to-one Binary Function, especially a Rijdael S-Box
    9.
    发明公开
    Method and Hardware Device for Implementing a one-to-one Binary Function, especially a Rijdael S-Box 审中-公开
    Methode und Hardware zur Implementierung einer bijektivenbinärenFunktion und insbesondere einer Rijndael-S-Box

    公开(公告)号:EP1465365A1

    公开(公告)日:2004-10-06

    申请号:EP03425211.4

    申请日:2003-04-04

    CPC classification number: H04L9/0631 H04L2209/12

    Abstract: A method for implementing one-to-one binary functions defined on the Galois field GF(2 8 ) is presented. This method is very useful for realizing fast and low-power hardware devices whichever the binary function is, and comprises the steps of

    decoding an input byte generating at least one bit string that contains only one active bit;
    logically combining the bits of the bit string according to the binary function for generating a 256-bit string representing a corresponding output byte;
    encoding the 256-bit string in a byte, obtaining the output byte.

    This method may be implemented by a fast and small area consuming hardware device for generating output bytes corresponding to respective input bytes according to an one-to-one binary function, comprising

    a decoder of the input byte, generating at least one bit string that contains only one active bit;
    an array of logic gates for input of the bit string, generating a 256-bit string by logically combining the bits of the input string according to the one-to-one binary function;
    an encoder for input of the second 256-bit string, generating the output byte.

    Abstract translation: 提出了一种用于实现在伽罗瓦域GF(2,8)上定义的一对一二进制函数的方法。 该方法对于实现二进制功能的快速和低功率硬件设备非常有用,并且包括对产生至少一个仅包含一个活动位的位串的输入字节进行解码的步骤; 根据用于产生表示相应输出字节的256位串的二进制功能逻辑组合位串的位; 以字节编码256位字符串,获取输出字节。 该方法可以由快速且小的面积消耗的硬件设备来实现,用于根据一对一二进制功能产生对应于相应输入字节的输出字节,包括输入字节的解码器,产生至少一个 只包含一个活动位的位串; 用于输入位串的逻辑门阵列,通过根据一对一二进制函数逻辑组合输入串的位来产生256位串; 用于输入第二256位串的编码器,产生输出字节。

    Authentication method using bilinear mappings
    10.
    发明公开
    Authentication method using bilinear mappings 审中-公开
    Authentifizierungsverfahren unter Verwendung bilinearer Abbildungen

    公开(公告)号:EP1675299A1

    公开(公告)日:2006-06-28

    申请号:EP05103298.5

    申请日:2005-04-22

    CPC classification number: H04L9/08 H04L9/3073 H04L9/321 H04L2209/80 H04W12/06

    Abstract: An authentication method of a first module (A) by a second module (B). This method comprises the steps of:

    generating, by the second module (B), a first random datum (U) to be sent to the first module (A);
    generating by the first module (A) a first number (v; v') starting from said first datum (U) and by means of a private key ([s]Q_A; [1/(a+s)]Q 1 ) of the first module (A);
    generating by the second module (B) a second number (n; n') to be compared with the first number, such as to authenticate the first module (A). Furthermore, the step of generating the second number (n; n') is performed starting from public parameters and is independent of the step of generating the first number.

    Abstract translation: 第二模块(B)的第一模块(A)的认证方法。 该方法包括以下步骤:由第二模块(B)产生要发送到第一模块(A)的第一随机数据(U); 由所述第一模块(A)从所述第一数据(U)开始并通过私钥([s] Q_A; [1 /(a + s)] Q 1)产生第一数字(v; v' 的第一模块(A); 由所述第二模块(B)生成与所述第一号码进行比较的第二号码(n; n'),以便认证所述第一模块(A)。 此外,从公共参数开始执行产生第二数目(n; n')的步骤,并且与生成第一数字的步骤无关。

Patent Agency Ranking