Abstract: A method and an apparatus for enciphering and deciphering content with symmetric and asymmetric cryptography with the use of the shadow numbering system where two or more shadow values are used with two or more base values with a two side equation, on one side the value to encipher is multiplied with one of the shadow value then the modulus taken with the base value, to decipher the enciphered value is multiplied with the shadow value that didn't take part of the first equation then the modulus is taken with the base value, thus, deciphering the enciphered value.
Abstract: NADO is a process for encrypting and decrypting information in a variety of cryptographic devices. The underlying process is a fast stream-like cipher that can be implemented efficiently in analog or digital hardware or in software. The NADO process makes use of three novel methods in cryptography: 1) A sequence of permutations which scrambles and spreads out the encrypted information; (2) A state generator built with a non-autonomous dynamical system to generate an unpredictable sequence of states; (3) One or more perturbators which perturb both the non-autonomous dynamical system and the sequence of permutations in a non-periodic way.
Abstract: A method, apparatus and computer program product are provided to more efficiently perform aspects of elliptic curve cryptography such as by more efficiently multiplying an integer k by a point P on an elliptic curve by decomposing the integer into integers k1 and k2. In this regard, respective bounds for k1 and k2 may be determined (100, 102) and, subject to the respective bounds, k1 and k2 may then be determined (114, 116) such that the product of k and the point P on the elliptic curve may be determined based upon k1 and k2 without requiring the point P to be multiplied by k.
Abstract: The invention features a public key cryptography method based on the discrete logarithm which computes a value Gkmod p. Two solutions are proposed to reduce the number of multiplications, one consisting in generating “hollow” k exponents with a few bits of value 1, but of sufficient length to maintain the total security of the system, and the other consisting of performing calculations of the powers of g in parallel while combining the exponents with each other in order to prevent repeating the same power computations twice for a given exponent. The invention is useful for generating digital signatures, authentication and encryption.
Abstract: In a quantum cryptography key distribution system for sharing a secret key between a transmitter and a receiver site, an unbalanced interferometer system in the transmitter site has a Mach-Zehnder interferometer switch with a phase modulator while the receiver site records photon arrival time slots. The system utilizes a whole of arrival photons in the receiver site and dispenses with any phase modulator in the receiver site. This system serves to improve a photon utilization efficiency.
Abstract: Polynomial multiplication for side-channel protection in cryptography is described. An example of an apparatus includes one or more processors to process data; a memory to store data; and polynomial multiplier circuitry to multiply a first polynomial by a second polynomial, the first polynomial and the second polynomial each including a plurality of coefficients, the polynomial multiplier circuitry including a set of multiplier circuitry, wherein the polynomial multiplier circuitry is to select a first coefficient of the first polynomial for processing, and multiply the first coefficient of the first polynomial by all of the plurality of coefficients of the second polynomial in parallel using the set of multiplier circuits.
Abstract: Methods and systems are described herein for facilitating blockchain operations in decentralized applications by offering enhanced efficient when conducting blockchain operations using cryptography-based, digital ledgers through the use of specialized indexing. For example, as opposed to relying on raw blockchain data to power decentralized applications, the methods and systems use a blockchain indexer. The blockchain indexer provides a queryable record of a subset of blockchain operations.
Type:
Application
Filed:
February 23, 2022
Publication date:
August 24, 2023
Applicant:
Coinbase, Inc.
Inventors:
Ben SCHRECK, Ankit CHIPLUNKAR, Matt MOORE, Olivia THET, Peter Jihoon KIM, Trevor ARON
Abstract: Methods and systems are described herein for facilitating blockchain operations in decentralized applications by offering enhanced efficient when conducting blockchain operations using cryptography-based, digital ledgers through the use of specialized indexing. For example, as opposed to relying on raw blockchain data to power decentralized applications, the methods and systems use a blockchain indexer. The blockchain indexer provides a queryable record of a subset of blockchain operations.
Type:
Application
Filed:
February 23, 2022
Publication date:
August 24, 2023
Applicant:
Coinbase, Inc.
Inventors:
Ben SCHRECK, Ankit Chiplunkar, Matt Moore, Olivia Thet, Peter Jihoon Kim, Trevor Aron
Abstract: Systems, apparatuses, methods, and computer program products are disclosed for post-quantum cryptography (PQC). An example method includes receiving data. The example method further includes generating a set of data attributes about the data. The example method further includes generating a data envelope based on the set of data attributes. Subsequently, the example method includes generating an enveloped data structure based on the data envelope and the data.
Type:
Grant
Filed:
February 21, 2023
Date of Patent:
February 13, 2024
Assignee:
Wells Fargo Bank, N.A.
Inventors:
Robert L. Carter, Jr., Ravi K. Maganti, Bradford A. Shea, M. Erik Meinholz, Jeff J. Stapleton, Peter Bordow, Pierre Arbajian, Abhijit Rao
Abstract: A system and method for implementing the Elliptic Curve scalar multiplication method in cryptography, where the Double Base Number System is expressed in decreasing order of exponents and further on using it to determine Elliptic curve scalar multiplication over a finite elliptic curve.
Abstract: A method and device for protecting elliptic curve cryptography against simple power attacks is disclosed. The method is based on a processor such as a computer equipped to encrypt and decrypt communications and selecting and entering a point P on an elliptic curve in the computer. The processor provides k copies of the point P (kP). The processor is used to divide a string of Ks into two equal length partitions that are scanned from right to left and performing point doubling operation and delay the point addition operation by storing the some doubled points in a buffer for later performing of addition operation.
Abstract: A system and method of the present invention creates a security application for a programmable cryptography module, which includes a security policy software module and mirror security policy data structures. A processor determines a security policy for an implementation specific application as a set of rules governing cryptographic security policy functions of the security policy software module. The processor is operative for generating a binary security policy file representative of the security policy and comparing the binary security policy file with the mirror security policy data structures to determine a violation of the security policy or a successful comparison.
Type:
Application
Filed:
August 25, 2004
Publication date:
March 16, 2006
Applicant:
Harris Corporation
Inventors:
John Alvermann, David Babich, William Black
Abstract: Method of public key cryptography based on the discrete logarithm that makes use of the computation of the variable r=g.sup.k modp where p is a prime number called a modulus, the exponent k is a random number usually with a length of N bits and g is an integer called a base, wherein an entity E carries out operations of authentication and/or of signature, including exchanges of signals with another entity in which this variable comes into play.
Type:
Grant
Filed:
September 24, 1997
Date of Patent:
August 31, 1999
Assignee:
Gemplus S.C.A.
Inventors:
David M'Raihi, David Naccache, Jacques Stern, Serge Vaudenay
Abstract: A system includes an interface module, an addressing module, and a multiplier module. The interface module is configured to (i) receive operands and configuration data for a Rivest-Shamir-Adleman (RSA) operation or an Elliptic Curve Cryptography (ECC) operation, and (ii) control access to a random access memory (RAM). The addressing module is configured to allocate memory space within the RAM for storage of the operands. The multiplier module includes a Montgomery multiplier configured to perform Montgomery multiplication operation for both the RSA operation and the ECC operation.
Abstract: According to various embodiments, a method for code-based generation of a key pair for asymmetric cryptography is described including generating a private key defining a linear code, determining a parity check or generator matrix for the linear code, blinding a sub-matrix of the parity check or generator matrix, generating a blinded inverse matrix by inverting the blinded sub-matrix or by inverting a quadratic matrix contained in the blinded sub-matrix, de-blinding the blinded inverse matrix to generate an inverse matrix and generating a public key for the private key using the inverse matrix.
Abstract: Systems, apparatuses, methods, and computer program products are disclosed for post-quantum cryptography (PQC). An example method includes receiving data. The example method further includes generating a set of data attributes about the data. The example method further includes generating a data envelope based on the set of data attributes. Subsequently, the example method includes generating an enveloped data structure based on the data envelope and the data.
Type:
Grant
Filed:
September 10, 2019
Date of Patent:
April 11, 2023
Assignee:
Wells Fargo Bank, N.A.
Inventors:
Robert L. Carter, Jr., Ravi K. Maganti, Bradford A. Shea, M. Erik Meinholz, Jeff J. Stapleton, Peter Bordow, Pierre Arbajian, Abhijit Rao
Abstract: A method and system for single session sign-on across multiple content servers using public/private key cryptography. Session certificates are issued by an authentication authority and stored or held in volatile memory by a browser. Session certificates are used by browsers to obtain session credentials from a session authority and stored or held in volatile memory by the browser. Use of public and private keys supports authentication and non-repudiation, and eliminates some of the disadvantages of permanent certificates and PKI.
Abstract: Electronic circuit chips which include cryptography functions are arranged in multichip configurations through the utilization of a shared external memory. Security of the chips is preserved via a handshaking protocol which permits each chip to access limited portions of the memory as defined in a way that preserves the same high security level as the tamper proof chips themselves. The chips may be operated to work on different tasks or to work on the same task thus providing a mechanism for trading off speed versus redundancy where desired.
Type:
Application
Filed:
January 13, 2006
Publication date:
July 19, 2007
Applicant:
International Business Machines Corporation
Abstract: The present invention relates to a visual cryptography system. The system comprises a first and a second display device (1, 2), arranged for, upon being superimposed on each other, reconstructing a graphical message from two respective shares. At least one of said display devices (1, 2) comprise means for facilitating determination of the resolution and pixel size of the other. At least one, preferably both, of, said display devices (1, 2) is arranged to scale the resolution and pixel size of its share to a mutually supported resolution and pixel size, and preferably to a mutually supported smallest common multiple resolution and pixel size.
Type:
Application
Filed:
March 1, 2004
Publication date:
October 12, 2006
Applicant:
Koninklijke Philips Electronics N.V.
Inventors:
Mark Johnson, Pim Tuyls, Thomas Kevenaar
Abstract: Systems, apparatuses, methods, and computer program products are disclosed for post-quantum cryptography (PQC). An example system includes a PQC smartcard. The smartcard may include a PQC cryptographic algorithm selection circuitry configured to select a PQC cryptographic technique from a set of PQC cryptographic techniques for encrypting the data. The smartcard may further include a PQC cryptographic circuitry configured to encrypt data based on a generated set of PQC encryption attributes and the PQC cryptographic technique.
Type:
Grant
Filed:
November 15, 2022
Date of Patent:
February 4, 2025
Assignee:
Wells Fargo Bank, N.A.
Inventors:
Abhijit Rao, Adam Sanders, Ramanathan Ramanathan, Ramesh Yarlagadda, Pierre Arbajian, Andrew J. Garner