Search Patents
  • Patent number: 6161180
    Abstract: Authentication is provided for secure devices with limited cryptography, particularly for devices which do not have the capability to do public-key cryptography and generate random numbers. An initialization process is disclosed for limited-power Devices which are unable to perform public-key cryptography and generate random-numbers, as well as for full-power Devices which have the capability to do public-key cryptography and generate random numbers. A Challenge-Response procedure is also disclosed for ensuring the secure state of a device.
    Type: Grant
    Filed: August 29, 1997
    Date of Patent: December 12, 2000
    Assignee: International Business Machines Corporation
    Inventors: Stephen M. Matyas, Sean William Smith
  • Patent number: 6243812
    Abstract: Authentication is provided for secure devices with limited cryptography, particularly for devices which do not have the capability to do public-key cryptography and generate random numbers. An initialization process is disclosed for limited-power Devices which are unable to perform public-key cryptography and generate random-numbers, as well as for full-power Devices which have the capability to do public-key cryptography and generate random numbers. A Challenge-Response procedure is also disclosed for ensuring the secure state of a device.
    Type: Grant
    Filed: August 23, 2000
    Date of Patent: June 5, 2001
    Assignee: International Business Machines Corporation
    Inventors: Stephen M. Matyas, Sean William Smith
  • Patent number: 6505301
    Abstract: Authentication is provided for secure devices with limited cryptography, particularly for devices which do not have the capability to do public-key cryptography and generate random numbers. An initialization process is disclosed for limited-power Devices which are unable to perform public-key cryptography and generate random-numbers, as well as for full-power Devices which have the capability to do public-key cryptography and generate random numbers. A Challenge-Response procedure is also disclosed for ensuring the secure state of a device.
    Type: Grant
    Filed: August 23, 2000
    Date of Patent: January 7, 2003
    Assignee: International Business Machines Corporation
    Inventors: Stephen M. Matyas, Sean William Smith
  • Patent number: 6505302
    Abstract: Authentication is provided for secure devices with limited cryptography, particularly for devices which do not have the capability to do public-key cryptography and generate random numbers. An initialization process is disclosed for limited-power Devices which are unable to perform public-key cryptography and generate random-numbers, as well as for full-power Devices which have the capability to do public-key cryptography and generate random numbers. A Challenge-Response procedure is also disclosed for ensuring the secure state of a device.
    Type: Grant
    Filed: August 23, 2000
    Date of Patent: January 7, 2003
    Assignee: International Business Machines Corporation
    Inventors: Stephen M. Matyas, Sean William Smith
  • Patent number: 7142671
    Abstract: Methods and apparatus are provided for implementing a cryptography engine for cryptography processing. A variety of techniques are described. A cryptography engine such as a DES engine can be decoupled from surrounding logic by using asynchronous buffers. Bit-sliced design can be implemented by moving expansion and permutation logic out of the timing critical data path. An XOR function can be decomposed into functions that can be implemented more efficiently. A two-level multiplexer can be used to preserve a clock cycle during cryptography processing. Key scheduling can be pipelined to allow efficient round key generation.
    Type: Grant
    Filed: June 26, 2001
    Date of Patent: November 28, 2006
    Assignee: Broadcom Corporation
    Inventors: Zheng Qi, Mark Buer
  • Patent number: 8351601
    Abstract: Elliptic polynomial cryptography with secret key embedding is a method that allows for the encryption of messages through elliptic polynomial cryptography and, particularly, with the embedding of secret keys in the message bit string. The method of performing elliptic polynomial cryptography is based on the elliptic polynomial discrete logarithm problem. It is well known that an elliptic polynomial discrete logarithm problem is a computationally “difficult” or “hard” problem.
    Type: Grant
    Filed: February 18, 2010
    Date of Patent: January 8, 2013
    Assignee: King Fahd University of Petroleum and Minerals
    Inventors: Lahouari Ghouti, Mohammad K. Ibrahim, Adnan A. Gutub
  • Patent number: 8509426
    Abstract: The XZ-elliptic curve cryptography system and method provides a computerized method that allows for the encryption of messages through elliptic polynomial cryptography and, particularly, with the embedding of either a symmetric secret key or a public key in the message bit string. The method of performing XZ-elliptic polynomial cryptography is based on the elliptic polynomial discrete logarithm problem. It is well known that an elliptic polynomial discrete logarithm problem is a computationally “difficult” or “hard” problem.
    Type: Grant
    Filed: December 1, 2010
    Date of Patent: August 13, 2013
    Assignee: King Fahd University of Petroleum and Minerals
    Inventors: Lahouari Ghouti, Mohammad K. Ibrahim, Abdulaziz M. Al-Khoraidly
  • Patent number: 8345864
    Abstract: An improved technique involves dynamic generation of at least a portion of an acceleration table for use in elliptic curve cryptography. Such dynamic generation is capable of providing savings with regard to carrying out elliptic curve cryptography without an acceleration table. Furthermore, once the portion of the acceleration table is dynamically generated and stored (e.g., in a high speed cache), the portion of the acceleration table is capable of being used on subsequent elliptic curve cryptography operations as well thus enabling the cost of dynamically generating the acceleration table to be amortized across multiple elliptic curve cryptography operations.
    Type: Grant
    Filed: September 29, 2009
    Date of Patent: January 1, 2013
    Assignee: EMC Corporation
    Inventors: Peter Alan Robinson, David Paul Makepeace, Jaimee Brown
  • Patent number: 7555121
    Abstract: Methods and apparatus are provided for implementing a cryptography engine for cryptography processing. A variety of techniques are described. A cryptography engine such as a DES engine running at a clock frequency higher than that of surrounding logic can be synchronized with the surrounding logic using a frequency synchronizer. Sbox logic output can be more efficiently determined by intelligently arranging Sbox input.
    Type: Grant
    Filed: October 29, 2004
    Date of Patent: June 30, 2009
    Assignee: Broadcom Corporation
    Inventors: Terry K. Tham, Errol Lai
  • Patent number: 8331558
    Abstract: The method of cipher block chaining using elliptic curve cryptography allows for the encryption of messages through elliptic curve cryptography and, particularly, with the performance of cipher block chaining utilizing both the elliptic curve and its twist, regardless of whether the elliptic curve and its twist are isomorphic with respect to one another. The method of performing elliptic curve cryptography is based on the elliptic curve discrete logarithm problem. It is well known that an elliptic curve discrete logarithm problem is a computationally “difficult” or “hard” problem.
    Type: Grant
    Filed: February 18, 2010
    Date of Patent: December 11, 2012
    Assignee: King Fahd University of Petroleum and Minerals
    Inventors: Lahouari Ghouti, Mohammad K. Ibrahim, Adnan A. Gutub
  • Publication number: 20040091105
    Abstract: In an apparatus for a hyperelliptic-curve cryptography processing, an input/output control block controls a peripheral component interconnect (PCI) interface block, a direct memory access (DMA) and a data input/output. An input memory block stores an external instruction and input data provided by the PCI interface block. An output memory block stores a final and an intermediate value of a hyperelliptic-curve cryptography operation. A MUX controls a path of input/output data. An operation core block performs a genus one elliptic-curve and a genus two hyperelliptic-curve cryptography algorithm, respectively. A controlling device controls the operation core block.
    Type: Application
    Filed: March 12, 2003
    Publication date: May 13, 2004
    Inventors: Ho Won Kim, Yong-Je Choi, Moo Seop Kim, Heui Su Ryu
  • Patent number: 8699701
    Abstract: The method of performing XZ-elliptic curve cryptography for use with network security protocols provides a computerized method that allows for the encryption of messages through elliptic polynomial cryptography and, particularly, with the embedding of either a symmetric secret key or a public key in the message bit string. The method of performing XZ-elliptic polynomial cryptography is based on the elliptic polynomial discrete logarithm problem. It is well known that an elliptic polynomial discrete logarithm problem is a computationally “difficult” or “hard” problem.
    Type: Grant
    Filed: December 1, 2010
    Date of Patent: April 15, 2014
    Assignee: King Fahd University
    Inventors: Lahouari Ghouti, Abdulaziz M. Al-Khoraidly, Mohammad K. Ibrahim
  • Patent number: 7697683
    Abstract: A cryptography-processing method for carrying out computation processing of hyperelliptic curve cryptography at a high speed and a cryptography-processing apparatus for implementing the method. In execution of scalar multiplication processing, a divisor is selected among divisors each having a weight g.sub.0 smaller than the genus g of a hyperelliptic curve where 1?.g0.<g to serve as a base point. In hyperelliptic curve cryptography carried out in this configuration for a genus g of 2, computation processing of the scalar multiplication can be changed from HarleyADD to execution steps of ExHarADD2+1?2 with a small number of computation-processing steps. For a genus g of 3, on the other hand, computation processing of the scalar multiplication can be changed from HarleyADD to execution steps of ExHarADD3+?3. or EXHarADD3+1?3. with a small number of computation-processing steps. By changing the computation processing as described above, the processing speed can be increased.
    Type: Grant
    Filed: February 25, 2005
    Date of Patent: April 13, 2010
    Assignee: Sony Corporation
    Inventors: Masanobu Katagi, Toru Akishita, Izuru Kitamura, Tsuyoshi Takagi
  • Publication number: 20080165955
    Abstract: Remote user authentication is provided using a password protocol based on elliptic curve cryptography. More specifically, the process uses the X-coordinate and the Z-coordinate of an elliptic curve when represented in projective coordinates, wherein point addition is defined over three dimensional space that includes the projective coordinate.
    Type: Application
    Filed: March 7, 2008
    Publication date: July 10, 2008
    Inventor: Mohammad K. Ibrahim
  • Patent number: 11184148
    Abstract: A system, method and elliptic curve cryptography scheme using an Edwards-form elliptic curve. The elliptic curve cryptography scheme having a blinding protocol resistant to differential side channel attacks. The elliptic curve defined over field F and having a point P with coordinates located on the elliptic curve. The blinding protocol including: randomly selecting a random element I; and determining coordinates of a blinded point PB by performing a multiplication of a random element I by at least one of the coordinates of point P.
    Type: Grant
    Filed: August 14, 2019
    Date of Patent: November 23, 2021
    Assignee: INFOSEC GLOBAL INC.
    Inventors: Vladimir Soukharev, Basil Hess
  • Patent number: 7590235
    Abstract: An Elliptic Curve Cryptography reduction technique uses a prime number having a first section of Most Significant Word “1” states, with N=nm-1+N1B+n0 and a second section with a plurality of “1” or “0” states. The combination of the first section and the second section is a modulus.
    Type: Grant
    Filed: June 10, 2004
    Date of Patent: September 15, 2009
    Assignee: NXP B.V.
    Inventor: Gerardus T. M. Hubert
  • Publication number: 20080063189
    Abstract: An apparatus and method is described of reducing joint weight for integers involved in a scalar multiplication, such as during cryptography. By way of example, the method is utilized within elliptic curve cryptography (ECC), wherein reducing joint weight speeds the execution of the scalar multiplication and reduces memory overhead. Generally, the recoding technique of the present invention involves generating a binary signed-digit representation for the two or more non-negative integers and then replacing groups of the binary signed-digits from left to right according to a predetermined pattern in order to reduce joint weight. The recoding process of the present invention is performed in a left-to-right order which is compatible with the order of the scalar multiplication. The present method reduces the amount of memory required for performing cryptography and allows it to be implemented in hardware or any desired combination of hardware and software.
    Type: Application
    Filed: November 10, 2006
    Publication date: March 13, 2008
    Applicant: NORTH DAKOTA STATE UNIVERSITY
    Inventors: RAJENDRA KATTI, XIAOYU RUAN
  • Publication number: 20010048742
    Abstract: The present invention concerns a countermeasure method in an electronic component using a public key cryptography algorithm based on the use of elliptic curves. From a private key d and a number of points n on an elliptic curve, a new deciphering integer d′ is calculated. The present invention applies particularly to any existing electronic component, such as a smart card.
    Type: Application
    Filed: February 1, 2001
    Publication date: December 6, 2001
    Inventor: Helena Handschuh
  • Publication number: 20150092941
    Abstract: A fault tolerant apparatus and method for elliptic curve cryptography. For example, one embodiment of a processor includes one or more cores to execute instructions and process data; and fault attack logic to ensure that the execution of the instructions and processing of the data is not vulnerable to memory safe-error attacks after a fault is injected by hiding any correlation between processor behavior and secret bits in a secret key.
    Type: Application
    Filed: September 27, 2013
    Publication date: April 2, 2015
    Inventor: Santosh Ghosh
  • Patent number: 6914986
    Abstract: The present invention concerns a countermeasure method in an electronic component using a public key cryptography algorithm based on the use of elliptic curves. From a private key d and a number of points n on an elliptic curve, a new deciphering integer d? is calculated. The present invention applies particularly to any existing electronic component, such as a smart card.
    Type: Grant
    Filed: February 1, 2001
    Date of Patent: July 5, 2005
    Assignee: Gemplus
    Inventor: Helena Handschuh