WO2007127576A3 - Method for elliptic curve public key cryptographic validation - Google Patents

Method for elliptic curve public key cryptographic validation Download PDF

Info

Publication number
WO2007127576A3
WO2007127576A3 PCT/US2007/065588 US2007065588W WO2007127576A3 WO 2007127576 A3 WO2007127576 A3 WO 2007127576A3 US 2007065588 W US2007065588 W US 2007065588W WO 2007127576 A3 WO2007127576 A3 WO 2007127576A3
Authority
WO
WIPO (PCT)
Prior art keywords
receiver
elliptic curve
public key
product
validation
Prior art date
Application number
PCT/US2007/065588
Other languages
French (fr)
Other versions
WO2007127576A2 (en
Inventor
Ronald F Buskey
Barbara B Frosik
Douglas A Kuhlman
Original Assignee
Motorola Inc
Ronald F Buskey
Barbara B Frosik
Douglas A Kuhlman
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Motorola Inc, Ronald F Buskey, Barbara B Frosik, Douglas A Kuhlman filed Critical Motorola Inc
Priority to EP07759779.7A priority Critical patent/EP2014000B1/en
Priority to KR20087025936A priority patent/KR101492644B1/en
Priority to CN2007800146961A priority patent/CN101427500B/en
Priority to MX2008013557A priority patent/MX2008013557A/en
Publication of WO2007127576A2 publication Critical patent/WO2007127576A2/en
Publication of WO2007127576A3 publication Critical patent/WO2007127576A3/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04KSECRET COMMUNICATION; JAMMING OF COMMUNICATION
    • H04K1/00Secret communication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • H04L9/3066Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0838Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3271Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/80Wireless
    • H04L2209/805Lightweight hardware, e.g. radio-frequency identification [RFID] or sensor

Abstract

Communication and validation of information transfer from a transmitter to a receiver is achieved by generating a cipher (400) from a message m (410) using parameters of an elliptic curve, a generator point P (406) on the elliptic curve and a public key Q (416) of the receiver. The cipher includes a first element that is the product kP of a random number k (404) with the generator point P and a second element that is the product of m and the x-coordinate of the product kQ. The message m is generated from two mathematically independent representations of the information and, optionally, a random number. The cipher is communicated to the receiver and decoded to recover a message m' (502). A validation token (500) is generated by the receiver and passed to the transmitter, which validates communication of the information to the receiver if the product mkQ is equal to the validation token.
PCT/US2007/065588 2006-04-24 2007-03-30 Method for elliptic curve public key cryptographic validation WO2007127576A2 (en)

Priority Applications (4)

Application Number Priority Date Filing Date Title
EP07759779.7A EP2014000B1 (en) 2006-04-24 2007-03-30 Method for elliptic curve public key cryptographic validation
KR20087025936A KR101492644B1 (en) 2006-04-24 2007-03-30 Method for elliptic curve public key cryptographic validation
CN2007800146961A CN101427500B (en) 2006-04-24 2007-03-30 Method for elliptic curve public key cryptographic validation
MX2008013557A MX2008013557A (en) 2006-04-24 2007-03-30 Method for elliptic curve public key cryptographic validation.

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US11/379,815 US8311214B2 (en) 2006-04-24 2006-04-24 Method for elliptic curve public key cryptographic validation
US11/379,815 2006-04-24

Publications (2)

Publication Number Publication Date
WO2007127576A2 WO2007127576A2 (en) 2007-11-08
WO2007127576A3 true WO2007127576A3 (en) 2008-04-17

Family

ID=38619505

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2007/065588 WO2007127576A2 (en) 2006-04-24 2007-03-30 Method for elliptic curve public key cryptographic validation

Country Status (6)

Country Link
US (1) US8311214B2 (en)
EP (1) EP2014000B1 (en)
KR (1) KR101492644B1 (en)
CN (1) CN101427500B (en)
MX (1) MX2008013557A (en)
WO (1) WO2007127576A2 (en)

Families Citing this family (24)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7809154B2 (en) 2003-03-07 2010-10-05 Technology, Patents & Licensing, Inc. Video entity recognition in compressed digital video streams
US7694318B2 (en) 2003-03-07 2010-04-06 Technology, Patents & Licensing, Inc. Video detection and insertion
US7738704B2 (en) * 2003-03-07 2010-06-15 Technology, Patents And Licensing, Inc. Detecting known video entities utilizing fingerprints
US7646872B2 (en) 2004-04-02 2010-01-12 Research In Motion Limited Systems and methods to securely generate shared keys
US8396213B2 (en) 2005-01-21 2013-03-12 Certicom Corp. Elliptic curve random number generation
US20060195860A1 (en) * 2005-02-25 2006-08-31 Eldering Charles A Acting on known video entities detected utilizing fingerprinting
US20060195859A1 (en) * 2005-02-25 2006-08-31 Richard Konig Detecting known video entities taking into account regions of disinterest
US7690011B2 (en) 2005-05-02 2010-03-30 Technology, Patents & Licensing, Inc. Video stream modification to defeat detection
US7864951B2 (en) * 2006-07-10 2011-01-04 King Fahd University Of Petroleum And Minerals Scalar multiplication method with inherent countermeasures
DE102007001070B3 (en) * 2006-09-29 2008-04-30 Siemens Ag Method for the encrypted data equalization of a system with at least one data carrier and one reading device
US8068606B2 (en) * 2007-08-29 2011-11-29 Red Hat, Inc. Embedding a secret in a bit string for safeguarding the secret
US8243933B2 (en) * 2007-08-29 2012-08-14 Red Hat, Inc. Method for sharing secret information among cooperating parties
KR100965813B1 (en) 2007-12-28 2010-06-24 경원대학교 산학협력단 RFID Encryption Scheme Based on Elliptic Curve for Secure Message Transmission on Ubiquitous Environment
US8117447B2 (en) * 2008-01-10 2012-02-14 Industrial Technology Research Institute Authentication method employing elliptic curve cryptography
EP2124382A1 (en) * 2008-05-20 2009-11-25 Siemens Aktiengesellschaft Method for encrypted data exchange and communication system
US8615084B2 (en) * 2008-05-29 2013-12-24 Red Hat, Inc. Extending a secret bit string to safeguard the secret
EP2634993B1 (en) * 2012-03-01 2017-01-11 Certicom Corp. Devices and methods for connecting client devices to a network
US9215075B1 (en) 2013-03-15 2015-12-15 Poltorak Technologies Llc System and method for secure relayed communications from an implantable medical device
US9391781B2 (en) * 2013-06-04 2016-07-12 Altera Corporation Systems and methods for intermediate message authentication in a switched-path network
WO2018102382A1 (en) * 2016-11-29 2018-06-07 ZeroDB, Inc. Method and system for switching public keys in ciphertexts
US10341098B2 (en) * 2017-01-24 2019-07-02 Nxp B.V. Method of generating cryptographic key pairs
US10749692B2 (en) 2017-05-05 2020-08-18 Honeywell International Inc. Automated certificate enrollment for devices in industrial control systems or other systems
US11146397B2 (en) * 2017-10-31 2021-10-12 Micro Focus Llc Encoding abelian variety-based ciphertext with metadata
CN113364585B (en) * 2021-06-04 2022-09-13 晶澄微电子(宁波)有限公司 ECC authentication method and system for reducing modular inverse computation

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050195973A1 (en) * 2004-03-03 2005-09-08 King Fahd University Of Petroleum And Minerals Method for XZ-elliptic curve cryptography

Family Cites Families (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5159632A (en) 1991-09-17 1992-10-27 Next Computer, Inc. Method and apparatus for public key exchange in a cryptographic system
US5271061A (en) 1991-09-17 1993-12-14 Next Computer, Inc. Method and apparatus for public key exchange in a cryptographic system
DE69534603T2 (en) 1994-07-29 2006-08-03 Certicom Corp., Mississauga ENCRYPTION SYSTEM FOR ELLIPTIC CURVE
BR9815161A (en) * 1997-12-05 2000-10-10 Secured Information Technology Method for producing an elliptically curved multiplication product; method for optimizing the calculation of an expression, method for producing an elliptically curved addition product; apparatus for producing an elliptically curve point multiplication product
CN1108041C (en) * 1999-12-01 2003-05-07 陈永川 Digital signature method using elliptic curve encryption algorithm
ATE465571T1 (en) * 2001-08-13 2010-05-15 Univ Leland Stanford Junior SYSTEMS AND METHODS FOR IDENTITY-BASED ENCRYPTION AND RELATED CRYPTOGRAPHIC TECHNIQUES
US7139396B2 (en) * 2002-06-27 2006-11-21 Microsoft Corporation Koblitz exponentiation with bucketing
GB2394388B (en) 2002-10-14 2005-10-19 Toshiba Res Europ Ltd Methods and systems for flexible delegation
DE60311507T2 (en) * 2002-10-26 2007-11-08 The Additional Director (Ipr), Defence Research & Development Organisation METHOD FOR ELLIPTIC CURVE ENCRYPTION
CN100440776C (en) * 2002-11-29 2008-12-03 北京华大信安科技有限公司 Elliptic curve signature and signature verification method and apparatus
US7298839B2 (en) * 2003-07-25 2007-11-20 Microsoft Corporation Squared Weil and Tate pairing techniques for use with elliptic curves
GB2404486A (en) 2003-07-31 2005-02-02 Sony Uk Ltd Access control for digital storage medium content
JP4284320B2 (en) * 2003-08-06 2009-06-24 富士通株式会社 Elliptic curve encryption device, elliptic curve encryption method, and elliptic curve encryption program

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050195973A1 (en) * 2004-03-03 2005-09-08 King Fahd University Of Petroleum And Minerals Method for XZ-elliptic curve cryptography

Also Published As

Publication number Publication date
CN101427500A (en) 2009-05-06
EP2014000A4 (en) 2015-03-18
US20070248224A1 (en) 2007-10-25
MX2008013557A (en) 2008-11-04
WO2007127576A2 (en) 2007-11-08
EP2014000A2 (en) 2009-01-14
KR20090005041A (en) 2009-01-12
KR101492644B1 (en) 2015-02-12
CN101427500B (en) 2013-06-05
EP2014000B1 (en) 2018-10-03
US8311214B2 (en) 2012-11-13

Similar Documents

Publication Publication Date Title
WO2007127576A3 (en) Method for elliptic curve public key cryptographic validation
WO2008087734A1 (en) Cryptogram generating device, cryptogram communication system, and group parameter generating device
WO2001091366A3 (en) Cryptographic communications using pseudo-randomly generated cryptography keys
WO2010024874A3 (en) Message authentication code pre-computation with applications to secure memory
WO2004102918A3 (en) Key agreement and transport protocol
WO2007041178A3 (en) Quantum key distribution system
WO2007001328A3 (en) Information-centric security
WO2006045114A3 (en) Cryptographic primitives, error coding, and pseudo-random number improvement methods using quasigroups
EP1445890A4 (en) Cryptographic communication apparatus
WO2005053209A3 (en) Tokens/keys for wireless communications
WO2008127446A3 (en) A method and apparatus for time-lapse cryptography
WO2005057372A3 (en) Security system and method
WO2012099657A3 (en) Reliable puf value generation by pattern matching
WO2008099831A1 (en) Key generation device, key derivation device, encryption device, decryption device, method, and program
WO2006017475A3 (en) Qkd station with emi signature suppression
NO20074571L (en) Contextual shared secret
CN101682625A (en) Synchronization test for device authentication
TW200620936A (en) Relay device, authentication server and the method of authentication
WO2007113697A3 (en) Secure decryption method
ATE508551T1 (en) CONTEXT SENSITIVITY BASED CRYPTOGRAPHY
WO2008026060A3 (en) Method, system and device for synchronizing between server and mobile device
WO2006067739A3 (en) Method and device for key generation and proving authenticity
PL1867096T3 (en) Method and system for receiving a multimedia signal, cryptographic entity for said reception method and system, and method and black box for producing said cryptographic entity
SG143152A1 (en) System and method for secure record protocol using shared knowledge of mobile user credentials
WO2005034421A3 (en) Information transfer system, encryption device, and decryption device using elliptic curve

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 07759779

Country of ref document: EP

Kind code of ref document: A2

WWE Wipo information: entry into national phase

Ref document number: 2007759779

Country of ref document: EP

WWE Wipo information: entry into national phase

Ref document number: MX/a/2008/013557

Country of ref document: MX

WWE Wipo information: entry into national phase

Ref document number: 200780014696.1

Country of ref document: CN

NENP Non-entry into the national phase

Ref country code: DE