RSA-ANALOGOUS XZ-ELLIPTIC CURVE CRYPTOGRAPHY SYSTEM AND METHOD
First Claim
Patent Images
1. A computerized method of performing RSA-analogous XZ-elliptic curve cryptography, comprising the steps of:
- (a) selecting a pair of substantially large prime numbers p and q, and selecting a pair of values gu and gv, wherein gu is non-residue of p and gv is non-residue of q;
(b) selecting a pair of scalars a and b such that gcd(4a3+27b2,pq)=1;
(c) calculating an order Np of an elliptic curve Y2=X3+aXZ2+bZ3 over a finite field F(p), wherein X, Y and Z are orthogonal Cartesian coordinates;
(d) calculating an order Ntp of a curve guY2=X3+aXZ2+bZ3 over the finite field F(p);
(e) calculating an order Nq of the elliptic curve Y2=X3+aXZ2+bZ3 over the finite field F(q);
(f) calculating an order Ntq of a curve gvY2=X3+aXZ2+bZ3 over the finite field F(q);
(g) selecting a scalar e such that gcd(e,Np)=gcd(e,Nq)=1;
(h) generating a secret key d as
1 Assignment
0 Petitions
Accused Products
Abstract
The RSA-analogous XZ-elliptic curve cryptography system and method provides a computerized system and method that allows for the encryption of messages through elliptic polynomial cryptography and, particularly, in a manner which is analogous to RSA cryptography but which does not require multiple private keys, as in the RSA scheme. The RSA-analogous XZ-elliptic curve cryptography method is based on the integer factorization problem. It is well known that the integer factorization problem is a computationally “difficult” or “hard” problem.
14 Citations
10 Claims
-
1. A computerized method of performing RSA-analogous XZ-elliptic curve cryptography, comprising the steps of:
-
(a) selecting a pair of substantially large prime numbers p and q, and selecting a pair of values gu and gv, wherein gu is non-residue of p and gv is non-residue of q; (b) selecting a pair of scalars a and b such that gcd(4a3+27b2,pq)=1; (c) calculating an order Np of an elliptic curve Y2=X3+aXZ2+bZ3 over a finite field F(p), wherein X, Y and Z are orthogonal Cartesian coordinates; (d) calculating an order Ntp of a curve guY2=X3+aXZ2+bZ3 over the finite field F(p); (e) calculating an order Nq of the elliptic curve Y2=X3+aXZ2+bZ3 over the finite field F(q); (f) calculating an order Ntq of a curve gvY2=X3+aXZ2+bZ3 over the finite field F(q); (g) selecting a scalar e such that gcd(e,Np)=gcd(e,Nq)=1; (h) generating a secret key d as - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A system for performing RSA-analogous XZ-elliptic curve cryptography, comprising:
-
a processor; computer readable memory coupled to the processor; a user interface coupled to the processor; a display coupled to the processor; software stored in the memory and executable by the processor, the software having; means for selecting a pair of substantially large prime numbers p and q, and selecting a pair of values gu and gv, wherein gu is non-residue of p and gv is non-residue of q; means for selecting a pair of scalars a and b such that gcd(4a3+27b2, pq)=1; means for calculating an order Np of an elliptic curve Y2=X3+aXZ2+bZ3 over a finite field F(p), wherein X, Y and Z are orthogonal Cartesian coordinates; means for calculating an order Ntp of a curve guY2=X3+aXZ2+bZ3 over the finite field F(p); means for calculating an order Nq of the elliptic curve Y2=X3+aXZ2+bZ3 over the finite field F(q); means for calculating an order Ntq of a curve gvY2=X3+aXZ2+bZ3 over the finite field F(q); means for selecting a scalar e such that gcd(e,Np)=gcd(e,Nq)=1; means for generating a secret key d as - View Dependent Claims (9)
-
-
10. A computer software product that includes a medium readable by a processor, the medium having stored thereon a set of instructions for performing RSA-analogous XZ-elliptic curve cryptography, the instructions comprising:
-
(a) a first sequence of instructions which, when executed by the processor, causes the processor to select a pair of substantially large prime numbers p and q, and selecting a pair of values gu and gv, wherein gu is non-residue of p and gv is non-residue of q; (b) a second sequence of instructions which, when executed by the processor, causes the processor to select a pair of scalars a and b such that gcd(4a3+27b2,pq)=1; (c) a third sequence of instructions which, when executed by the processor, causes the processor to calculate an order Np of an elliptic curve Y2=X3+aXZ2+bZ3 over a finite field F(p), wherein X, Y and Z are orthogonal Cartesian coordinates; (d) a fourth sequence of instructions which, when executed by the processor, causes the processor to calculate an order Ntp of a curve guY2=X3+aXZ2+bZ3 over the finite field F(p); (e) a fifth sequence of instructions which, when executed by the processor, causes the processor to calculate an order Nq of the elliptic curve Y2=X3+aXZ2+bZ3 over the finite field F(q); (f) a sixth sequence of instructions which, when executed by the processor, causes the processor to calculate an order Ntq of a curve gvY2=X3+aXZ2+bZ3 over the finite field F(q); (g) a seventh sequence of instructions which, when executed by the processor, causes the processor to select a scalar e such that gcd(e,Np)=gcd(e,Nq)=1; (h) an eighth sequence of instructions which, when executed by the processor, causes the processor to generate a secret key d as
-
Specification