Method for exponentiating in cryptographic systems
First Claim
1. In a cryptographic system, a method for transforming a first signal into a second signal in a manner infeasible to invert, said method comprising the steps of:
- (a) prestoring in a computing device a plurality of values gx.sbsp.i in a plurality of memory locations within said computing device where xi is selected such that an integer e=Σ
ai xi, where ai is an integer weight such that 0≦
ai ≦
h, and h is a positive integer, and g is a fixed signal unique to said cryptographic system;
(b) representing a first randomly generated input digital signal as said integer e;
(c) exponentiating said fixed signal, g, by the said integer e to generate said second signal, y=ge, wherein said step of exponentiating further comprises;
for each integer d with 1≦
d≦
h, computing the individual values of cd =π
a.sbsb.i=d gx.sbsp.i, i.e., cd will be the product of all the said values gx.sbsp.i, for the said memory locations, i, for which the value ai is equal to d;
computing the product, ##EQU3## for the said individual values, cd to thereby determine a value for said second signal, y=ge.
2 Assignments
0 Petitions
Accused Products
Abstract
An improved cryptographic method utilizing exponentiation is provided which has the advantage of reducing the number of multiplications required to determine the legitimacy of a message or user. The basic method comprises the steps of selecting a key from a preapproved group of integer keys g; exponentiating the key by an integer value e, where e represents a digital signature, to generate a value ge ; transmitting the value ge to a remote facility by a communications network; receiving the value ge at the remote facility; and verifying the digital signature as originating from the legitimate user. The exponentiating step comprises the steps of initializing a plurality of memory locations with a plurality of values gxi ; computi
The United States Government has rights in this invention pursuant to Contract No. DE-AC04-76DP00789 between the Department of Energy and AT&T Company.
53 Citations
9 Claims
-
1. In a cryptographic system, a method for transforming a first signal into a second signal in a manner infeasible to invert, said method comprising the steps of:
-
(a) prestoring in a computing device a plurality of values gx.sbsp.i in a plurality of memory locations within said computing device where xi is selected such that an integer e=Σ
ai xi, where ai is an integer weight such that 0≦
ai ≦
h, and h is a positive integer, and g is a fixed signal unique to said cryptographic system;(b) representing a first randomly generated input digital signal as said integer e; (c) exponentiating said fixed signal, g, by the said integer e to generate said second signal, y=ge, wherein said step of exponentiating further comprises; for each integer d with 1≦
d≦
h, computing the individual values of cd =π
a.sbsb.i=d gx.sbsp.i, i.e., cd will be the product of all the said values gx.sbsp.i, for the said memory locations, i, for which the value ai is equal to d;computing the product, ##EQU3## for the said individual values, cd to thereby determine a value for said second signal, y=ge. - View Dependent Claims (2, 3)
-
-
4. A method for generating digital signatures to assure the legitimacy of a message, said method comprising the steps of:
-
(a) prestoring in a computing device a plurality of values gx.sbsp.i in a plurality of memory locations within said computing device where xi is selected such that an integer e=Σ
ai xi, where ai is an integer weight such that 0≦
ai ≦
h, and h is a positive integer, and g is fixed signal unique to said digital signature method;(b) representing a first randomly generated input digital signal as said integer e; (c) exponentiating said fixed signal, g, by the said integer e to generate a second signal, y=ge, wherein said step of exponentiating further comprises; for each integer d with 1≦
d≦
h, computing the individual values of cd =π
a.sbsb.i=d gx.sbsp.i, i.e., cd will be the product of all the said values gx.sbsp.i, for the said memory locations, i, for which the value ai is equal to d;computing the product, ##EQU5## for the said individual values, cd to thereby determine a value for said second signal, y=ge., (d) generating a digital signature, s, of a message, m, using said second signal, y, and particular inputs specified by a particular digital signature scheme; and (e) verifying said digital signature, s, as originating from said legitimate user. - View Dependent Claims (5, 6)
-
-
7. A method for verifying of an individual or device, said method comprising the steps of:
-
(a) prestoring in a computing device a plurality of values gx.sbsp.i in a plurality of memory locations within said computing device where xi is selected such that an integer e=Σ
ai xi, where ai is an integer weight such that 0≦
ai ≦
h, and h is a positive integer, and g is fixed signal unique to said verification method(b) representing a first randomly generated input digital signal as said integer e; (c) exponentiating said fixed signal, g, by the said integer e to generate a second signal, y=ge, wherein said step of exponentiating further comprises; for each integer d with 1≦
d≦
h, computing the individual values of Cd =π
a.sbsb.i=d gx.sbsp.i, i.e., Cd will be the product of all the said values gx.sbsp.i, for the said memory locations, i, for which the value ai is equal to d;computing the product, ##EQU7## for the said individual values, cd to thereby determine a value for said second signal, y=ge ; (d) sending said second signal, y, to a verifier; (e) receiving a third signal, z, from the verifier; (f) generating a fourth signal, x, using said second signal, said third signal, and other inputs as specified by a particular identification scheme; and (g) verifying said fourth signal as originating from said individual or device. - View Dependent Claims (8, 9)
-
Specification