×

Cryptographic communication process

  • US 5,790,675 A
  • Filed: 07/24/1996
  • Issued: 08/04/1998
  • Est. Priority Date: 07/27/1995
  • Status: Expired due to Term
First Claim
Patent Images

1. A cryptographic communication process which transforms a value (X) represented by (n) elements of a finite ring (K) into an image value (Y) represented by (n'"'"') elements of the ring (K), characterized in that:

  • a) each element (n'"'"') of the image value (Y) is in the form of a public polynomial equation having a low degree (D) greater than or equal to 2 composed of the elements (n) of the value (X);

    b) obtaining the image value (Y) from the value (X) by means of a transformation comprising the following steps, at least some of which require the knowledge of a cryptographic secret;

    b1) applying to the value (X) a first secret polynomial transformation (s) having a degree 1 composed of the (n) elements of the value (X) in order to obtain a first image (I1) with (n) elements;

    which (n) elements of the first image (I1) represent a variable or a small number (k) of variables (x, x'"'"', x", . . . , xk) belonging to an extension (LW) with the degree W of the ring (K) with W*k=n,b2) transforming the first image (I1) to a second image by applying to the first image (I1) a transformation defined as follows;

    
    
    space="preserve" listing-type="equation">f;

    L.sub.W.sup.k →

    L.sub.W.sup.k(x, x'"'"', x", . . . , xk)├



    (y, y'"'"', y", . . . , yk) noting that (y, y'"'"', y", . . . , yk) is the image of (x, x'"'"', x", . . . , xk) from the transformation f, knowing that f verifies the following two properties;

    b2.1) in a base (B) of the extension (LW) of the ring, each component of the image (y, y'"'"', y", . . . , yk) is expressed in the form of a polynomial composed of the components of (x, x'"'"', x", . . . , xk) in this base, which polynomial has a total degree less than or equal to said degree (D) of the public polynomial equation;

    b2.2) expressed in the extension (LW) of the ring, the transformation (f) is such that antecedents of (f) are calculated when they exist, except for certain entries, the number or which is negligible relative to the total number of entries;

    b3) applying to the second image (I2) a second secret polynomial transformation (t) having a degree of 1, composed of the elements of the second image (I2) in order to obtain a third image (I3) having a determined number of elements; and

    b4) selecting (n'"'"') elements from the elements in the third image (I3) to form said image value (Y).

View all claims
  • 3 Assignments
Timeline View
Assignment View
    ×
    ×