Cryptographic communication process
First Claim
Patent Images
1. A cryptographic communication process which transforms a value (X) represented by (n) elements of a finite ring (K) into an image value (Y) represented by (n'"'"') elements of the ring (K), characterized in that:
- a) each element (n'"'"') of the image value (Y) is in the form of a public polynomial equation having a low degree (D) greater than or equal to 2 composed of the elements (n) of the value (X);
b) obtaining the image value (Y) from the value (X) by means of a transformation comprising the following steps, at least some of which require the knowledge of a cryptographic secret;
b1) applying to the value (X) a first secret polynomial transformation (s) having a degree 1 composed of the (n) elements of the value (X) in order to obtain a first image (I1) with (n) elements;
which (n) elements of the first image (I1) represent a variable or a small number (k) of variables (x, x'"'"', x", . . . , xk) belonging to an extension (LW) with the degree W of the ring (K) with W*k=n,b2) transforming the first image (I1) to a second image by applying to the first image (I1) a transformation defined as follows;
space="preserve" listing-type="equation">f;
L.sub.W.sup.k →
L.sub.W.sup.k(x, x'"'"', x", . . . , xk)├
→
(y, y'"'"', y", . . . , yk) noting that (y, y'"'"', y", . . . , yk) is the image of (x, x'"'"', x", . . . , xk) from the transformation f, knowing that f verifies the following two properties;
b2.1) in a base (B) of the extension (LW) of the ring, each component of the image (y, y'"'"', y", . . . , yk) is expressed in the form of a polynomial composed of the components of (x, x'"'"', x", . . . , xk) in this base, which polynomial has a total degree less than or equal to said degree (D) of the public polynomial equation;
b2.2) expressed in the extension (LW) of the ring, the transformation (f) is such that antecedents of (f) are calculated when they exist, except for certain entries, the number or which is negligible relative to the total number of entries;
b3) applying to the second image (I2) a second secret polynomial transformation (t) having a degree of 1, composed of the elements of the second image (I2) in order to obtain a third image (I3) having a determined number of elements; and
b4) selecting (n'"'"') elements from the elements in the third image (I3) to form said image value (Y).
3 Assignments
0 Petitions
Accused Products
Abstract
A novel asymmetrical cryptographic schema which can be used for enciphering, signature and authentication. The schema is based on low degree public polynomial equations with value in a finite ring K.
The mechanism is not necessarily bijective. The secret key makes it possible to hide polynomial equations with value in extensions of the ring K. The solving of these equations makes it possible, if one has the secret key, to execute operations which are not executable with the public key alone.
-
Citations
20 Claims
-
1. A cryptographic communication process which transforms a value (X) represented by (n) elements of a finite ring (K) into an image value (Y) represented by (n'"'"') elements of the ring (K), characterized in that:
-
a) each element (n'"'"') of the image value (Y) is in the form of a public polynomial equation having a low degree (D) greater than or equal to 2 composed of the elements (n) of the value (X); b) obtaining the image value (Y) from the value (X) by means of a transformation comprising the following steps, at least some of which require the knowledge of a cryptographic secret; b1) applying to the value (X) a first secret polynomial transformation (s) having a degree 1 composed of the (n) elements of the value (X) in order to obtain a first image (I1) with (n) elements;
which (n) elements of the first image (I1) represent a variable or a small number (k) of variables (x, x'"'"', x", . . . , xk) belonging to an extension (LW) with the degree W of the ring (K) with W*k=n,b2) transforming the first image (I1) to a second image by applying to the first image (I1) a transformation defined as follows;
space="preserve" listing-type="equation">f;
L.sub.W.sup.k →
L.sub.W.sup.k(x, x'"'"', x", . . . , xk)├
→
(y, y'"'"', y", . . . , yk) noting that (y, y'"'"', y", . . . , yk) is the image of (x, x'"'"', x", . . . , xk) from the transformation f, knowing that f verifies the following two properties;b2.1) in a base (B) of the extension (LW) of the ring, each component of the image (y, y'"'"', y", . . . , yk) is expressed in the form of a polynomial composed of the components of (x, x'"'"', x", . . . , xk) in this base, which polynomial has a total degree less than or equal to said degree (D) of the public polynomial equation; b2.2) expressed in the extension (LW) of the ring, the transformation (f) is such that antecedents of (f) are calculated when they exist, except for certain entries, the number or which is negligible relative to the total number of entries; b3) applying to the second image (I2) a second secret polynomial transformation (t) having a degree of 1, composed of the elements of the second image (I2) in order to obtain a third image (I3) having a determined number of elements; and b4) selecting (n'"'"') elements from the elements in the third image (I3) to form said image value (Y). - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 12, 13, 14, 15, 16, 17, 18, 19)
-
-
9. A cryptographic communication process which transforms a value (X) represented by (n) elements of a finite ring (K) into an image value (Y) represented by (n'"'"') elements of the ring (K), characterized in that:
-
a) each element (n'"'"') of the image value (Y) is in the form of a public polynomial equation having a low degree (D) greater than or equal to 2 composed of the elements (n) of the value (X); b) obtaining the image value (Y) from the value (X) by means of a transformation comprising the following steps, some of which require the knowledge of a cryptographic secret; b1) applying to the value (X) a first secret polynomial transformation (s) having a degree 1 composed of the (n) elements of the value (X) in order to obtain a first image (I1) with (n) elements; b2) forming one or more branches, each of which branches is composed of elements of the first image (I1) and, •
applying to at least one branch (e) the (ne) elements of the branch representing a variable or a small number (k) of variables (x, x'"'"', x", . . . , xk) belonging to an extension (LW) with a degree W of the ring (K) with W*k=ne, and a transformation defined as follows;
space="preserve" listing-type="equation">f.sub.e ;
L.sub.W.sup.k →
L.sub.W.sup.k
space="preserve" listing-type="equation">(x, x'"'"', x", . . . , x.sup.k)├
→
(y, y'"'"', y", . . . , y.sup.k)noting that (y, y'"'"', y", . . . , yk) is the image of (x, x'"'"', x", . . . , xk) from the transformation fe, with fe verifying the following two properties; b2.1) in a base (B) of the extension (LW) of the ring, each component of the image (y, y'"'"', y", . . . , yk) is expressed in the form of a polynomial composed of the components of (x, x'"'"', x", . . . , xk) in this base, which polynomial has a total degree less than or equal to said degree (D) of the public polynomial equation; b2.2) expressed in the extension (LW) of the ring, the transformation (fe) is such that the antecedents of (fe) when they exist may be calculated, except for certain entries, the number of which is negligible relative to the total number of entries •
and applying to the other potential branches polynomial transformations with a degree less than or equal to said degree (D) composed of the components with value in the ring (K);b3) which branch thus transformed, or the plurality of branches thus transformed, then concatenated, constitutes a second image (I2); b4) applying to the second image (I2) a second secret polynomial transformation (t), having a degree 1 composed of the elements of the second image (I2) in order to obtain a third image (I3) having a determined number of elements; and b5) selecting (n'"'"') elements from among the elements in the third image (I3) to form said image value (Y). - View Dependent Claims (10, 11, 20)
-
Specification