Speed enhanced cryptographic method and apparatus
First Claim
Patent Images
1. A method for performing a cryptographic operation that comprises transforming digital information, the method comprising:
- providing digital information;
providing a digital operator having a component selected from a large set of elements;
expanding the component into a plurality of factors, each factor having a low hamming weight; and
transforming the digital information using the digital operator, said transforming comprising computing multiples;
said method further comprising;
selecting a ring R;
selecting an R-module M;
selecting two or more subsets R1, R2, . . . , Rk of R with the property that r1 is an element in R1, r2 is an element in R2, . . . and rk is an element in Rk;
computing r*m, where r is in R and m is in M, by expanding r as r1*r2 . . . rk, where k is an integer and computing the quantity r1*(r2*( . . . (rk*m).
6 Assignments
0 Petitions
Accused Products
Abstract
A method for performing a cryptographic operation involving transforming digital information is described. A digital operator is provided that has a component selected from a large set of elements. The component is expanded into a plurality of factors, each factor having a low Hamming weight. Digital information is transformed using the digital operator. Computer readable medium embody instructions for the method.
-
Citations
33 Claims
-
1. A method for performing a cryptographic operation that comprises transforming digital information, the method comprising:
-
providing digital information; providing a digital operator having a component selected from a large set of elements; expanding the component into a plurality of factors, each factor having a low hamming weight; and transforming the digital information using the digital operator, said transforming comprising computing multiples; said method further comprising; selecting a ring R; selecting an R-module M; selecting two or more subsets R1, R2, . . . , Rk of R with the property that r1 is an element in R1, r2 is an element in R2, . . . and rk is an element in Rk; computing r*m, where r is in R and m is in M, by expanding r as r1*r2 . . . rk, where k is an integer and computing the quantity r1*(r2*( . . . (rk*m). - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22)
-
-
23. A computer readable medium containing instructions for a method for performing a cryptographic operation that comprises transforming digital information, the method comprising:
-
providing digital information; providing a digital operator having a component selected from a large set of elements; expanding the component into a plurality of factors, each factor having a low hamming weight; and transforming the digital information using the digital operator, said transforming comprising computing multiples; said method further comprising; selecting a ring R; selecting an R-module M; selecting two or more subsets R1, R2, . . . , Rk of R with the property that r1 is an element in R1, r2 is an element in R2, . . . and rk is an element in Rk; computing r*m, where r is in R and m is in M, by expanding r as r1* r2* . . . rk, where k is an integer and computing the quantity r1*(r2*( . . . (rk*m). - View Dependent Claims (24, 25, 26, 27, 28, 29, 30, 31, 32, 33)
-
Specification