Circuit arrangement and method for RSA key generation
First Claim
1. A hardware implementation of a data processing device, the data processing device comprising at least one integrated circuit (IC), wherein the at least one IC has start bytes of random numbers offline pre-computed from a table of bytes to satisfy requirements of a defined digital signature law, uses the pre-computed start bytes in a key generating stage to start the random numbers, and searches two prime numbers for key generation both in compliance with the defined digital signature law and based upon the started random numbers.
10 Assignments
0 Petitions
Accused Products
Abstract
In order to further develop a circuit arrangement for as well as a method of performing at least one operation, in particular at least one cryptographic calculation, wherein the problem of creating at least one key, in particular the R[ivest-]S[hamir-]A[dleman] key, satisfying at least one defined digital signature laws, in particular satisfying the German Digital Signature Law, is solved it is proposed that at least one, preferably two, prime numbers (p; q) for key generation, in particular for R[ivest-]S[hamir-]A[dleman] key generation, are searched in compliance with at least one defined digital signature law, in particular with the German Digital Signature Law.
24 Citations
8 Claims
- 1. A hardware implementation of a data processing device, the data processing device comprising at least one integrated circuit (IC), wherein the at least one IC has start bytes of random numbers offline pre-computed from a table of bytes to satisfy requirements of a defined digital signature law, uses the pre-computed start bytes in a key generating stage to start the random numbers, and searches two prime numbers for key generation both in compliance with the defined digital signature law and based upon the started random numbers.
-
4. A method of performing, on a hardware implementation of a data processing device, at least one cryptographic calculation, the method comprising:
-
searching, on the hardware implementation of a data processing device, two prime numbers for key generation in compliance with at least one defined digital signature law; pre-computing start bytes for random numbers offline from a table of bytes to satisfy all requirements of the defined digital signature law; and using, in a key generating stage, the pre-computed start bytes to start the random numbers used in searching for the two prime numbers. - View Dependent Claims (5, 6, 7)
-
-
8. A method of performing, on a hardware implementation of a data processing device, at least one cryptographic calculation, the method comprising:
-
searching, on the hardware implementation of a data processing device, two prime numbers for key generation in compliance with at least one defined digital signature law; pre-computing all start bytes for random numbers to satisfy all requirements of the defined digital signature law; and using, in a key generating stage, the pre-computed start bytes to start the random numbers used in searching for the two prime numbers, wherein the two prime numbers (p;
q) to be produced are subject to the following conditions;
22n−
1<
p*q<
22n;
(i)
0.5<
|log(p)−
log(q)|<
30;
(ii)
p<
q; and
(iii)
p<
2n and q<
2n,
(iv)wherein p*q is a modulus having a required bit length 2*n and each prime number has a bit length n.
-
Specification