Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

RSA public key generation apparatus, RSA decryption apparatus, and RSA signature apparatus

A technology of public key and generation device, applied in the field of information security, can solve problems such as retrieval and error, and achieve the effect of reducing the required time

Inactive Publication Date: 2005-07-27
PANASONIC CORP
View PDF2 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] By adopting the above-mentioned public key encryption method, although the third party can send secret information to the other party without knowing it, according to Patent Document 1, for example, when the IC card is performing cryptographic processing, an illegal third party may use the abnormal clock, Abnormal voltage, abnormal electromagnetic waves, abnormal temperature, etc. cause errors intentionally, thereby extracting keys and secret information used in ciphers, thus becoming a threat

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • RSA public key generation apparatus, RSA decryption apparatus, and RSA signature apparatus
  • RSA public key generation apparatus, RSA decryption apparatus, and RSA signature apparatus
  • RSA public key generation apparatus, RSA decryption apparatus, and RSA signature apparatus

Examples

Experimental program
Comparison scheme
Effect test

no. 2 Embodiment approach

[0233] The following describes the RSA secret communication system 20 as another embodiment of the present invention.

[0234] (1) Configuration of the RSA secret communication system 20

[0235] RSA secret communication system 20 such as Figure 10 As shown, the structure includes an RSA encryption device 500 , an RSA decryption device 400 and a memory card 600 , and the RSA encryption device 500 and the RSA decryption device 400 are connected via a network 50 .

[0236] In the key generation under the RSA encryption method, for two prime numbers p and prime numbers q with different sizes, the number n=p×q is generated, and is mutually prime with p-1 and the least common multiple of q-1, 1cm, and A public key e satisfying p-1>e. In addition, the inverse of the public key e is generated in the remainder body whose divisor is the least common multiple of 1cm, and the generated inverse becomes the secret key d. The public key e thus generated is notified to the RSA encryption...

no. 3 Embodiment approach

[0269] The RSA secret communication system 30 which is a modified example of the RSA secret communication system 20 of the second embodiment will be described below.

[0270] (1) Configuration of the RSA secret communication system 30

[0271] The RSA secret communication system 30 has a configuration similar to that of the RSA secret communication system 20 . Here, the difference from the RSA secret communication system 20 will be mainly explained.

[0272] RSA secret communication system 30 such as Figure 12 As shown, its composition includes an RSA encryption device 500 , an RSA decryption device 400 b , a CRT information generation device 700 , and a memory card 600 b. The RSA encryption device 500 and the RSA decryption device 400 are connected via a network 50 .

[0273] The memory card 600b is a removable semiconductor memory similar to the memory card 600, and stores in advance a secret key d for decryption processing, a prime number p, and a prime number q.

[027...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

An RSA decryption apparatus that is used in an IC card or the like counters a differential fault attack. The RSA decryption apparatus computes at high speed a public key used in data verification, without having to obtain the public key from an external source. The RSA decryption apparatus includes a remainder computation unit 412 that calculates dp= d mod (p-1), and an inverse computation unit 414 that finds an inverse of dp over a residue field with p-1 as a modulus. The RSA decryption apparatus verifies a deciphertext with use of the inverse of dp as the public key. The reduced bit count in inverse computation compared to if the inverse of d is found as the public key increases computing speed.

Description

technical field [0001] The present invention relates to the information security technology using one of the public key encryption algorithms, that is, the RSA encryption technology. Background technique [0002] This application is based on Japanese Registered Application No. 2003-382191, the contents of which are incorporated herein by reference. Conventionally, a public key encryption method has been known as a means for realizing information privacy, authentication, and the like. [0003] In the public key encryption method, a key pair of a secret key held by oneself and a public key corresponding to the above-mentioned secret key is generated, encryption is performed using the above-mentioned public key, and encryption is performed using the above-mentioned secret key. to decrypt. For example, in the encrypted communication of messages, the message sender uses the public key of the message receiver to encrypt the message, and only the holder of the secret key, that is...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/30H04L9/32
CPCH04L9/3249H04L9/302H04L2209/56
Inventor 小野贵敏松崎枣布田裕一
Owner PANASONIC CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products