Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method for generating a prime number for a cryptographic application

A prime number, password technology, applied in the field of fast prime number generation, can solve the problems of leakage, expensive, security risks, etc.

Active Publication Date: 2019-11-22
THALES DIS FRANCE SA
View PDF5 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, such a GCD computation can be very expensive in itself, especially for devices with limited processing power and / or CPUs that do not include any fast dividers
GCD calculations in frames for cryptographic applications can also pose a security risk, as GCD calculation leaks can be used to retrieve secret keys such as RSA private keys

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for generating a prime number for a cryptographic application
  • Method for generating a prime number for a cryptographic application

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0045]In the following detailed description, reference is made to the accompanying drawings, which show by way of illustration specific embodiments in which the invention may be practiced. These embodiments are described in sufficient detail to enable those skilled in the art to practice the invention. It is to be understood that the various embodiments of the invention, although different, are not necessarily mutually exclusive. For example, a particular feature, structure or characteristic described herein in connection with one embodiment may be implemented in other embodiments without departing from the spirit and scope of the present invention. In addition, it is to be understood that the location or arrangement of individual elements within each disclosed embodiment may be modified without departing from the spirit and scope of the invention. Accordingly, the foregoing detailed description is not to be taken in a limiting sense, and the scope of the invention is to be d...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention relates to a method for generating a prime number and using it in a cryptographic application, the method comprising the steps of: a) determining at least one binary base B witha small size b = log2(B) bits and for each determined base B at least one small prime pi such that B mod pi = 1, with i an integer, b) selecting a prime candidate YP, c) decomposing the selected primecandidate YP in a base B selected among said determined binary bases : YP = [sigma]yjB, d) computing a residue yPB from the candidate YP for said selected base such that yPB = [sigma]yj, e) testing if said computed residue yPB is divisible by one small prime pi selected among said determined small primes for said selected base B, f) while said computed residue yPB is not divisible by said selected small prime, iteratively repeating above step e) until tests performed at step e) prove that said computed residue yPB is not divisible by any of said determined small primes for said selected base B, g) when said computed residue yPB is not divisible by any of said determined small primes for said selected base B, iteratively repeating steps c) to f) for each base B among said determined binary bases, h) when, for all determined bases B, said residue yPB computed for a determined base is not divisible by any of said determined small primes for said determined base B, executing a known rigorous probable primality test on said candidate YP, and when the known rigorous probable primality test is a success, storing said prime candidate YP and using said stored prime candidate YP in saidcryptographic application.

Description

technical field [0001] The present invention relates to the field of prime number generation for cryptographic applications and associated cryptographic devices, and more particularly, to fast prime number generation using coprimeity tests that do not require any GCD calculations. Background technique [0002] Cryptographic applications such as encryption or cryptographic key generation often rely on prime numbers. Therefore, devices implementing such cryptographic applications, such as security devices such as smart cards, must generate prime numbers, which is one of the most resource-consuming operations embedded on such devices. The primality of the number of candidates is usually tested using a strict probable primality test such as the Miller-Rabin test. Such tests are very expensive, and candidates can be pre-excluded by testing their co-primeness with some known small primes. [0003] Such coprimeality tests are usually based on greatest common divisor (GCD) calcula...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/00H04L9/30G06F7/72
CPCG06F7/72H04L9/003G06F2207/7204H04L9/3033H04L9/002
Inventor A.贝尔扎蒂M.鲁塞莱
Owner THALES DIS FRANCE SA
Features
  • Generate Ideas
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More