Unlock instant, AI-driven research and patent intelligence for your innovation.

Configurable device for lattice-based cryptography

A technology of cryptography and network nodes, applied in the direction of public keys for secure communication, secure communication devices, digital transmission systems, etc., and can solve problems such as solution destruction and failure to implement all solutions.

Pending Publication Date: 2020-08-04
KONINKLJIJKE PHILIPS NV
View PDF2 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Not only must every scenario be coded, but every scenario must be debugged to ensure they do not contain critical vulnerabilities that could compromise their security
On the other hand, not implementing all scenarios, or at least most of them, also implies certain risks
If one of the above problems is broken, such as RLWE or modular lattice, the corresponding scheme is completely broken

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Configurable device for lattice-based cryptography
  • Configurable device for lattice-based cryptography
  • Configurable device for lattice-based cryptography

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0072] While the invention may be embodied in many different forms, one or more specific embodiments are shown in the drawings and will now be described in detail, it being understood that this disclosure is considered as an illustration of the principles of the invention and is not intended to The invention is limited to the specific embodiments shown and described. Hereinafter, elements of the embodiment are described in operation for the sake of understanding. However, it will be apparent that the various elements are arranged to perform the functions described as being performed by them. Furthermore, the invention is not limited to the embodiments, and the invention lies in every novel feature or combination of features described herein or recited in mutually different dependent claims.

[0073] Recall that several lattice-based schemes exist for the design of Key Exchange (KEX) protocols, Key Encapsulation Mechanisms (KEM; also sometimes called Key Encapsulation Methods)...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Some embodiments relate to a first electronic network node is provided configured for a cryptographic operation. The first network node is configured to receive as input a difficulty parameter (d), and a structure parameter (n), and to obtain a shared matrix (A), the shared matrix being shared a second network node through a communication interface, entries in the shared matrix (A) being selectedmodulo a first modulus (q), the shared matrix (A) being a square matrix (k*k) of dimension (k) equal to the difficulty parameter (d) divided by the structure parameter (n), the entries in the shared matrix (A) being polynomials modulo a reduction polynomial (f) of degree equal to the structure parameter (n), said cryptographic operation using the shared matrix.

Description

technical field [0001] The present invention relates to a network node configured for cryptographic operations, a cryptographic operation method, and a computer-readable medium. Background technique [0002] In cryptography, a key agreement protocol is a protocol by which two or more parties that have not shared a public key can agree on a key. Preferably, both parties can influence the outcome such that neither party can force the choice of key. An attacker who has eavesdropped on all communications between the two parties should know nothing about the key. However, while an attacker who sees the same communication gains nothing or much, the parties themselves may derive the shared secret. Key agreement protocols may be used, for example, to secure communications, for example to encrypt and / or authenticate messages between two parties. [0003] To facilitate secure communication between parties, key agreement protocols are sometimes further subdivided into cryptographic ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/30
CPCH04L9/3093H04L9/0838H04L9/0819
Inventor O·加西亚莫尔琼L·M·G·M·托尔胡伊泽恩S·巴塔查里亚J·L·托里阿尔切
Owner KONINKLJIJKE PHILIPS NV
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More