Method for protecting secrete data in data storage medium
A technology for storage media and data protection, applied in data processing applications, electrical digital data processing, digital data processing components, etc.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Examples
Embodiment Construction
[0016] In the following text, the invention will be explained with reference to an exemplary embodiment of exponentiation modulo. Without any restriction on generality, it is assumed that the exponentiation modulo process is computed to form the encrypted message Y=M d mod n, because if a "1" occurs in d, the intermediate result is squared and the message M is multiplied, and if a "0" occurs, the intermediate result is squared.
[0017] According to the invention, for the encryption process, first a random number r is selected and then the product r*n is formed. The exponentiation process then begins with a squaring operation, where the product r*n is added to the intermediate result Z to compute the expression (Z*(Z+r*n) mod k*n), where k is an integer rather than Evaluates the expression Z*Z mod n. In the case where the exponent, that is to say the key d, contains "1" at this point, a multiplication operation follows, in which (r i *n) added to message M, that is to say ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More