Unlock instant, AI-driven research and patent intelligence for your innovation.

Method for implementing in an electronic component a cryptographic algorithm for finding the public exponent

An encryption algorithm and technology of electronic components, which can be applied in the calculation using non-numerical representation, countermeasures to attack encryption mechanisms, public keys for secure communication, etc., and can solve problems such as time-consuming calculation

Inactive Publication Date: 2005-03-09
GEMPLU
View PDF1 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0054] One disadvantage of this method is that the method is probabilistic, that is, the probability of an error being detected is less than 1, so not all errors are detected
In addition, this method consumes computational time
Another disadvantage of Shamir's method is that it only works on CRT mode

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for implementing in an electronic component a cryptographic algorithm for finding the public exponent
  • Method for implementing in an electronic component a cryptographic algorithm for finding the public exponent
  • Method for implementing in an electronic component a cryptographic algorithm for finding the public exponent

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0083] The embodiments have been described in relation to chip cards, but are of course applicable to any other electronic security device or component with encrypted computing means.

[0084] Such as figure 1 As shown in , the chip card 1 comprises a microprocessor 2 coupled with a fixed memory (ROM) 3 and a random access memory (RAM) 4, which collectively constitute an assembly allowing the execution of functions such as encryption algorithms. More precisely, the microprocessor 2 contains the arithmetic operation means necessary for the algorithm, and the circuits for transferring data with the memories 3 and 4 . The fixed memory 3 contains the program in source code form for executing the encryption algorithm, while the random access memory 4 contains registers which can be updated for storing calculation results.

[0085] The chip card 1 also contains a communication interface 5 connected to the microprocessor 2 and allowing data exchange with the external environment. T...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention concerns a method for implementing in an electronic component a cryptographic algorithm using calculating means. The invention is characterized in that it consists in carrying out the following steps: a) selecting a value e among a specific number of values eI, ei being integers, b) checking if ei verifies a predetermined relationship: if so, then e=ei, and storing e for use in calculating said cryptographic algorithm.

Description

technical field [0001] The invention relates to a method for implementing an encryption algorithm in an electronic component. [0002] The invention also relates to corresponding electronic components. Background technique [0003] This component is used in applications where access to data and services is tightly controlled. They have an architecture built around a microprocessor and memory including a program memory of the ROM (Read Only Memory) type containing one or more secret numbers d. [0004] These components are used in computer systems, either on board or not; for certain applications of chip cards, they are used especially in chip cards. These applications are, for example, applications accessing certain databases, banking applications, remote payment applications - eg payments for TV bills, car fuel bills, highway tolls. [0005] Accordingly, these components or cards utilize cryptographic algorithms to ensure the encryption of transmitted data and / or the dec...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G09C1/00G06F7/72H04L9/10H04L9/30
CPCH04L9/302G06F7/723G06F2207/7271H04L9/004H04L2209/26
Inventor N·费特M·若耶P·帕耶F·克斯-罗沙特K·比列加斯
Owner GEMPLU