18109057. SIMPLIFIED MASKING FOR SIGNED CRYPTOGRAPHY OPERATIONS simplified abstract (Microsoft Technology Licensing, LLC)

From WikiPatents
Revision as of 06:35, 8 May 2024 by Wikipatents (talk | contribs) (Creating a new page)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to navigation Jump to search

SIMPLIFIED MASKING FOR SIGNED CRYPTOGRAPHY OPERATIONS

Organization Name

Microsoft Technology Licensing, LLC

Inventor(s)

Emre Karabulut of Raleigh NC (US)

Bharat S. Pillilli of El Dorado Hills CA (US)

Mojtaba Bisheh Niasar of Ithaca NY (US)

SIMPLIFIED MASKING FOR SIGNED CRYPTOGRAPHY OPERATIONS - A simplified explanation of the abstract

This abstract first appeared for US patent application 18109057 titled 'SIMPLIFIED MASKING FOR SIGNED CRYPTOGRAPHY OPERATIONS

Simplified Explanation

The patent application discusses devices, systems, and methods for secure cryptographic masking. The method involves generating a random number, performing mathematical operations on the random number and a prime number, and adding a private key value to the result to split the private key.

  • Generating a random number
  • Performing modulo operation with a prime number
  • Subtracting the result from the prime number
  • Adding a private key value to the result
  • Splitting the private key based on the value of the private key

Potential Applications

This technology can be applied in secure communication systems, digital signatures, and secure data storage.

Problems Solved

This technology helps in securing sensitive information, protecting against unauthorized access, and ensuring data integrity.

Benefits

The benefits of this technology include enhanced security, protection against cyber threats, and increased trust in digital transactions.

Potential Commercial Applications

The potential commercial applications of this technology include secure messaging apps, secure payment systems, and secure cloud storage services.

Possible Prior Art

One possible prior art for this technology could be the use of cryptographic algorithms for securing data transmission and storage.

What are the specific mathematical operations involved in generating the first split of the private key?

The specific mathematical operations involve generating a random number, performing modulo operation with a prime number, subtracting the result from the prime number, and adding a private key value to the result.

How does the method ensure the security of the private key during the splitting process?

The method ensures the security of the private key by adding a private key value to the result, which is based on the value of the private key itself. This ensures that the private key remains secure even during the splitting process.


Original Abstract Submitted

Generally discussed herein are devices, systems, and methods for secure cryptographic masking. A method can include generating a first random number, determining a result of the first random number modulo a prime number resulting in a second random number, subtracting the second random number from the prime number resulting in a first subtraction result, adding a private key value to the first subtraction result resulting in a first split, and responsive to determining the private key value is less than the random number, providing the first split and the second random number as splits of the private key.