18109057. SIMPLIFIED MASKING FOR SIGNED CRYPTOGRAPHY OPERATIONS simplified abstract (Microsoft Technology Licensing, LLC)
Contents
- 1 SIMPLIFIED MASKING FOR SIGNED CRYPTOGRAPHY OPERATIONS
- 1.1 Organization Name
- 1.2 Inventor(s)
- 1.3 SIMPLIFIED MASKING FOR SIGNED CRYPTOGRAPHY OPERATIONS - A simplified explanation of the abstract
- 1.4 Simplified Explanation
- 1.5 Potential Applications
- 1.6 Problems Solved
- 1.7 Benefits
- 1.8 Potential Commercial Applications
- 1.9 Possible Prior Art
- 1.10 Original Abstract Submitted
SIMPLIFIED MASKING FOR SIGNED CRYPTOGRAPHY OPERATIONS
Organization Name
Microsoft Technology Licensing, LLC
Inventor(s)
Emre Karabulut of Raleigh NC (US)
Bharat S. Pillilli of El Dorado Hills CA (US)
Mojtaba Bisheh Niasar of Ithaca NY (US)
SIMPLIFIED MASKING FOR SIGNED CRYPTOGRAPHY OPERATIONS - A simplified explanation of the abstract
This abstract first appeared for US patent application 18109057 titled 'SIMPLIFIED MASKING FOR SIGNED CRYPTOGRAPHY OPERATIONS
Simplified Explanation
The patent application discusses devices, systems, and methods for secure cryptographic masking. The method involves generating a random number, performing mathematical operations on the random number and a prime number, and adding a private key value to the result to split the private key.
- Generating a random number
- Performing modulo operation with a prime number
- Subtracting the result from the prime number
- Adding a private key value to the result
- Splitting the private key based on the value of the private key
Potential Applications
This technology can be applied in secure communication systems, digital signatures, and secure data storage.
Problems Solved
This technology helps in securing sensitive information, protecting against unauthorized access, and ensuring data integrity.
Benefits
The benefits of this technology include enhanced security, protection against cyber threats, and increased trust in digital transactions.
Potential Commercial Applications
The potential commercial applications of this technology include secure messaging apps, secure payment systems, and secure cloud storage services.
Possible Prior Art
One possible prior art for this technology could be the use of cryptographic algorithms for securing data transmission and storage.
What are the specific mathematical operations involved in generating the first split of the private key?
The specific mathematical operations involve generating a random number, performing modulo operation with a prime number, subtracting the result from the prime number, and adding a private key value to the result.
How does the method ensure the security of the private key during the splitting process?
The method ensures the security of the private key by adding a private key value to the result, which is based on the value of the private key itself. This ensures that the private key remains secure even during the splitting process.
Original Abstract Submitted
Generally discussed herein are devices, systems, and methods for secure cryptographic masking. A method can include generating a first random number, determining a result of the first random number modulo a prime number resulting in a second random number, subtracting the second random number from the prime number resulting in a first subtraction result, adding a private key value to the first subtraction result resulting in a first split, and responsive to determining the private key value is less than the random number, providing the first split and the second random number as splits of the private key.