Microsoft technology licensing, llc (20240137216). SIMPLIFIED MASKING FOR SIGNED CRYPTOGRAPHY OPERATIONS simplified abstract

From WikiPatents
Jump to navigation Jump to search

SIMPLIFIED MASKING FOR SIGNED CRYPTOGRAPHY OPERATIONS

Organization Name

microsoft technology licensing, llc

Inventor(s)

Emre Karabulut of Raleigh NC (US)

Bharat S. Pillilli of El Dorado Hills CA (US)

Mojtaba Bisheh Niasar of Ithaca NY (US)

SIMPLIFIED MASKING FOR SIGNED CRYPTOGRAPHY OPERATIONS - A simplified explanation of the abstract

This abstract first appeared for US patent application 20240137216 titled 'SIMPLIFIED MASKING FOR SIGNED CRYPTOGRAPHY OPERATIONS

Simplified Explanation

The patent application discusses devices, systems, and methods for secure cryptographic masking. One method involves generating a random number, performing mathematical operations on the random number, and adding a private key value to create splits of the private key.

  • Generating a random number
  • Performing modulo operation with a prime number
  • Subtracting and adding values to create splits of the private key

Potential Applications

This technology can be applied in secure communication systems, digital signatures, and data encryption.

Problems Solved

This technology helps in protecting sensitive information from unauthorized access and ensures secure data transmission.

Benefits

The technology provides enhanced security for cryptographic operations, reduces the risk of data breaches, and ensures the confidentiality of sensitive information.

Potential Commercial Applications

The technology can be utilized in industries such as cybersecurity, financial services, healthcare, and government agencies for securing data and communications.

Possible Prior Art

One possible prior art could be the use of traditional cryptographic methods such as RSA encryption for securing data.

Unanswered Questions

How does this technology compare to existing cryptographic masking techniques?

This article does not provide a direct comparison with other cryptographic masking techniques, leaving the reader to wonder about the specific advantages of this method over existing ones.

Are there any limitations or vulnerabilities associated with this technology?

The article does not address any potential limitations or vulnerabilities that may exist in the proposed method, leaving room for further investigation into the robustness of the technology.


Original Abstract Submitted

generally discussed herein are devices, systems, and methods for secure cryptographic masking. a method can include generating a first random number, determining a result of the first random number modulo a prime number resulting in a second random number, subtracting the second random number from the prime number resulting in a first subtraction result, adding a private key value to the first subtraction result resulting in a first split, and responsive to determining the private key value is less than the random number, providing the first split and the second random number as splits of the private key.