Claims
- 1. A method of encrypting data, including exponentiating by iteratively cisponentiating according to cisponentiator C(G, E, B, R, m)=GEBR mod m,
wherein G is a fleeting multiplicand base; wherein E is an enduring cisponent; wherein B is a recurring multiplier; wherein R is an enduring factor; and wherein m is a persistent modulus.
- 2. The method of claim 1, wherein the E is a fixed characteristic of the cisponentiator, whereby CE(G, B, R, m)=C(G, E, B, R, m)=GEBR mod m.
- 3. The method of claim 2, wherein the E is a power of 2.
- 4. The method of claim 1, wherein the R is fixed, whereby CR(G, E, B, m)=C(G, E, B, R, m)=GEBR mod m.
- 5. The method of claim 4, wherein the E is a fixed characteristic of the cisponentiator, whereby CER(G, B, m)=C(G, E, B, R, m)=GEBR mod m.
- 6. The method of claim 5, wherein the E is a power of 2.
- 7. The method of claim 1, wherein m is fixed, whereby Cm(G, E, B, R)=C(G, E, B, R, m)=GEBR mod m.
- 8. The method of claim 5, wherein m is fixed, whereby CERm(G, B)=C(G, E, B, R, m)=GEBR mod m.
- 9. The method of claim 1, wherein the data is encrypted using asymmetric encryption.
- 10. The method of claim 5, wherein the data is encrypted using asymmetric encryption.
- 11. A method of key exchange, including exponentiating by iteratively cisponentiating according to cisponentiator C(G, E, B, R, m)=GEBR mod m,
wherein G is a fleeting multiplicand base; wherein E is an enduring cisponent; wherein B is a recurring multiplier; wherein R is an enduring factor; and wherein m is a persistent modulus.
- 12. The method of claim 11, wherein the E is a fixed characteristic of the cisponentiator, whereby CE(G, B, R, m)=C(G, E, B, R, m)=GEBR mod m.
- 13. The method of claim 12, wherein the E is a power of 2.
- 14. The method of claim 11, wherein the R is fixed, whereby CR(G, E, B, m)=C(G, E, B, R, m)=GEBR mod m.
- 15. The method of claim 14, wherein the E is a fixed characteristic of the cisponentiator, whereby CER(G, B, m)=C(G, E, B, R, m)=GEBR mod m.
- 16. The method of claim 15, wherein the E is a power of 2.
- 17. The method of claim 11, wherein m is fixed, whereby Cm(G, E, B, R)=C(G, E, B, R, m)=GEBR mod m.
- 18. The method of claim 15, wherein m is fixed, whereby CERm(G, B)=C(G, E, B, R, m)=GEBR mod m.
- 19. A software program configured to execute a method of encrypting data, including exponentiating by iteratively cisponentiating according to cisponentiator C(G, E, B, R, m)=GEBR mod m,
wherein G is a fleeting multiplicand base; wherein E is an enduring cisponent; wherein B is a recurring multiplier; wherein R is an enduring factor; and wherein m is a persistent modulus.
- 20. The software program of claim 19,
wherein the R is fixed; and wherein the E is a fixed characteristic of the cisponentiator; and wherein the E is also a power of 2, whereby CER(G, B, m)=C(G, E, B, R, m)=GEBR mod m.
- 21. A software program configured to execute a method of key exchange, including exponentiating by iteratively cisponentiating according to cisponentiator C(G, E, B, R, m)=GEBR mod m,
wherein G is a fleeting multiplicand base; wherein E is an enduring cisponent; wherein B is a recurring multiplier; wherein R is an enduring factor; and wherein m is a persistent modulus.
- 22. The software program of claim 21,
wherein the R is fixed; and wherein the E is a fixed characteristic of the cisponentiator; and wherein the E is also a power of 2, whereby CER(G, B, m)=C(G, E, B, R, m)=GEBR mod m.
- 23. A device for encrypting data, configured to exponentiate by iteratively cisponentiating according to cisponentiator C(G, E, B, R, m)=GEBR mod m,
wherein G is a fleeting multiplicand base; wherein E is an enduring cisponent; wherein B is a recurring multiplier; wherein R is an enduring factor; and wherein m is a persistent modulus.
- 24. The device of claim 23, wherein the E is a fixed characteristic of the cisponentiator, whereby CE(G, B, R, m)=C(G, E, B, R, m)=GEBR mod m.
- 25. The device of claim 24, wherein the E is a power of 2.
- 26. The device of claim 23, wherein the R is fixed, whereby CR(G, E, B, m)=C(G, E, B, R, m)=GEBR mod m.
- 27. The device of claim 26, wherein the E is a fixed characteristic of the cisponentiator, whereby CER(G, B, m)=C(G, E, B, R, m)=GEBR mod m.
- 28. The device of claim 27, wherein the E is a power of 2.
- 29. The device of claim 23, wherein m is fixed, whereby Cm(G, E, B, R)=C(G, E, B, R, m)=GEBR mod m.
- 30. The device of claim 27, wherein m is fixed, whereby CERm(G, B)=C(G, E, B, R, m)=GEBR mod m.
- 31. The device of claim 23, wherein the data is encrypted using asymmetric encryption.
- 32. The device of claim 27, wherein the data is encrypted using asymmetric encryption.
- 33. A device for exchanging keys, configured to exponentiate by iteratively cisponentiating according to cisponentiator C(G, E, B, R, m)=GEBR mod m,
wherein G is a fleeting multiplicand base; wherein E is an enduring cisponent; wherein B is a recurring multiplier; wherein R is an enduring factor; and wherein m is a persistent modulus.
- 34. The device of claim 33, wherein the E is a fixed characteristic of the cisponentiator, whereby CE(G, B, R, m)=C(G, E, B, R, m)=GEBR mod m.
- 35. The device of claim 34, wherein the E is a power of 2.
- 36. The device of claim 33, wherein the R is fixed, whereby CR(G, E, B, m)=C(G, E, B, R, m)=GEBR mod m.
- 37. The device of claim 36, wherein the E is a fixed characteristic of the cisponentiator, whereby CER(G, B, m)=C(G, E, B, R, m)=GEBR mod m.
- 38. The device of claim 37, wherein the E is a power of 2.
- 39. The device of claim 33, wherein m is fixed, whereby Cm(G, E, B, R)=C(G, E, B, R, m)=GEBR mod m.
- 40. The device of claim 37, wherein m is fixed, whereby CERm(G, B)=C(G, E, B, R, m)=GEBR mod m.
- 41. A method of processing data, including exponentiating by iteratively cisponentiating according to cisponentiator C(G, E, B, R, m)=GEBR mod m,
wherein G is a fleeting multiplicand base; wherein E is an enduring cisponent; wherein B is a recurring multiplier; wherein R is an enduring factor; and wherein m is a persistent modulus.
- 42. The method of claim 41,
wherein the R is fixed; and wherein the E is a fixed characteristic of the cisponentiator; and wherein the E is also a power of 2, whereby CER(G, B, m)=C(G, E, B, R, m)=GEBR mod m.
- 43. The method of claim 41, further comprising:
wherein the data is processed to produce nonlinear congruential pseudorandom numbers.
CROSS-REFERENCE TO RELATED APPLICATIONS
[0001] This application claims the benefit of the U.S. Provisional Application identified by Attorney Docket No. 501143.000017 and Serial No. 60/326,250, entitled “Method for Squaring” and filed Oct. 1, 2001. The benefit of 35 U.S.C. § 120 is claimed for that commonly owned provisional application. But the contents of that provisional application are not necessarily identical to the contents of this application.
[0002] Any references cited hereafter are incorporated by reference to the maximum extent allowable by law. To the extent a reference may not be fully incorporated herein, it is incorporated by reference for background purposes and indicative of the knowledge of one of ordinary skill in the art.
Provisional Applications (1)
|
Number |
Date |
Country |
|
60326250 |
Oct 2001 |
US |