Claims
- 1. A method of determining the integrity of a message exchanged between a pair of correspondents, said message being secured by embodying said message in a function of a public key derived from a private key selected by one of said correspondents, said method comprising the steps of:
a) obtaining said public key; b) subjecting said public key to at least one mathematical test to determine whether said public key satisfies predefined mathematical characteristics; and c) accepting messages utilizing said public key if said public key satisfies said predefined mathematical characteristics.
- 2. A method according to claim 1, wherein said public key is an element of a finite group having a first predetermined order, and said predefined mathematical characteristics exclude membership in a subgroup of said finite group having a second predetermined order less than said first predetermined order.
- 3. A method according to claim 2, wherein said mathematical test includes exponentiating said public key to the value of said second predetermined order and determining whether the resultant element corresponds to the group identity, whereby said public key is rejected when said public key is a member of said subgroup.
- 4. A method according to claim 1, wherein said mathematical characteristics include arithmetic requirements of keys.
- 5. A method according to claim 4, wherein said arithmetic requirements include that said public key is in a range bounded by a parameter and said test is performed by verifying that said public key is greater than 1 and less than said parameter.
- 6. A method according to claim 5, wherein said public key is for use with a modulus, and said parameter is a function of said modulus.
- 7. A method according to claim 6, wherein said arithmetic requirements include that said public key is odd.
- 8. A method according to claim 7, wherein said arithmetic requirements include that said public key is 3 or 65537.
- 9. A method according to claim 4, wherein said public key is an element of a finite group, and said arithmetic requirements include the order of said public key, and said test is performed by exponentiating said public key to the value of an order of said finite group and confirming that the resultant value corresponds to the group identity.
- 10. A method according to claim 4, wherein said public key is a point on an elliptic curve.
- 11. A cryptographic unit for use in a data communication system established between a pair of correspondents exchanging public information across a communication channel by way of a public key encryption scheme, said unit including a monitor to receive a public key from one of said correspondents and subject said public key to at least one mathematical test to determine whether said public key satisfies predefined mathematical characteristics.
- 12. A cryptographic unit according to claim 11, wherein said public key is an element of a finite group having a first predetermined order, and said predefined mathematical characteristics exclude membership in a subgroup of said finite group having a second predetermined order less than said first predetermined order.
- 13. A cryptographic unit according to claim 12, wherein said mathematical test includes exponentiating said public key to the value of said second predetermined order and determining whether the resultant element corresponds to the group identity, whereby said public key is rejected when said public key is a member of said subgroup.
- 14. A cryptographic unit according to claim 11, wherein said mathematical characteristics include arithmetic requirements of keys.
- 15. A cryptographic unit according to claim 14, wherein said arithmetic requirements include that said public key is in a range bounded by a parameter and said test is performed by verifying that said public key is greater than 1 and less than said parameter.
- 16. A cryptographic unit according to claim 15, wherein said public key is for use with a modulus, and said parameter is a function of said modulus.
- 17. A cryptographic unit according to claim 16, wherein said arithmetic requirements include that said public key is odd.
- 18. A cryptographic unit according to claim 17, wherein said arithmetic requirements include that said public key is 3 or 65537.
- 19. A cryptographic unit according to claim 14, wherein said public key is an element of a finite group, and said arithmetic requirements include the order of said public key, and said test is performed by exponentiating said public key to the value of an order of said finite group and confirming that the resultant value corresponds to the group identity.
- 20. A cryptographic unit according to claim 14, wherein said public key is a point on an elliptic curve.
Parent Case Info
[0001] This application is a continuation-in-part of application Ser. No. 09/283,658 filed Apr. 1, 1999, which is a continuation of application Ser. No. 08/649,308 filed May 17, 1996, now U.S. Pat. No. 5,933,504. This application is also a continuation-in-part of application Ser. No. 09/840,096 filed Apr. 24, 2001 which is a continuation of application Ser. No. 08/949,781, filed on Oct. 14, 1997.
Continuations (2)
|
Number |
Date |
Country |
Parent |
08649308 |
May 1996 |
US |
Child |
09283658 |
Apr 1999 |
US |
Parent |
08949781 |
Oct 1997 |
US |
Child |
09840096 |
Apr 2001 |
US |
Continuation in Parts (2)
|
Number |
Date |
Country |
Parent |
09283658 |
Apr 1999 |
US |
Child |
10185735 |
Jul 2002 |
US |
Parent |
09840096 |
Apr 2001 |
US |
Child |
10185735 |
Jul 2002 |
US |