Dale W. Hopkins - Georgetown KY, US Thomas W. Collins - Saratoga CA, US Steven W. Wierenga - Sunnyvale CA, US
Assignee:
Hewlett-Packard Development Company, L.P. - Houston TX
International Classification:
G06F 11/30
US Classification:
713176, 713186
Abstract:
A method is provided for generating a group digital signature wherein each of a group of individuals may sign a message M to create a group digital signature S, wherein M corresponds to a number representative of a message, 0≦M≦n−1, n is a composite number formed from the product of a number k of distinct random prime factors pp. . . p, k is an integer greater than 2, and S≡M(mod n). The method may include: performing a first partial digital signature subtask on a message M using a first individual private key to produce a first partial digital signature S; performing at least a second partial digital signature subtask on the message M using a second individual private key to produce a second partial digital signature S; and combining the partial digital signature results to produce a group digital signature S.
Thomas Collins - Saratoga CA, US Dale Hopkins - Gilroy CA, US Susan Langford - Sunnyvale CA, US Michael Sabin - Sunnyvale CA, US
Assignee:
Hewlett-Packard Development Company, L.P. - Houston TX
International Classification:
H04K 1/00 H04L 9/00
US Classification:
380 28, 713200
Abstract:
A method and apparatus are disclosed for improving public key encryption and decryption schemes that employ a composite number formed from three or more distinct primes. The encryption or decryption tasks may be broken down into sub-tasks to obtain encrypted or decrypted sub-parts that are then combined using a form of the Chinese Remainder Theorem to obtain the encrypted or decrypted value. A parallel encryption/decryption architecture is disclosed to take advantage of the inventive method.
Cryptographic Key Setup In Queued Cryptographic Systems
Dale W. Hopkins - Georgetown KY, US Thomas W. Collins - Saratoga CA, US Steven W. Wierenga - Sunnyvale CA, US
Assignee:
Hewlett-Packard Development Company, L.P. - Houston TX
International Classification:
H04L 9/00 H04K 1/00
US Classification:
713189, 380 28
Abstract:
A method is disclosed for performing cryptographic tasks, that include key setup tasks and work data processing tasks. This method comprises the steps of processing the key data in a first cryptographic engine and processing the work data in a second cryptographic engine. The processing of the key data comprises the steps of receiving key data, processing the key data, and generating processed key data. The processing of the work data comprises the steps of receiving the processed key data, receiving work data, processing the work data, and outputting the processed work data. In this method of the invention, the first cryptographic engine performs its tasks independently of the second cryptographic engine. A method for allocating cryptographic engines in a cryptographic system is also disclosed comprising monitoring a queue of cryptographic tasks, monitoring activity levels of a first allocation of a plurality of cryptographic engines, and dynamically adjusting the first allocation.
Method And System For Secure Storage, Transmission And Control Of Cryptographic Keys
A system and method are described supporting secure implementations of 3DES and other strong cryptographic algorithms. A secure key block having control, key, and MAC fields safely stores or transmits keys in insecure or hostile environments. The control field provides attribute information such as the manner of using a key, the algorithm to be implemented, the mode of use, and the exportability of the key. A MAC algorithm is applied across the key and control for generating a MAC field that cryptographically ties the control and key fields together. Improved security is provided because tampering with any portion of the key block results in an invalid key block. The work factor associated with any manner of attack is sufficient to maintain a high level of security consistent with the large keys and strong cryptographic algorithms supported.
Thomas Collins - Saratoga CA, US Dale Hopkins - Gilroy CA, US Susan Langford - Sunnyvale CA, US Michael Sabin - Sunnyvale CA, US
Assignee:
Hewlett-Packard Development Company, L.P. - Houston TX
International Classification:
H04L 9/30 H04L 9/00
US Classification:
380 30, 380 29
Abstract:
A method and apparatus are disclosed for improving public key encryption and decryption schemes that employ a composite number formed from three or more distinct primes. The encryption or decryption tasks may be broken down into sub-tasks to obtain encrypted or decrypted sub-parts that are then combined using a form of the Chinese Remainder Theorem to obtain the encrypted or decrypted value. A parallel encryption/decryption architecture is disclosed to take advantage of the inventive method. REEXAMINATION RESULTS.
Method And System For Secure Storage, Transmission And Control Of Cryptographic Keys
A system and method are described supporting secure implementations of 3DES and other strong cryptographic algorithms. A secure key block having control, key, and hash fields safely stores or transmits keys in insecure or hostile environments. The control field provides attribute information such as the manner of using a key, the algorithm to be implemented, the mode of use, and the exportability of the key. A hash algorithm is applied across the key and control for generating a hash field that cryptographically ties the control and key fields together. Improved security is provided because tampering with any portion of the key block results in an invalid key block. The work factor associated with any manner of attack is sufficient to maintain a high level of security consistent with the large keys and strong cryptographic algorithms supported.
Method And System For Secure Storage, Transmission And Control Of Cryptographic Keys
A system and method are described supporting secure implementations of 3DES and other strong cryptographic algorithms. A secure key block having control, key, and hash fields safely stores or transmits keys in insecure or hostile environments. The control field provides attribute information such as the manner of using a key, the algorithm to be implemented, the mode of use, and the exportability of the key. A hash algorithm is applied across the key and control for generating a hash field that cryptographically ties the control and key fields together. Improved security is provided because tampering with any portion of the key block results in an invalid key block. The work factor associated with any manner of attack is sufficient to maintain a high level of security consistent with the large keys and strong cryptographic algorithms supported.
Method For Selecting Optimal Number Of Prime Factors Of A Modulus For Use In A Cryptographic System
Dale Hopkins - Gilroy CA, US Tom Collins - Saratoga CA, US
International Classification:
H04K001/00
US Classification:
380/028000
Abstract:
A method provided for determining an optimal number k of prime factors p, p, . . . pfor developing a modulus N for use in a cryptographic system providing computational performance that increases as the number of constituent prime factors of the modulus increases, wherein use of the optimal number k of prime factors enables the system to provide optimal computational performance while maintaining a determined level of security.
R V City Div Of G B Business Enterprises Ltd Recreational Vehicles - Dealers. Recreational Vehicles - Repair & Service. Recreational Vehicles - Rent & Lease. Recreational Vehicles - Equipment. Parts. Supplies
8704 100 St, Morinville, AB T8R 1K6 7809392900
Dale Hopkins Vice President
Cityteam Ministries Individual and Family Social Services
2304 Zanker Rd, San Jose, CA 95131
Dale Hopkins General Manager
R V City Recreational Vehicles - Dealers · Recreational Vehicles - Repair & Service · Recreational Vehicles - Rent & Lease · Recreational Vehicles - Equipment · Parts · Supplies
Glenshaw Elementary School Glenshaw PA 1967-1968, Shaler Area Junior High School Glenshaw PA 1968-1971, Shaler Area Intermediate School Glenshaw PA 1970-1974
Donna Burry, Diana Copsey, Ruben Magdaleno, James Herrera, Shirley Schneider, Waynetta Allen, Monte Mowry, G N, Jeanne Moss, Darlene Hall, Lynn Allen, Monty Copsey
Brenda Shaw, Edwin Akers, Dewanah Elgin, John Wheeler, Marilyn Joann, John Sitton, Doris Jensen, Troy Underwood, Lea Mannahan, Barbara Crank, Annette Magee
Adoption of this alloy will lead to more sustainable aviation and space exploration, said Dale Hopkins, deputy project manager of NASAs Transformational Tools and Technologies project. This is because jet engine and rocket components made from GRX-810 will lower operating costs by lasting longer