About 1,933,498 results (2,879 milliseconds)

What is encryption and how does it work? | Google Cloud

https://cloud.google.com/learn/what-is-encryption
The public key is created by the factoring of two prime numbers, plus an auxiliary value. ... RSA keys are often used to encrypt the shared keys of symmetric ...

US7043018B1 - Prime number generation method, prime number ...

https://patents.google.com/patent/US7043018B1/en
The encryption key and decryption key may be the same or they may be different. A cryptosystem wherein both keys are the same is called a common key ...

US7120248B2 - Multiple prime number generation using a parallel ...

https://patents.google.com/patent/US7120248B2/en
In a public key cryptographic scheme, encryption and decryption processes are performed using a pair of cryptographic keys. In the most common application, a ...

Re: [pqc-forum] Question: Prime Numbers in Lattice-Based ...

https://groups.google.com/a/list.nist.gov/g/pqc-forum/c/rmvPfWnrPMg
Sep 10, 2024 ... ... Prime Numbers in Lattice-Based Cryptography and FHE ... used in lattice-based cryptographic schemes, such as fully homomorphic encryption:.

US10333696B2 - Systems and methods for implementing an ...

https://patents.google.com/patent/US10333696B2/en
... and the decrypted plaintext data may be modified into final, output plaintext data using a similar prime number operation as applied during encryption.

US5848159A - Public key cryptographic apparatus and method ...

https://patents.google.com/patent/US5848159A/en
A method and apparatus are disclosed for improving public key encryption and decryption schemes that employ a composite number formed from three or more ...

US20150227930A1 - Homomorphic passcode encryption - Google ...

https://patents.google.com/patent/US20150227930A1/en
The card reader or the external server can factor the encoded portions of the passcode (e.g., using the set of prime numbers that is used to encode) to ...

University develops timer-based encryption to secure device data ...

https://news.google.com/__i/rss/rd/articles/CBMiNGh0dHBzOi8vZWRzY29vcC5jb20vd2FzaC11LWN5YmVyc2VjdXJpdHktdGltZXJzLWlvdC_SAQA?oc=5
Mar 25, 2022 ... ... prime factorization,” Chakrabartty said. “It's very difficult to factorize a number into two primes and [RSA keys] use this difficulty to do ...

US20080025504A1 - Computer or digital device data encryption ...

https://patents.google.com/patent/US20080025504A1/en
When P is a large prime number a hacker wishing to decode a message would have to perform massive numbers of calculations, although the hacker would eventually ...

US7231040B1 - Multiprime RSA public key cryptosystem - Google ...

https://patents.google.com/patent/US7231040B1/en
... used: M≡C d (mod n) where n and d are those values identified above. Using the present invention involving three primes to develop the product n, RSA encryption ...

US20050027764A1 - Polynomial time deterministic method for ...

https://patents.google.com/patent/US20050027764A1/en
... numbers, which are then used for generating prime numbers using standard methods. ... encryption system 108 that uses prime numbers generated by prime number ...

USRE40530E1 - Public key cryptographic apparatus and method ...

https://patents.google.com/patent/USRE40530E1/en
... prime numbers p and q is used instead. 2. The method according to claim 1 ... RSA Public-key data encryption system having large random prime number generating ...

US11799646B2 - Encryption method - Google Patents

https://patents.google.com/patent/US11799646B2/en
The prime numbers in the phase encryption key may be ordered according to ... The number of different modulation symbols used in the baseband signal depends on ...

US5586186A - Method and system for controlling unauthorized ...

https://patents.google.com/patent/US5586186A/en
... used raises the first k prime numbers in Z.sub.φ(n) that are relatively ... US20080165954A1 2008-07-10 System for encrypting and decrypting data using derivative ...

US20140358980A1 - Method of generating proven prime numbers ...

https://patents.google.com/patent/US20140358980A1/en
... encryption keys, using prime numbers. [0055]. According to one embodiment, it is provided to generate a prime number of a certain size in number of bits ...

CN103905181A - Improved RC5 encryption algorithm for secret key ...

https://patents.google.com/patent/CN103905181A/en
The present invention is based on three number theory theorems below. Concept 1: have such fact in number theory: two large prime numbers multiply each other ...

US7865730B2 - Bcencryption (BCE)—a public-key based method to ...

https://patents.google.com/patent/US7865730B2/en
This encryption operator can be a combination of a public encryption exponent (public key), such as, for example, a prime number, and a salt key derived from a ...

US5124117A - Cryptographic key distribution method and system ...

https://www.google.com/patents/US5124117
As with the Diffie-Hellman system, encryption and decryption are both done with exponentiation. In the RSA system, however, the modulus is not a prime number as ...

US5159632A - Method and apparatus for public key exchange in a ...

https://patents.google.com/patent/US5159632A/en
Elliptic curve cryptosystems are described in "A Course in Number Theory and Cryptography" (Koblitz, 1987, Springer-Verlag, New York). SUMMARY OF THE INVENTION.

US8831214B2 - Password self encryption method and system and ...

https://patents.google.com/patent/US8831214B2/en
(e) The server computer may select another prime number q such that q−1 and e are relative primes. (f) The server computer may compute Euler Totient Function φ ...