CA2535741A1 - Data converter and method thereof - Google Patents

Data converter and method thereof Download PDF

Info

Publication number
CA2535741A1
CA2535741A1 CA002535741A CA2535741A CA2535741A1 CA 2535741 A1 CA2535741 A1 CA 2535741A1 CA 002535741 A CA002535741 A CA 002535741A CA 2535741 A CA2535741 A CA 2535741A CA 2535741 A1 CA2535741 A1 CA 2535741A1
Authority
CA
Canada
Prior art keywords
data
finite field
conversion
unit
data blocks
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CA002535741A
Other languages
French (fr)
Other versions
CA2535741C (en
Inventor
Masato Yamamichi (Deceased)
Motoji Ohmori
Makoto Tatebayashi
Makoto Usui
Kaoru Yokota
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Panasonic Corp
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Publication of CA2535741A1 publication Critical patent/CA2535741A1/en
Application granted granted Critical
Publication of CA2535741C publication Critical patent/CA2535741C/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F7/00Methods or arrangements for processing data by operating upon the order or content of the data handled
    • G06F7/60Methods or arrangements for performing computations using a digital non-denominational number representation, i.e. number representation without radix; Computing devices using combinations of denominational and non-denominational quantity representations, e.g. using difunction pulse trains, STEELE computers, phase computers
    • G06F7/72Methods or arrangements for performing computations using a digital non-denominational number representation, i.e. number representation without radix; Computing devices using combinations of denominational and non-denominational quantity representations, e.g. using difunction pulse trains, STEELE computers, phase computers using residue arithmetic
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F7/00Methods or arrangements for processing data by operating upon the order or content of the data handled
    • G06F7/60Methods or arrangements for performing computations using a digital non-denominational number representation, i.e. number representation without radix; Computing devices using combinations of denominational and non-denominational quantity representations, e.g. using difunction pulse trains, STEELE computers, phase computers
    • G06F7/72Methods or arrangements for performing computations using a digital non-denominational number representation, i.e. number representation without radix; Computing devices using combinations of denominational and non-denominational quantity representations, e.g. using difunction pulse trains, STEELE computers, phase computers using residue arithmetic
    • G06F7/724Finite field arithmetic
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F1/00Details not covered by groups G06F3/00 - G06F13/00 and G06F21/00
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F7/00Methods or arrangements for processing data by operating upon the order or content of the data handled
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0618Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
    • H04L9/0625Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation with splitting of the data block into left and right halves, e.g. Feistel based algorithms, DES, FEAL, IDEA or KASUMI
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3271Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2207/00Indexing scheme relating to methods or arrangements for processing data by operating upon the order or content of the data handled
    • G06F2207/72Indexing scheme relating to groups G06F7/72 - G06F7/729
    • G06F2207/7209Calculation via subfield, i.e. the subfield being GF(q) with q a prime power, e.g. GF ((2**m)**n) via GF(2**m)
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/34Encoding or coding, e.g. Huffman coding or error correction
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/60Digital content management, e.g. content distribution

Abstract

A data converter (1) capable of reducing a size of the total implementation in a device is a processing apparatus that performs secret converting processing predetermined to input data with 64 bits, the data converter including a finite field polynomial cubing unit (10), data integrating units (11a) to (11d), (12) and (13), a first converter (14), a second converter (15), a data splitting unit (16), and a data integrating unit (17). The finite field polynomial cubing unit (10) performs cubing, on the 32 bits data, in the polynomial residue class ring with a value in the finite field GF (28) as a coefficient and respectively outputs data with 32 bits.

Description

DESCRIPTION
DATA CONVERTER AND METHOD THEREOF
Technical Field ' The present invention relates to a data converter that realizes a data conversion system used for an authentication system and to a method thereof, in particular to a data converter that can be realized in an especially small size of implementation scale and has a high data confusion and to a method thereof.
Background Art In a challenge-response authentication system which is one of a method for examining a validity of a communication partner and the like, a secret conversion system is necessary for both authenticating and authenticated sides. As requirements for the secret conversion system, it is wished not only to have high data confusion performance (avalanche performance) but also to mount the method onto an apparatus at low cost.
As a conventional example of a data conversion system, there 2o is a system of using a secret key encryption system. For example, in the case of where the challenge-response authentication system is realized by a data conversion system using a 56 bits key length Data Encryption Standard (DES) encryption system (for details about the DES encryption system, refer to Menezes, Alfred J., et al., ~~HANDBOOK of APPLIED CRYPTOGRAPHY", CRC Press, 1997:
252-256), both of the authenticating side and the authenticated side secretly store a 56 bits key of the DES encryption system as an authentication key. Also, a plaintext and encrypted text of the DES
encryption system are respectively determined as an input and an output for the data converting system. Accordingly, the DES
encryption method can be used for a secret data converting system for an authentication (for details about the authentication system, refer to Menezes, Alfred J., et al., "HANDBOOK of APPLIED
CRYPTOGRAPHY", CRC Press, 1997: 400-403).
However, the secret key encryption system such as the DES
encryption system i s not constructed considering for sharing a circuit with other circuits that are mounted together with an encryption circuit in an apparatus. Therefore, it needs to be mounted as a circuit independent from other circuits. Accordingly, in a data conversion system using the conventional secret key encryption system, an encryption circuit is independently mounted 1o separately from other circuits in the apparatus so that a scale of the circuit in the apparatus as a whole becomes large. That is, in order to realize an apparatus at a low cost, it is generally required to make a total scale of the circuit mounted in the apparatus smaller as possible. Therefore, it is desirable for the encryption circuit 15 mounted in the apparatus to share the circuit with other circuits.
However, it is not realized in the conventional structure.
Considering the above mentioned problem, the present invention aims to provide a data converter capable of reducing the total size of the implementation scale in an apparatus.
Disclosure of Invention A data converter by the present invention comprises: a splitting unit operable to split input data into a plurality of data blocks; a conversion performing unit operable to perform conversion
2~ on each one of the plurality of data blocks, the conversion being based on an exponentiation to a predetermined exponent in a polynomial residue class ring with a value in a finite field GF (z"), the n being a natural number, as a coefficient; and an output data generating unit operable to generate output data based on the 3o plurality of data blocks converted by the conversion performing unit, wherein the predetermined exponent is a value that is 3 or larger and other than 2m, the m being an integer which is 1 or larger.

According to this structure, in the exponentiation, the multiplication in the polynomial residue class ring is performed. By performing an operation in the polynomial residue class ring, even if a part of the input data is changed as described later, the change affects all bits in the output data. Therefore, the data confusion can be improved. Also, when a multiplication with two or more variables is performed, if any one of the variables is 0, a result of the multiplication becomes 0 regardless of values of other variables and a better data confusion performance is not shown. On the other to hand, when an exponentiation of the input data is performed, the data confusion performance can be improved without causing such problems. Furthermore, in the exponentiation, an operation in the polynomial residue class ring with a value in the finite field GF (2") (n is a natural number) as a coefficient is performed. Additionally, 15 a circuit can be shared with the operational circuit in the finite field GF (2n) used in an error-correction coding circuit such as a Reed-Solomon coding and a Bose-Chaudhuri-Hocqenghem (BCH) coding. Consequently, the size of implementation scale of an apparatus as a whole can be reduced and an apparatus implemented 2o in a compact circuit scale is realized.
As further information about technical background to this application, the disclosure of Japanese Patent Application No.
2003-353439 filed on October 14, 2003 including specification, drawings and claims is incorporated herein by reference in its 25 entirety.
Brief Description of Drawings These and other objects, advantages and features of the invention will become apparent from the following description so thereof taken in conjunction with the accompanying drawings that illustrate a specific embodiment of the invention. In the Drawings:
FIG. 1 is a block diagram showing an authentication system
-3-according to an embodiment of the present invention.
FIG. 2 is a block diagram showing an example of a configuration of a data converter according to the embodiment of the present invention.
FIG. 3 is a block diagram showing an example of a configuration of a finite field cubing unit according to the embodiment of the present invention.
FIG. 4 is .a block diagram showing an example of a configuration of a finite field polynomial multiplying unit according 1o to the embodiment of the present invention.
FIG. 5 is a block diagram showing an example of a configuration of a first converter according to the embodiment of the present invention.
FIG. 6 is a block diagram showing an example of a 15 configuration of a second converter according to the embodiment of the present invention.
FIG. 7 is a block diagram showing an example of a configuration of a finite field multiplying unit according to the embodiment of the present invention.
2o FIG. 8 is a block diagram showing an example of a configuration of a finite field doubling unit according to the embodiment of the present invention.
FIG. 9 is a block diagram showing an example of a system configuration in the case where the converter by the present 25 invention is applied to a content distribution system.
FIG. 10 is an outside drawing of an L5I of an error-correction/data converter.
FIG. 11 is a block diagram showing an example of a configuration of the error-correction/data converter.
Best Mode for Carrying Out the Invention The following explains about an embodiment of the present
-4-invention with references to diagrams.
(Configuration of Authentication System with Data Converter) FIG. 1 is a block diagram showing a configuration of an authentication system according to an embodiment of the present invention. In the authentication system, an authenticating apparatus 3 authenticates an authenticated apparatus 4 by a challenge-response authentication system. As a specific example of the present authentication system, for example, it is represented by a keyless entry system for a car in which the authenticating to apparatus 3 is an on-vehicle equipment for controlling open and close of a door of the car and the authenticated apparatus 4 is a portable terminal held by a user for opening and closing the door of the car.
The authenticating apparatus 3 generates random data with 15 64 bits in a random number generation apparatus 5 and sends it to the authenticated apparatus 4 as challenge data. The authenticated apparatus 4 converts received challenge data in the data converter Z and sends 64 bits converted data which is a result of the conversion to the authenticating apparatus 3 as response data.
2o The authenticating apparatus 3 converts the random number data in the data converter 1 while the authenticated apparatus 4 is performing the above mentioned processing and generates 64 bits converted data as the result of the conversion. The authenticating apparatus 3 then compares, in a data comparison device 6, the 2~ response data received from the authenticated apparatus 4 with the converted data and authenticates the authenticated apparatus 4 as valid only when both data correspond to each other. Here, the data converter 1 in the authenticating apparatus 3 and the data converter 2 in the authenticated apparatus 4 perform the same conversion so processing and content of the processing is shared secretly between the authenticating apparatus 3 and the authenticated apparatus 4.
(Configurations of Data Converter 1 and 2) _$_ Whereas the data converters 1 and 2 have a same configuration, the following explains only about an internal configuration of the data converter 1.
FIG. 2 is a diagram showing an internal configuration of the data converter 1. The data converter 1 is a processing apparatus that performs a predetermined secret converting processing on input data with 64 bits and generates output data with 64 bits. It has a finite field polynomial cubing unit 10, a data integrating units 11aN11d, 12 and 13, a first converter 14, a second converter 15, to data splitting unit 16, and a data integrating unit 17. The following explains about internal performances when input data with 64 bits is inputted into the data converter 1.
Firstly, the data splitting unit 16 split, from high-ordered bits, the 64 bit input data into two data blocks each having 32 bits. Here, 1~ the high-ordered 32 bit data block is called data A and the low-ordered 32 bit data block is called data B. The data A is inputted into the data integrating units 11a and 11c and the data B
is inputted into the data integrating units 11b and 11d. The data integrating units 11a and 11c respectively perform exclusive OR
20 operation (XOR), for each bit, on the inputted 32 bit data A with a fixed 32 bits data K1 and K3 and output 32 bit data AO and A1.
Further, the data integrating units 11b and 11d respectively perform the exclusive OR operation (XOR), for each bit, on the 32 bit data B
with fixed bit data K2 and K4 and output 32 bit data BO and B1.
25 Here, the 32 bit data K1 to K4 are fixed values determined in predetermined values.
Next, the finite field polynomial cubing unit 10 cubes each of the 32 bit data A0, B0, A1 and B1 in a polynomial residue class ring with a value in a finite field GF (28)as a coefficient which is described 30 later and calculates respectively 32 bit data of (A0)3, (B0)3, (A1)3, and (B1)3. The detail about processes of the finite field polynomial cubing unit 10 is explained later.

Next, the 32 bit data (A0)3 and (B0)3 are inputted to the data integrating unit 1~ and the 32 bit data (A1)3 and (B1)3 are inputted to the data integrating unit 13.
The data integrating unit 1~ and the data integrating unit 13 perform an exclusive OR operation for each bit respectively on two inputted 3~ bit data and output 3Z bit data of (AO)3(+)(BO)3 and (A1)3(+)(B1)3. Here, ~~X(+)Y" means the exclusive OR operation (XOR), for each bit, between X and Y.
The first converter 14 then performs a predetermined to conversion on the 32 bit data of (AO)3(+)(BO)3 based on an operation in a finite field GF (2$) which is explained later and outputs 32. bit data G0. Also, the second converter 15 performs a predetermined conversion on the (A1)3(+)(B1)3 based on an operation in the finite field GF (~8) and outputs 32 bit data G1.
15 After the above processes, the data integrating unit 17 connects the 32 bit data GO as the high-ordered 32 bits and the 32 bit data G1 as the low-ordered 32 bits and outputs the result as 64 bit data. The 64 bit data is output data of the data converter 1.
Next, it is explained about an internal configuration and 2o performances of the finite field polynomial cubing unit 10 (Internal Configuration of Finite Field Polynomial Cubing Unit 10) FIG. 3 is a diagram showing an example of the internal configuration of the finite field polynomial cubing unit 10. The 25 finite field polynomial cubing unit 10 is a processing unit of cubing in the polynomial residue class ring with a value in the finite field GF
(2.$) as a coefficient. It is composed of an input control unit 101, a finite field polynomial multiplying unit 100 and an output controlling unit 10~.
3o The input controlling unit 101 performs a control so that one of the two blocks of input data is outputted. The finite field polynomial multiplying unit 100 multiplies the two blocks of input data in the polynomial residue class ring with a value in the finite field GF (2$) as a coefficient. The output controlling unit 102 performs a control so that the input data is outputted to one of the two output destinations.
Hereafter, it is explained about internal performances when 32 bit input data X is inputted to the finite field polynomial cubing unit 10. The input data X is inputted to the input controlling unit 101 and the finite field polynomial multiplying unit 100. The input control unit 101 inputs the input data X directly to the finite field polynomial multiplying unit 100. The finite field polynomial multiplying unit 100 multiplies the 32 bit data X inputted from outside and the 32 bit data X inputted from the input controlling unit 101 in the polynomial residue class ring with a value in the finite field GF (28) as a coefficient (details are explained later), outputs 15 the multiplication result XZ, and inputs it to the output controlling unit 102. It is explained later about the detailed processes of the finite field polynomial multiplying unit 100'.
The output controlling unit 102 inputs the input data X2 directly to the input controlling unit 101. The input controlling unit 20 101 then inputs the input data X2 to the finite field polynomial multiplying unit 100.
The finite field polynomial multiplying unit 100 multiplies the input data XZ and the input data X and inputs the product X3 to the output controlling unit 102. The multiplication herein is a 2~ multiplication in the polynomial residue class ring as described above.
The output controlling unit 102 outputs the input data X3 as output data of the finite field polynomial cubing unit 10. Next, it is explained about an internal configuration and performances of the 3o finite field polynomial multiplying unit 100.
(Internal Configuration of Finite Field Polynomial Multiplying Unit 100) _$_ FIG. 4 is a diagram showing an example of the internal structure of the finite field polynomial multiplying unit 100. The finite field polynomial multiplying unit 100 multiplies the 32 bit first input data X and the 3~. bit second input data Y in the polynomial residue class ring with a value in the finite field GF (2$) as a coefficient and outputs an output data D with 32 bits. A residual polynomial of the polynomial residue class ring herein is denoted L(X)=X~-1 and a primitive polynomial m(x) of the finite field GF
(28) is denoted m(x)=x$+x~+x3+x+1. Prior to an explanation 1o about performances of the finite field polynomial multiplying unit 100, it is explained briefly about an operation in the finite field GF
(28) and an operation in the polynomial residue class ring.
Firstly, it is explained about the operation in the finite field GF
(28). For the operation in the finite field GF (28), if a value of each bit of the 8 bit data A is denoted a7, a6, . ~ , a0 from a high-ordered bit, a polynomial of the seventh order a(x)=a7xx'+a6xx6+ ~ ~ ~
+aixx+a0 is considered by associating with the values. Similarly, denoting a value of each bit of the 8 bit data b7, b6, ~ ~ ~ , b0 from a high-ordered bit, a polynomial of the seventh order 2o b(x)=b7xx'+b6+x6+ ~ ~ ~ +bixx+b0 is considered by associating with the values. Herein, the sum C of A and B in the finite field GF
(~$) is a result of which the sum c(x) calculated c(x)=a(x)+b(x) in the finite field GF (2) is converted into 8 bit data by associating the 8 bit data with the polynomial of the seventh order which is described above. That is, taking c(x)=c7xx'+c6+x6+
+cixx+c0, it is obtained as follow:
c7=a7+b7 c6=a6+b6 3o ci=ai+bi c0=a0+b0 Here, an addition ~~+" between the 1 bit data and the 1 bit data is all performed in the finite field GF (2). That is, 0+0=i+1=0 and therefore calculated as 0+1=1+0=1.
From the above, the addition in the finite field (z$) is nothing but performing an exclusive OR operation for each bit. In other words, the result C of the sum of A and B is denoted C=A(+)B.
Next, a multiplication in the finite field GF (28) is explained.
As described above, when 8 bit data A, B and C are denoted as the seventh order polynomials a(x), b(x) and c(x), the result C of multiplying 8 bit data A and B is obtained by following equation using corresponding seventh order polynomials a(x), b(x) and c(x).
c(x)=a(x) x b(x) mod m(x) Here, ~~f(x) mod g(x)" is a residual calculation result of residual calculation f(x) modulo g(x) and m(x) is, as described before, a primitive polynomial m(x)=x$+x4+x3+x+1 in the finite field GF(2$). Also, the polynomial multiplication herein, an addition and a multiplication of coefficients by residual calculation, are calculated in the finite field GF (2). The addition in the finite field GF (2) is as described and the multiplication is given 0x0=0x1=
1x0=0, 1x1=1.
2o An example of the multiplication is explained. Given A=57 (hexadecimal) and B=83 (hexadecimal), a(x)=x6+x~+x2+x+1 and b(x)=x'+x+1. Then, a(x) x b(x)=x13+x11+x9+x8+x6+x5+x~+x3+1 and so a(x) x b(x) mod m(x)=x'+x6+1. Therefore, the result C of multiplying A and B is hexadecimal C1.
25 Next, it is explained about an operation in the polynomial residue class ring with a value in the finite field GF (Z$) as a coefficient. In an operation in the polynomial residue class ring, when each byte of the 32 bit data A is denoted A0, A1, Az and A3 from the high-ordered byte, 1 byte data AO to A3 are applied to the 3o third order polynomial A(X)=AO+AIxX+A2xX2+A3 xX~. Similarly, when each byte of 32 bit data B and C are respectively denoted B0, B1, Bz, B3 and C0, C1, C2 and C3, the 1 byte data BO to B3 and CO
- to -to C3 are respectively applied to the following polynomials of B(X)=BO+B1 x X+B2 x Xz+B3 x X 3 and C(X)=CO+CixX+C2xX 2 +C3xX3. Herein, the addition in the polynomial residue class ring is obtained by C(X)=A(X)+B(X). The addition of polynomial coefficients herein is an addition in the finite field GF (28) as explained above. In other words, the addition of 32 bit data A and B can be obtained only performing an exclusive OR operation for each bit.
Next, the multiplication in the polynomial residual class ring is explained. Given 32 bit data C as the result of multiplying the 32 bit data A and B, as explained above, when each data is applied to the third order polynomials A(X), B(X) and C(X), the multiplication in the polynomial residue class ring is expressed as the following polynomial operation:
15 C(X)=A(X) x B(X) mod L(X) Here, L(X) is, as explained, L(X)=X~-1 and the addition and multiplication of the polynomial coefficients are calculated in the finite field GF (28). Therefore, the above equation is calculated as follows:
2o C(X)= AO x BO
+(A0 x B1+A1 x BO)xX
+ (AO x B2+A2 x BO+A1 x B 1 ) x XZ
+(A0 x B3+A1 x B2+A2 x B 1 +A3 x B0) x X3 +(AlxB3+A3xB1+A2xB2)xX4 25 +(A2 x B3+A3 x B2) xX5 +(A3xB3)xX6 (mod X4-1) a Herein, X4=1(mod X4-1) so that the above equation can be modified further as follows:
C(X)= (AO x BO+A3 x B1+A2 x B~+A1 x B3) 30 +(A1 x BO+AO x B1+A3 x BZ+A2 x B3) x X
+(A2 x BO+A1 x B1+AO x B2+A3 x B3) x X2 +(A3 x BO+A2 x B1+A1 x B2+AO x B3) x X3 -n Therefore, C can be calculated as follows:
CO=AO x BO+A3 x B1+A2 x B2+A1 x B3 C1=A1 x BO+AO x B1+A3 x B2+A2 x B3 C2=A2 x BO+A1 x B1+AO x B2+A3 x B3 C3=A3 x BO+A2 x B1+A1 x B2+AO x B3 The addition ~~+" and the multiplication ~~x" herein are operated in the finite field GF (~$).
With that, the explanation about the operations in the polynomial residue class ring and in the finite field GF (2$) is closed.
1o Then, it is now explained about a performance of the finite field polynomial multiplying unit 100.
The finite field polynomial multiplying unit 100 is a processing unit which multiplies two blocks of input data in the polynomial residue class ring with a value in the finite field GF (2$) as a coefficient. It is composed of a finite field multiplying unit 110, data splitting units 111 to 112, data adding units 113 to 115, a data integrating unit 116, and an operation controlling unit 117.
The finite field multiplying unit 110 performs multiplication in the finite field GF (2$). Each of the data splitting units 111 and 112 2o splits 32 bit input data into four blocks of data each having 8 bits.
Each of the data adding units 113 to 115 adds two input data in the finite field GF (2$). The data integrating unit 116 integrates four blocks of 8 bit data and outputs them as 32 bit data. The operation controlling unit 117 performs input control of multiplicands and multipliers inputted from the data splitting unit 111 and the data splitting unit 112 to the finite field multiplying unit 110 and output destination control of data outputted from the finite field multiplying unit 110. Hereafter, it is explained about performances of the finite field polynomial multiplying unit 100.
o The data splitting unit 111 splits the first input data with 32 bits, from a high-ordered byte, into four blocks of data having 8 bits each. Here, the four data blocks are denoted, from the high order byte, X0, Xi, Xz and X3. The data splitting unit 112 similarly splits the second input data with 32 bits, from the high-ordered byte, into four blocks of data having 8 bits each. Here, the four blocks of data are denoted, from the high-ordered byte, YO,. Y1, Y2 and Y3.
Hereafter, the operation controlling unit 117 controls input and output data when necessary and the finite field multiplying unit 110 and the data adding units 113 to 115 are calculates the bit data D0, D1, D2 and D3 according to the following equations (1) to (4).
DO=XOxYO+X3xY1+X~xY2+XlxY3 ~ ~ ~ (1) 1o D1=XlxYO+XOxY1+X3xYZ+X2xY3 ~ ~ ~
D2=X2xY0+XlxY1+XOxY2+X3xY3 ~ ~ ~ (3) D3=X3xY0+XZxY1+XlxY2+XOxY3 ~ ~ ~ (4-) Note that all of the multiplications ~~x" and the additions "+"
are operated in the finite field GF (~$). The reason why the above equations indicate the product of data X and data Y is as explained above.
It is now explained only about performances of the finite polynomial multiplying unit 100 for calculating the data D0. The data D1 to D3 are calculated by the similar performances.
2o The operation controlling unit 117 selects, as inputs to the finite field multiplying unit 110, data XO from the data XO to X3 and data YO from the 8 bit data YO to Y3. The finite field multiplying unit 110 multiplies data XO and data YO in the finite field GF (28) and outputs the multiplication result as data Z0. That is, ZO=XO ~ YO
is calculated.
Next, by similar performances, the finite field multiplying unit 110 multiplies data X3 and Y1 in the finite field GF (2$) and outputs the calculation result as data Z1. That is, 3o Z1=X3 xYi is calculated. Similarly, Z2=X2 x Y2 Z3=X1 x Y3 are calculated.
After outputting the ZO to Z3, the data adding units 113 to 115 add data ZO to Z3 in the finite field GF (2$). That is, DO=ZO+Z1+Z2+Z3 is calculated. Note that the addition in the finite field GF (28) is no other than the exclusive OR operation for each bit itself. Therefore, the above calculations equal to perform the exclusive OR operation on the data ZO to Z3 for each bit value. Similarly, the data adding to units 113 to 1i5 are obtained by calculating the following equations:
D1=XlxYO+XOxY1+X3xY2+X2xY3 D2=X2xY0+XlxY1+XOxY2+X3xY3 D3=X3xY0+X2xY1+XlxY2+XOxY3 The data integrating unit 116 connects data D0, D1, D2 and D3 from the high-ordered byte and outputs the 32 bit data D as output data of the finite field polynomial multiplying unit 100.
Next, it is explained about an internal configuration and performances of the first converter 14.
(Internal Structure of First Converter 14) 2o FIG. 5 is a diagram showing an example of the internal configuration of the first converter 14.
The first converter 14 is a processing unit which performs a predetermined conversion on the 32 bit input data X using an operation in the finite field GF (28) and outputs the 32 bit output 2~ data Y. It is composed of a data splitting unit 20, a data integrating unit 21, a constant storing unit 22 and a finite field multiplying unit 210. The data splitting unit 20 splits the 32 bit input data into four blocks of 8 bit data. The data integrating unit 21 integrates the four blocks of 8 bit data and outputs them as the 32 bit data. The 3o constant storing unit 22 stores four 8 bit constants C1 to C4. The finite field multiplying unit 210 multiplies the two blocks of 8 bit input data in the finite field GF (28) and outputs 8 bit output data.

Hereafter, it is explained about performances of the first converter 14 are explained.
The data splitting unit 20 splits the 32 bit input data, from the high-ordered byte, into blocks of data having 8 bits each. Here, 8 bit data after the split is denoted data X0, X1, X2 and X3 from the high-ordered byte. The finite field multiplying unit 210 multiplies the data XO and the 8 bit constant C1 stored in the constant storing unit 22 in the finite field GF (2$) and outputs the result as output data Y0. Similarly, the finite field multiplying unit 210 i ) 1o multiplies the data X1 and the constant C2 and outputs as data Y1, ii ) multiplies the data X2 and the constant C3 and outputs as data Y2, and iii ) multiplies the data X3 and the constant C4 and outputs as data Y3. According to the series of performances following equations are calculated:
15 YO=C1 X XO
Y1=C2 x X1 Y2=C3 X X2 Y3=C4 x X3 Note that all of the multiplications ~~x" are calculated in the finite 2o field GF (2$).
After the processing, the data integrating unit 21 connects data Y0, Y1, Y2 and Y3 from the high-ordered byte and outputs the 32 bit data Y as output data of the first converter 14.
(Internal Configuration of Second Converter 15) 25 As shown in FIG. 6, for the internal configuration of the second converter 15, the constants stored in the constant storing unit 32 C1, C2, C3 and C4 in the first converter 14 are respectively changed to C5, C6, C7 and C8 in the second converter 15.
Otherwise, other internal configurations and performances of the 3o second converter 15 are same as of the first converter 14.
Therefore, the explanations for the details are not repeated in here.
Next, with reference to FIG. 7, it is explained about the -ls-internal configurations and performances of the finite field multiplying units 110, 210 and 310.
(Internal configurations of the finite field multiplying units 110, 210 and 310) The finite field multiplying units 110, 210 and 310 have same internal configuration and perform same performance. Therefore, the performance of the finite field multiplying unit 110 is only explained in here. Whereas the multiplication method in the finite field GF (2$) is as explained above, the configuration for realizing 1o the calculation in a circuit compact in size is explained in here.
The finite field multiplying unit 110 is a processing unit which multiplies the first 8 bit input data X and the second 8 bit input data Y in the finite field GF (2$) and outputs 8 bit output data Z. It is composed of a first input controlling unit 411, a second input 15 controlling unit 414, an output controlling unit 412, a finite field doubling unit 410, a data integrating unit 413, and a data splitting unit 415.
Each of the first input controlling unit 411 and the second input controlling unit 414 performs control for selecting either one of 2o the two input data blocks and outputting the selected data block.
The finite field doubling unit 410 doubles the input data in the finite field GF (28). The data integrating unit 413 integrates two input data. The data splitting unit 415 splits the input data into a plurality of data. Hereafter, it is explained about performances of 2~ the finite field multiplying unit 110.
First, the data splitting unit 415 splits 8 bit second input data Y into one bit each from the high-ordered bit and each value is denoted Y7, Y6, ~ ~ ~ , and Y0. ~ Then, the following processes (1) to (5) are repeated in the order of i=7, 6, 5, 4, 3, 2, 1 and 0.
30 (1) The first input controlling unit 411 inputs, into the finite field doubling unit 410, an initial value=0 of the 8 bits when i=7 and inputs 3 bit data to be outputted from the output controlling unit 412 when i~7.
(2) The finite field doubling unit 410 doubles the 8 bit data inputted from the first input controlling unit 411 in the finite field GF
(2$) and inputs the 8 bit data which is the result into the data integrating unit 413.
(3) The second input controlling unit 414 inputs, into the data integrating unit 413, 8 bit constant 0 when Yi (i=7,6, ~ ~ ~ ,0) or the first input data X for other cases.
(4) The data integrating unit 413 performs exclusive OR
operation for each bit on the 8 bit data inputted from the finite field doubling unit 410 and the 8 bit data inputted from the second input controlling unit 414 and inputs the 8 bit data resulting from the operation into the output controlling unit 412.
(5) The output controlling unit 412 inputs, for given i~0, the 8 bit data inputted from the data integrating unit 413 into the first input controlling unit 411. After that, the value of i is reduced only 1 and the processing is restarted from the process (1). For given i=0, the output controlling unit 412 outputs the 8 bit data inputted from the data integrating unit 413 as output data of the finite field o multiplying unit 110. Then, the block of processes is terminated.
It is briefly explained about the reason why the multiplication of the first input data X and the second input data Y can be calculated through the above mentioned processes.
Taking values Y7, Y6, ~ ~ ~ , and YO for each bit, the second input data is denoted:
Y=Y7 x 2'+Y6 x 26+ ~ - ~ +Yi x 2'+ - - - +Y0 So, X xY=X x (Y7 x 2~+Y6 x 26+ - ~- ~ +Yi x 2'+ - ~ ~ +Y0) _( - ~ - (((((0+XxY7)x2+XxY6)x2+XxYS)x2+XxY4) 3o x2+XxY3) ~ ~ ~ )x2+XxYO
This equation is a basis of the above mentioned processes.
Next, it is explained about an internal configuration and -m -performances of the finite field doubling unit 410.
(Internal Configuration of Finite Field Doubling Unit 410) FIG. 8 is a diagram showing the internal configuration of the finite field doubling unit 410.
The finite field doubling unit 410 doubles the inputted 8 bit data X in the finite field GF (2$) and outputs the 8 bit data Y as the result. It is composed of a data splitting unit 511, a data integrating unit 512 and data integrating units 513 to 515.
The data splitting unit 511 splits the input data into data for Zo each 1 bit. The data integrating unit 512 integrates a plurality of input data into single data and outputs the integrated data. Each of the data integrating units 513 to 515 integrates two blocles of input data. Hereafter performances of the finite field doubling unit 410 are explained.
15 Firstly, the data splitting unit 511 splits the 8 bit input data X
into one bit each from the high-ordered bit and outputs as data X7, X6, ~ ~ ~ , XO from the high-ordered bit. Next, the data integrating unit 513 performs exclusive OR operation between the data X7 and data X3 and outputs the result as data Y4. The data integrating 2o unit 514 performs exclusive OR operation between the data X7 and data X2 and outputs the result as data Y3. The data integrating unit 515 performs exclusive OR operation between the data X7 and data XO and outputs the result as data Y1. Also, the data X6, X5, X4, X1 and X7 are respectively denoted data Y7, Y6, Y5, Y2 and Y0. The 25 data integrating unit 512 outputs, as output data of the finite field doubling unit 410, 8 bit data which data Y7, Y6, Y5, ~ ~ ~ , YO are integrated in this order from the high-ordered bit.
By denoting, for each bit X7, X6, ~ ~ ~ , and XO composed of the 8 bit input data X:
3o Y7=X6 Y6=X5 Y5=X4 Y4=X3 (+) X7 Y3=X2 (+) X7 Y2=X1 Y1=XO (+) X7 YO=X7 the finite field doubling unit 410 calculates values of each bit Y7, Y6, ~ ~ ~ , and YO composed of the 8 bit output data Y. The output data Y herein indicates a result of doubling the input data X in the finite field GF (2$). It is explained in the following.
1o The input data X is denoted by a following polynomial of ex whose coefficient is the value in the finite field GF (2).
X7x cu'+6x a6+ ~ ~ ~ +X1x cx+XO
Herein, doubling in the finite field GF (28) means to multiply a to the above polynomial. Therefore, X7 x ex 8 +X6 x a ~+ ~ ~ ~ +X 1 x ex 2+XO x a Here, the primitive polynomial is x8+x4+x3+x+1 so holds (x $= C1 4+ Q' 3+ Q' +1. Therefore, the above polynomial is reconstructed to, X6x c~ ~+X5x a 6+X4x a 5+(X3+X7)x c~ ~+(X2+X7)x c~ 3+X1x c~ +(XO+X7) This polynomial corresponds to:
Y7 x ~'+Y5 x cx 6+ ~ ~ ~ +Y1 x ex +Y0 Thus, the reason why the processes by the finite field doubling unit 410 are performed is explained.
The data converters 1 and 2 perform following processes on the 64 bit input data X.
(1) Split the input data X into the high-ordered 3Z bits and the low-ordered 32 bits and denote respectively data XO and X1.
(2) Calculate TO=(XO+K1)3+(X1+K2)3 and 3o T1=(XO+K3)3+(X1+K4)3. Note that the addition and multiplication herein are all calculated in the polynomial residue class ring which determines a value in the finite field GF (28) as a coefficient.

(3) Split the 3Z bits data TO into 8 bits data from the high ordered byte. The split data are respectively denoted data a0, a1, a2 and a3. Also, split the 32 bit data T1 into data blocks with 8 bits each from the high ordered byte. The split data are respectively denoted data b0, b1, b2 and b3.
(4-) Calculate GO=CixaO ~~ C2xa1 ~~ C3xa2 ~~ C4xa3 and G1=C5xb0 ~~ C6xb1 ~~ C7xb2 ~~ C8xb3 and output GO ~~ G1 as output data. Note that ° ~~ " indicates data concatenation and the above multiplications are all calculated in the finite field GF (2$).
1o As clear from the equations (1) to (4), in the multiplication in the polynomial residue class ring with a value in the finite field GF
(2$) as a coefficient, even if a part of the input data is changed, the change influences all of the output data. For example, assume that the value of data XO is changed in the equations (1) to (4). The 1~ data XO is used in all of the equations (1) to (4). Therefore, the change influences all of the output data DO to D3. The same thing applies to other values (X1 to X3, YO to Y3). Accordingly, in the present embodiment, a high probability of data confusion can be realized using the above multiplications for the converting 2o processing. Next, in the present embodiment, an exponentiation is used instead of the multiplication of two or more variables (e.g. X
x Y, X x Y x Z). This is because that, in the case of the multiplication of two or more variables, the result of the multiplication becomes always 0 if the value of any one of the variables is 0, that is, that 25 there are many combinations of the value of input variables which lead the value of the multiplication result 0. Thus, a good confusion probability is not shown. On the other hand, in the case of the exponentiation, the calculation result only becomes 0 when the value of the input variable is 0. Therefore, a high probability of 3o data is guaranteed without lowering the probability of data confusion as described above.
Furthermore, in the present embodiment, the calculation raised to cube is used. This results in the following reasons. First, when given a conversion such as Y=X~ using the calculation in square, an output value for the input value ~ is a z. Next, an output value when a difference D is added to the input value c~ is (cx+~)~=c~2+c~x0+OXCx+D2. Here, cxx0=Oxa and c~x~+
cx x0=Q (both are obvious from the calculation method in the finite field GF (2.8)). So, ( a +0)2= ex Z+02. Therefore, a change value of the output value by adding the difference O to the input value is D Z. That is, the change value of the output value become a 1o constant output change value ~z regardless of the input value a so that it is not a preferred characteristic in terms of the data confusion. Consequently, it is necessary to use exponentiation at least in the cube or more. In the present embodiment, the exponentiation in cube is used since a converting processing load 1~ becomes higher as the exponentiation processing is more as the exponent is higher. Herein, (a+0)3=(a+~)x(a~+0)x(c~+D) =(ex2+lx~c~+~xC~+L~2)x(CY+~) _((X2+OZ)x(CY+0) = Q' 3 +0 >C C~ 2 +~ ~ X (X +0 3 Therefore, in the case of the cubing operation, the output difference is not constant regardless of the input value ~ as in the squaring operation. Note that in the case where the exponent N for exponentiation is N=2~' (k is an integer of 1 or more), the output 25 value is ( a +~)~(2k )= a ~(2k )+~~(Zk ), being obtained by adding the input difference D to the input value a in exponentiation XN as the data converting processing. The following explains about that the output value becomes constant regardless of the input value.
Here, "X~ a " indicates X raised to the c~ th exponent.
3o When k=1, the exponent=2, therefore the output value based on the above explanation is (cr+D)2=cx2+/~2. Next, when k=m and the exponent=2m, if ( c~ +0)~(2m)= a ~(Z"')+L~"(2m) is hold, ( c~ +

p )~(~m+1)=~( a + p )~(~m)~~=~ a ~(~m)+ p ~ ~ 2m ) ~Z= ~ -(2m+1)+ p ~(~m+1) is hold. Therefore, the above equation is hold when k=m+1.
Accordingly, it is indicated that, by the mathematical induction, for an arbitral integer k which is one or larger, the equation ( a +
p)~(2k)= cx~(2k)+p~(~k) is hold. Consequently, it is shown that the exponent can be a value other than 2k (k is an integer of 1 or larger).
That is, whereas 3 is used of the exponent in the present embodiment, the value may be the value of 3 or larger other than 2~' (k is an integer of 1 or larger) unless it does not mind to take some 1o time for the processing in the data converter.
Also, in the present embodiment, an addition (exclusive OR
operation) by a constant K is calculated before the exponentiation such as (X+K)3. Here, by changing the constant K, many variations can be given to the converting processing in the data converter. For 1~ example, different converting processing can be used for authenticating each subject to be authenticated by using different constant K depending on the subject to be authenticated.
Herein, when the value of (X+K)3 is 0 is only when X=Y.
Therefore, a merit of guaranteeing high probability of data confusion 2o is not lost by using the exponentiation as described.
Also, in the present embodiment, the same exponentiation in cube is performed on four data blocks of AO to A3. However, it is not necessary to be in the same exponent but the exponent may be different from one another.
2~ Further, the data converter according to the present embodiment uses an operation processing in the finite field GF (2$) for the processing which becomes a core for the data confusion.
Therefore, a circuit can be shared with the operation circuit in the finite field GF (z8), being used for the error-correcting code circuit so such as Reed-Solomon codes and Bose-Chaudhuri-Hocquenghem (BCH) codes. As the consequence, an implementation size in an appliance as a whole can be reduced and the appliance implementation in a compact circuit size is realized.
Note that each data size of the present invention is just an example and it can be beyond the data size. Also, the primitive polynomial and the residue polynomial according to the present embodiment are just examples. Therefore, the size is not limited to this.
Furthermore, the present embodiment describes about the case where the data converter is used in the authentication system.
However, the data converter of the present embodiment can be used unless it uses a secret data converter. As other applied examples of using the data converter is that, for example, it can be applied to a content distribution system as shown in FIG. 9. The content distribution system is composed on a content distribution device 7 which distributes encrypted content via broadcasting or a network, and a reproduction device 8 which receives, decodes and reproduces the distributed encrypted content. The content distribution device 7 converts key seed data (data to be a seed for generating a content key) in the data converter 70 and generates the content key. The content encryption device 71 then encrypts the content data in 2o plaintext and generates the encrypted content data. After the above processing, the content distribution device 7 sends the key seed data and the encrypted content data to the reproduction device 8. The reproduction device 8 which received the data firstly, in the data converter 8, converts the key seed data and generates the 25 content key. Then, the content decoding unit 81 decodes the encrypted content data and obtains the content in plaintext. Only the reproduction device allowed to reproduce the content can prevent the content reproduction by an illegal reproduction device by mounting the same data converter which the content distribution 3o device has.
Also, in the present embodiment, whereas fixed values K1 to K4 for integrating data in the data integration units 11a to iid are previously fixed values, these fixed values may be inputted from outside of the data converter so that a user can freely set the values.
Further, the constants C1 to C4 are also previously fixed values to be stored in the constant storing unit 22. However, these values may be also inputted from outside of the data converter so that the user can freely set the values.
Furthermore in the present embodiment, whereas the finite field GF (28) is used as a finite field, other finite fields may be applied. For example, it may be the finite field GF (2") (n is a 1o natural number).
Note that each functional block in the block diagrams (FIG. 2 etc.) is typically realized as an LSI which is an integrated circuit. It may be separately constructed as one chip or may be constructed as one chip including a part or the whole of the integrated circuit.
FIG. 10 is an outside drawing of the LSI of the error correction/data converter ~ including a data converter having a similar function as that of the data converter shown in FIG. 2. FIG.
11 is a functional block diagram showing a configuration of the LSI
of the error correction/data converter.
2o As shown in FIG. 11, the error correction/data converter 600 is an apparatus which performs data conversion after performing error correction coding on the data. It has a Reed-Solomon error correction coding unit 601 and a data converter 604.
The Reed-Solomon error correction coding unit 601 is a processing unit which performs Reed-Solomon error correction coding on the inputted data and output the coded data. It has a data receiving unit 602 and a coding unit 603. The data receiving unit 602 is a processing unit operable to receive data to be inputted from outside. The coding unit 603 is a processing unit which, o responding to the data receiving unit 602, performs the Reed-Solomon error correction coding by performing the multiplication in the finite field GF (2") on the data received at the data receiving unit 602. The coding unit 603 has a finite field multiplying unit 110 which performs multiplication in the finite field GF (2") on the data. A configuration of the finite field multiplying unit 110 is as described above.
While the data converter 604 has a configuration similar to that of the data converter 1(2), it uses a finite field polynomial multiplying unit 605 in place of the finite field polynomial multiplying unit 100, a first converter 606 in place of the first converter 14, and a second converter 607 in place of the second 1o converter 15. The finite field polynomial multiplying unit 605 differs from the finite field polynomial multiplying unit 100 in that it performs multiplication in the finite field GF (2~) using the finite field polynomial multiplying unit 110 set in the coding unit 603. Other configurations of the finite field polynomial multiplying unit 605 are 15 same as_ those of the finite field polynomial multiplying unit 110.
The first converter 606 differs from the first converter 14 in that it performs multiplication in the finite field GF (2") using the finite field multiplying unit 110 set in the coding unit 603. Other configurations of the first converter 606 are same as those of the 2o first converter 14. The second converter 607 differs from the second converter 15 in that it performs multiplication in the finite field GF (2") using the finite field multiplying unit 110 set in the coding unit 603. Other configurations of the second converter 607 are same as those of the second converter 15.
25 Accordingly, the Reed-Solomon error correction coding unit 601 and the data converter 604 can share the finite field multiplying unit 110. Therefore, a circuit scale of the LSI can be reduced.
Here, the error correction/data converter 600 is realized by the LSI. However, it may be called as IC, system LSI, super LSI and o ultra LSI depending on the difference of the integration density.
In addition, a method of constructing the integrated circuit is not limited to the LSI. It can be realized by a special circuit or a - 2s -general processor. A Field Programmable Gate Array (FPGA) capable of programming and a re configurable processor capable of reconfiguring a connection and a setting of the circuit cell inside the LSI after manufacturing the LSI may be used.
Furthermore, if a technique of constructing the integrated circuit which can be replaced of the LSI according to the development of the semiconductor technology and an emerging technology is introduced, the functional block may be of course integrated using the newly introduced technique. As another to technology, it is possible that a biotechnology and the like may be used.
Although only an exemplary embodiment of this invention has been described in detail above, those skilled in the art will readily appreciate that many modifications are possible in the exemplary 15 embodiment without materially departing from the novel teachings and advantages of this invention. Accordingly, all such modifications are intended to be included within the scope of this i nvention.
2o Industrial Applicability The data converter according to the present invention can reduce a scale of a circuit as a whole including a data converter by sharing a data conversion with an error correction coding circuit.
Therefore, for example, it is useful for an apparatus having a 25 function of authenticating a communicating partner via a communication channel. Also, not only limited to this example, this invention applies to any apparatuses unless they need to mount any kind of a data conversion circuit.

Claims (16)

1. A data converter comprising:
a splitting unit operable to split input data into a plurality of data blocks;
a conversion performing unit operable to perform conversion on each one of the plurality of data blocks, the conversion being based on an exponentiation to a predetermined exponent in a polynomial residue class ring with a value in a finite field GF (2"), the n being a natural number, as a coefficient; and an output data generating unit operable to generate output data based on the plurality of data blocks converted by the conversion performing unit, wherein the predetermined exponent is a value that is 3 or larger and other than 2m, the m being an integer which is 1 or larger.
2. The data converter according to Claim 1, further comprising a finite field multiplying unit operable to perform multiplication in the finite field GF (2n), wherein the conversion performing unit performs exponentiation using the finite field multiplying unit.
3. The data converter according to Claim 1, wherein the conversion performing unit includes:
an adding subunit operable to add, in the polynomial residue class ring, a predetermined constant and each one of the plurality of data blocks split by the splitting unit, the predetermined constant being the same or variable depending on said each data block; and a conversion performing subunit operable to perform conversion on said each one of the plurality of data blocks to which the constant is added by the adding subunit, the conversion being based on the exponentiation to the predetermined exponent in the polynomial residue class ring.
4. The data converter according to Claim 1, wherein the output data generating unit includes:
an adding subunit operable to perform addition in the polynomial residue class ring among the plurality of data blocks converted by the conversion performing unit; and a multiplying subunit operable to multiply, in the finite field GF (2n), a result of the addition by the adding subunit by a predetermined constant.
5. The data converter according to Claim 4, further comprising a finite field multiplying unit operable to perform multiplication in the finite field GF (2n), wherein the conversion performing unit performs exponentiation using the finite field multiplying unit, and the multiplying subunit performs multiplication using the finite field multiplying unit.
6. A data conversion method comprising:
splitting input data into a plurality of data blocks;
performing conversion on each one of the plurality of data blocks, the conversion being based on an exponentiation by a predetermined exponent in a polynomial residue class ring with a value in a finite field GF (2n), the n being a natural number, as a coefficient; and generating output data based on the plurality of data blocks converted by the conversion performance, wherein the predetermined exponent is a value that is 3 or larger and except 2m, the m being an integer which is 1 or larger.
7. The data conversion method according to Claim 6, wherein in the conversion performance, the exponentiation is performed using a finite field multiplying unit operable to perform multiplication in the finite field GF (2n).
8. The data conversion method according to Claim 6, wherein the conversion performance includes:
adding, in the polynomial residue class ring, a predetermined constant and each one of the plurality of split data blocks, the predetermined constant being the same or variable depending on said each data block; and performing conversion on said each one of the plurality of data blocks to which the constant is added by the addition, the conversion being based on an exponentiation to a predetermined exponent in the polynomial residue class ring.
9. The data conversion method according to Claim 6, wherein the output data generation includes:
performing addition in the polynomial residue class ring among the plurality of data blocks converted by the conversion performance; and multiplying, in the finite field GF (2n), a result of the addition by a predetermined constant.
10. The data conversion method according to Claim 9, wherein in the conversion performance, the exponentiation is performed using a finite field multiplying unit operable to perform multiplication in the finite field GF (2n); and in the multiplication, the multiplication is performed using the finite field multiplying unit operable to perform multiplication in the finite field GF (2n).
11. An integrated circuit comprising:
a finite field multiplying unit operable to perform multiplication in a finite field GF (2n), the n being a natural number;

an error-correction coding unit operable to perform error-correction coding on input data by performing multiplication in the finite field GF (2n) using the finite field multiplying unit;
a splitting unit operable to split the input data into a plurality of data blocks;
a conversion performing unit operable to perform conversion on each one of the plurality of data blocks, the conversion being based on an exponentiation to a predetermined exponent in a polynomial residue class ring with a value in the finite field GF (2n) as a coefficient; and generating output data unit based on the plurality of data blocks converted by the conversion performing unit, wherein the predetermined exponent is a value that is 3 or larger and other than 2m, the m being an integer that is 1 or larger.
12. The integrated circuit according to Claim 11, wherein the conversion performing unit includes:
an adding subunit operable to add, in the polynomial residue class ring, a predetermined constant and each one of the plurality of data blocks split by the splitting unit, the predetermined constant being the same or variable depending on said each data block; and a conversion performing subunit operable to perform conversion, using the finite field multiplying unit, on said each one of the plurality of data blocks to which the constant is added by the adding subunit, the conversion being based on the exponentiation to a predetermined exponent in the polynomial residue class ring.
13. The integrated circuit according to Claim 11, wherein the output data generating unit includes:
an adding subunit operable to perform addition in the polynomial residue class ring among the plurality of data blocks converted by the conversion performing unit; and a multiplying subunit operable to multiply, in the finite field GF (2n), the result of the addition by the adding subunit by a predetermined constant using the finite field multiplying unit.
14. A program that causes a computer to execute:
splitting input data into a plurality of data blocks;
performing conversion on each one of the plurality of data blocks using a finite field multiplying unit operable to perform multiplication in a finite field GF (2n), the n being a natural number, the conversion being based on an exponentiation to a predetermined exponent in a polynomial residue class ring with a value in the finite field GF (2n) as a coefficient; and generating output data based on the plurality of data blocks converted by the conversion performance, wherein the predetermined exponent is a value that is 3 or larger and other than 2m, the m being an integer which is 1 or larger.
15. The program according to Claim 14, wherein the conversion performance includes:
adding, in the polynomial residue class ring, a predetermined constant and each one of the plurality of the split data blocks, the predetermined constant being the same or variable depending on said each data block; and performing conversion on said each one of the plurality of data blocks added by the addition using the finite field multiplying unit, the conversion being based on an exponentiation to a predetermined exponent in the polynomial residue class ring.
16. The program according to Claim 14, wherein the output data generation includes:
performing addition in the polynomial residue class ring among the plurality of data blocks converted by the conversion performance; and multiplying, in the finite field GF (2n), a result of the addition by a predetermined constant using the finite field multiplying unit.
CA2535741A 2003-10-14 2004-09-28 Data converter and method thereof Active CA2535741C (en)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
JP2003-353439 2003-10-14
JP2003353439 2003-10-14
PCT/JP2004/014570 WO2005036811A2 (en) 2003-10-14 2004-09-28 Data converter

Publications (2)

Publication Number Publication Date
CA2535741A1 true CA2535741A1 (en) 2005-04-21
CA2535741C CA2535741C (en) 2015-11-10

Family

ID=34431158

Family Applications (1)

Application Number Title Priority Date Filing Date
CA2535741A Active CA2535741C (en) 2003-10-14 2004-09-28 Data converter and method thereof

Country Status (11)

Country Link
US (2) US6995692B2 (en)
EP (1) EP1673690B1 (en)
KR (1) KR101103443B1 (en)
CN (1) CN100555213C (en)
AT (1) ATE479142T1 (en)
AU (1) AU2004306594B2 (en)
CA (1) CA2535741C (en)
DE (1) DE602004028849D1 (en)
MY (1) MY142578A (en)
TW (1) TWI353764B (en)
WO (1) WO2005036811A2 (en)

Families Citing this family (40)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6307487B1 (en) 1998-09-23 2001-10-23 Digital Fountain, Inc. Information additive code generator and decoder for communication systems
US7068729B2 (en) * 2001-12-21 2006-06-27 Digital Fountain, Inc. Multi-stage code generator and decoder for communication systems
US9240810B2 (en) * 2002-06-11 2016-01-19 Digital Fountain, Inc. Systems and processes for decoding chain reaction codes through inactivation
ES2443823T3 (en) * 2002-06-11 2014-02-20 Digital Fountain, Inc. Decoding chain reaction codes by inactivation
EP2348640B1 (en) 2002-10-05 2020-07-15 QUALCOMM Incorporated Systematic encoding of chain reaction codes
US7139960B2 (en) 2003-10-06 2006-11-21 Digital Fountain, Inc. Error-correcting multi-stage code generator and decoder for communication systems having single transmitters or multiple transmitters
WO2005112250A2 (en) 2004-05-07 2005-11-24 Digital Fountain, Inc. File download and streaming system
US7870399B2 (en) * 2006-02-10 2011-01-11 Arxan Defense Systems Software trusted platform module and application security wrapper
US9136983B2 (en) 2006-02-13 2015-09-15 Digital Fountain, Inc. Streaming and buffering using variable FEC overhead and protection periods
US9270414B2 (en) * 2006-02-21 2016-02-23 Digital Fountain, Inc. Multiple-field based code generator and decoder for communications systems
WO2007134196A2 (en) 2006-05-10 2007-11-22 Digital Fountain, Inc. Code generator and decoder using hybrid codes
US9419749B2 (en) 2009-08-19 2016-08-16 Qualcomm Incorporated Methods and apparatus employing FEC codes with permanent inactivation of symbols for encoding and decoding processes
US9380096B2 (en) 2006-06-09 2016-06-28 Qualcomm Incorporated Enhanced block-request streaming system for handling low-latency streaming
US9178535B2 (en) * 2006-06-09 2015-11-03 Digital Fountain, Inc. Dynamic stream interleaving and sub-stream based delivery
US20100211690A1 (en) * 2009-02-13 2010-08-19 Digital Fountain, Inc. Block partitioning for a data stream
US9386064B2 (en) * 2006-06-09 2016-07-05 Qualcomm Incorporated Enhanced block-request streaming using URL templates and construction rules
US9432433B2 (en) 2006-06-09 2016-08-30 Qualcomm Incorporated Enhanced block-request streaming system using signaling or block creation
US9209934B2 (en) 2006-06-09 2015-12-08 Qualcomm Incorporated Enhanced block-request streaming using cooperative parallel HTTP and forward error correction
CN101802797B (en) * 2007-09-12 2013-07-17 数字方敦股份有限公司 Generating and communicating source identification information to enable reliable communications
JP4649456B2 (en) * 2007-09-26 2011-03-09 株式会社東芝 Power calculation apparatus, power calculation method and program
US9281847B2 (en) * 2009-02-27 2016-03-08 Qualcomm Incorporated Mobile reception of digital video broadcasting—terrestrial services
US9288010B2 (en) 2009-08-19 2016-03-15 Qualcomm Incorporated Universal file delivery methods for providing unequal error protection and bundled file delivery services
US20110096828A1 (en) * 2009-09-22 2011-04-28 Qualcomm Incorporated Enhanced block-request streaming using scalable encoding
US9917874B2 (en) 2009-09-22 2018-03-13 Qualcomm Incorporated Enhanced block-request streaming using block partitioning or request controls for improved client-side handling
US9225961B2 (en) 2010-05-13 2015-12-29 Qualcomm Incorporated Frame packing for asymmetric stereo video
US9596447B2 (en) 2010-07-21 2017-03-14 Qualcomm Incorporated Providing frame packing type information for video coding
US9456015B2 (en) 2010-08-10 2016-09-27 Qualcomm Incorporated Representation groups for network streaming of coded multimedia data
US8958375B2 (en) 2011-02-11 2015-02-17 Qualcomm Incorporated Framing for an improved radio link protocol including FEC
US9270299B2 (en) 2011-02-11 2016-02-23 Qualcomm Incorporated Encoding and decoding using elastic codes with flexible source block mapping
US9253233B2 (en) 2011-08-31 2016-02-02 Qualcomm Incorporated Switch signaling methods providing improved switching between representations for adaptive HTTP streaming
CN102314330B (en) * 2011-09-09 2013-12-25 华南理工大学 Composite finite field multiplier
US9843844B2 (en) 2011-10-05 2017-12-12 Qualcomm Incorporated Network streaming of media data
US9294226B2 (en) 2012-03-26 2016-03-22 Qualcomm Incorporated Universal object delivery and template-based file delivery
US10496372B2 (en) * 2014-09-30 2019-12-03 Koninklijke Philips N.V. Electronic calculating device for performing obfuscated arithmetic
KR102359265B1 (en) * 2015-09-18 2022-02-07 삼성전자주식회사 Processing apparatus and method for performing operation thereof
CN106445464B (en) * 2016-10-13 2019-04-02 深圳职业技术学院 A kind of compound Galois field multiplier based on model aroused in interest
KR102296742B1 (en) * 2016-11-18 2021-09-03 삼성전자 주식회사 Component for provisioning of security data and product including the same
US11210678B2 (en) * 2016-11-18 2021-12-28 Samsung Electronics Co., Ltd. Component for provisioning security data and product including the same
CN106951210B (en) * 2017-03-21 2020-09-29 深圳职业技术学院 Finite field multiplication device based on cardiac array
CN108733347B (en) * 2017-04-20 2021-01-29 杭州海康威视数字技术股份有限公司 Data processing method and device

Family Cites Families (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5220568A (en) * 1988-05-31 1993-06-15 Eastman Kodak Company Shift correcting code for channel encoded data
US5532694A (en) * 1989-01-13 1996-07-02 Stac Electronics, Inc. Data compression apparatus and method using matching string searching and Huffman encoding
JPH09185518A (en) * 1995-12-28 1997-07-15 Toshiba Corp System and device for generating power of source element alpha
JP3525209B2 (en) * 1996-04-05 2004-05-10 株式会社 沖マイクロデザイン Power-residue operation circuit, power-residue operation system, and operation method for power-residue operation
US6038581A (en) * 1997-01-29 2000-03-14 Nippon Telegraph And Telephone Corporation Scheme for arithmetic operations in finite field and group operations over elliptic curves realizing improved computational speed
US6320520B1 (en) * 1998-09-23 2001-11-20 Digital Fountain Information additive group code generator and decoder for communications systems
JP2000321979A (en) 1999-05-14 2000-11-24 Matsushita Electric Ind Co Ltd Polynomial arithmetic device, device for calculating order of elliptic curve, device for generating elliptic curve, and cryptographic system for elliptic curve
US6343305B1 (en) * 1999-09-14 2002-01-29 The State Of Oregon Acting By And Through The State Board Of Higher Education On Behalf Of Oregon State University Methods and apparatus for multiplication in a galois field GF (2m), encoders and decoders using same
DE10024325B4 (en) * 2000-05-17 2005-12-15 Giesecke & Devrient Gmbh Cryptographic method and cryptographic device
US6411223B1 (en) * 2000-10-18 2002-06-25 Digital Fountain, Inc. Generating high weight encoding symbols using a basis
EP1217750A2 (en) * 2000-12-15 2002-06-26 Alcatel USA Sourcing, L.P. Optimized parallel in parallel out GF(2M) squarer for FEC decoder
US6831574B1 (en) * 2003-10-03 2004-12-14 Bae Systems Information And Electronic Systems Integration Inc Multi-turbo multi-user detector
US7243289B1 (en) * 2003-01-25 2007-07-10 Novell, Inc. Method and system for efficiently computing cyclic redundancy checks
US6771197B1 (en) * 2003-09-26 2004-08-03 Mitsubishi Electric Research Laboratories, Inc. Quantizing signals using sparse generator factor graph codes

Also Published As

Publication number Publication date
TW200518546A (en) 2005-06-01
KR20070018778A (en) 2007-02-14
MY142578A (en) 2010-12-15
US20050089161A1 (en) 2005-04-28
KR101103443B1 (en) 2012-01-09
TWI353764B (en) 2011-12-01
WO2005036811A3 (en) 2005-06-02
AU2004306594B2 (en) 2010-05-20
EP1673690B1 (en) 2010-08-25
ATE479142T1 (en) 2010-09-15
DE602004028849D1 (en) 2010-10-07
CN1867889A (en) 2006-11-22
EP1673690A2 (en) 2006-06-28
USRE40710E1 (en) 2009-05-12
CN100555213C (en) 2009-10-28
WO2005036811A2 (en) 2005-04-21
US6995692B2 (en) 2006-02-07
AU2004306594A1 (en) 2005-04-21
CA2535741C (en) 2015-11-10

Similar Documents

Publication Publication Date Title
CA2535741C (en) Data converter and method thereof
JP6406350B2 (en) Cryptographic processing apparatus, cryptographic processing method, and program
CN106233660B (en) Encryption processing device, encryption processing method, and program
AU4105801A (en) Block encryption device using auxiliary conversion
KR100800468B1 (en) Hardware cryptographic engine and method improving power consumption and operation speed
US8122075B2 (en) Pseudorandom number generator and encryption device using the same
WO2015146430A1 (en) Encryption processing device, and encryption processing method and program
JP2010245881A (en) Cipher processor
EP0996250A2 (en) Efficient block cipher method
EP1059760A1 (en) Method for the block-encryption of discrete data
JP4851077B2 (en) Data conversion apparatus and method
US20020114449A1 (en) Modular multiplier and an encryption/decryption processor using the modular multiplier
WO2015146432A1 (en) Cryptographic processing device, method for cryptographic processing, and program
JP3473171B2 (en) Sequential encryption
Fournaris et al. VLSI architecture and FPGA implementation of ICE encryption algorithm
Melnyk et al. Modelling DES Soft-Cores for information protection
Banik et al. Efficient and Secure Encryption for FPGAs in the Cloud
Sampath FPGA based hardware implementation of Advanced Encryption Standard
CN116488806A (en) Key encapsulation method, device, equipment and storage medium
JP2008107656A (en) Encrypting apparatus and authentication apparatus
Sugawara et al. A high-performance ASIC implementation of the 64-bit block cipher CAST-128
Tummalapalli et al. Implementation of Low Power RC5 Algorithm in XILINX FPGA
Kitsos System-on-Chip Design of the Whirlpool Hash Function
Chapter System-on-Chip Design of the Whirlpool Hash Function
JPS59144235A (en) Cipher arithmetic circuit

Legal Events

Date Code Title Description
EEER Examination request