CN100393029C - 在使用密钥密码学算法的电子元件中的防范方法 - Google Patents
在使用密钥密码学算法的电子元件中的防范方法 Download PDFInfo
- Publication number
- CN100393029C CN100393029C CNB008063486A CN00806348A CN100393029C CN 100393029 C CN100393029 C CN 100393029C CN B008063486 A CNB008063486 A CN B008063486A CN 00806348 A CN00806348 A CN 00806348A CN 100393029 C CN100393029 C CN 100393029C
- Authority
- CN
- China
- Prior art keywords
- random
- data item
- key
- prevention method
- opn
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Lifetime
Links
- 238000000034 method Methods 0.000 title claims abstract description 64
- 230000004087 circulation Effects 0.000 claims description 45
- 230000002265 prevention Effects 0.000 claims description 40
- 238000012545 processing Methods 0.000 claims description 7
- 230000006835 compression Effects 0.000 claims description 5
- 238000007906 compression Methods 0.000 claims description 5
- 238000004458 analytical method Methods 0.000 claims description 4
- 238000013478 data encryption standard Methods 0.000 description 30
- 208000019585 progressive encephalomyelitis with rigidity and myoclonus Diseases 0.000 description 27
- 238000004364 calculation method Methods 0.000 description 4
- 230000006870 function Effects 0.000 description 4
- 230000008569 process Effects 0.000 description 4
- 230000008859 change Effects 0.000 description 3
- 238000000605 extraction Methods 0.000 description 2
- 238000012935 Averaging Methods 0.000 description 1
- 241000233805 Phoenix Species 0.000 description 1
- 230000009471 action Effects 0.000 description 1
- 230000015572 biosynthetic process Effects 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 238000002474 experimental method Methods 0.000 description 1
- 230000008676 import Effects 0.000 description 1
- 238000006386 neutralization reaction Methods 0.000 description 1
- 238000007634 remodeling Methods 0.000 description 1
- 238000012552 review Methods 0.000 description 1
- 230000009291 secondary effect Effects 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0618—Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
- H04L9/0625—Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation with splitting of the data block into left and right halves, e.g. Feistel based algorithms, DES, FEAL, IDEA or KASUMI
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/75—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information by inhibiting the analysis of circuitry or operation
- G06F21/755—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information by inhibiting the analysis of circuitry or operation with measures against power attack
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/002—Countermeasures against attacks on cryptographic mechanisms
- H04L9/003—Countermeasures against attacks on cryptographic mechanisms for power analysis, e.g. differential power analysis [DPA] or simple power analysis [SPA]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2207/00—Indexing scheme relating to methods or arrangements for processing data by operating upon the order or content of the data handled
- G06F2207/72—Indexing scheme relating to groups G06F7/72 - G06F7/729
- G06F2207/7219—Countermeasures against side channel or fault attacks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/08—Randomization, e.g. dummy operations or using noise
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Physics & Mathematics (AREA)
- Computer Hardware Design (AREA)
- Theoretical Computer Science (AREA)
- Mathematical Physics (AREA)
- Software Systems (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Storage Device Security (AREA)
Abstract
Description
Claims (9)
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
FR99/01937 | 1999-02-17 | ||
FR9901937A FR2789776B1 (fr) | 1999-02-17 | 1999-02-17 | Procede de contre-mesure dans un composant electronique mettant en oeuvre un algorithme de cryptographie a cle secrete |
Publications (2)
Publication Number | Publication Date |
---|---|
CN1630999A CN1630999A (zh) | 2005-06-22 |
CN100393029C true CN100393029C (zh) | 2008-06-04 |
Family
ID=9542146
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CNB008063486A Expired - Lifetime CN100393029C (zh) | 1999-02-17 | 2000-01-20 | 在使用密钥密码学算法的电子元件中的防范方法 |
Country Status (10)
Country | Link |
---|---|
US (1) | US7471791B1 (zh) |
EP (1) | EP1198921B1 (zh) |
JP (1) | JP2002540654A (zh) |
CN (1) | CN100393029C (zh) |
AU (1) | AU3057500A (zh) |
DE (1) | DE60027163T2 (zh) |
ES (1) | ES2262502T3 (zh) |
FR (1) | FR2789776B1 (zh) |
MX (1) | MXPA01008201A (zh) |
WO (1) | WO2000049765A2 (zh) |
Families Citing this family (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2000305453A (ja) * | 1999-04-21 | 2000-11-02 | Nec Corp | 暗号化装置,復号装置,および暗号化・復号装置 |
JP2002247025A (ja) * | 2001-02-22 | 2002-08-30 | Hitachi Ltd | 情報処理装置 |
JP4596686B2 (ja) | 2001-06-13 | 2010-12-08 | 富士通株式会社 | Dpaに対して安全な暗号化 |
JP4589327B2 (ja) | 2004-07-07 | 2010-12-01 | 三菱電機株式会社 | 電子素子及びデータ処理方法 |
FR2916317B1 (fr) * | 2007-05-15 | 2009-08-07 | Sagem Defense Securite | Protection d'execution d'un calcul cryptographique |
FR2925968B1 (fr) * | 2007-12-26 | 2011-06-03 | Ingenico Sa | Procede de securisation d'un microprocesseur, programme d'ordinateur et dispositif correspondants |
US9208333B2 (en) | 2010-03-31 | 2015-12-08 | British Telecommunications Public Limited Company | Secure data recorder |
DE102010028375A1 (de) * | 2010-04-29 | 2011-11-03 | Robert Bosch Gmbh | Schutz vor kryptoanalytischen Seitenkanalattacken |
CN102110206B (zh) * | 2010-12-27 | 2013-01-16 | 北京握奇数据***有限公司 | 防御攻击的方法和具有攻击防御功能的装置 |
CN103546281B (zh) * | 2013-10-31 | 2016-08-17 | 厦门市美亚柏科信息股份有限公司 | 动态的密钥生成方法和装置 |
US20150222421A1 (en) * | 2014-02-03 | 2015-08-06 | Qualcomm Incorporated | Countermeasures against side-channel attacks on cryptographic algorithms |
FR3056789B1 (fr) * | 2016-09-27 | 2018-09-21 | Safran Identity & Security | Procede de chiffrement ou de dechiffrement symetrique par bloc |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
FR2672402A1 (fr) * | 1991-02-05 | 1992-08-07 | Gemplus Card Int | Procede et dispositif pour la generation de nombres pseudo-aleatoires uniques. |
US5764766A (en) * | 1996-06-11 | 1998-06-09 | Digital Equipment Corporation | System and method for generation of one-time encryption keys for data communications and a computer program product for implementing the same |
Family Cites Families (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
FR2650457A1 (fr) * | 1989-07-25 | 1991-02-01 | Trt Telecom Radio Electr | Procede de traitement de donnees par compression et permutation pour carte a microcircuit |
FR2650458B1 (fr) * | 1989-07-25 | 1991-10-11 | Trt Telecom Radio Electr | Procede de traitement d'une permutation irreguliere de donnees protegees par chiffrement |
US5550809A (en) * | 1992-04-10 | 1996-08-27 | Ericsson Ge Mobile Communications, Inc. | Multiple access coding using bent sequences for mobile radio communications |
US5625690A (en) * | 1993-11-15 | 1997-04-29 | Lucent Technologies Inc. | Software pay per use system |
US5870470A (en) * | 1996-02-20 | 1999-02-09 | International Business Machines Corporation | Method and apparatus for encrypting long blocks using a short-block encryption procedure |
FR2776445A1 (fr) * | 1998-03-17 | 1999-09-24 | Schlumberger Ind Sa | Procede de securisation de donnees mettant en oeuvre un algorithme cryptographique |
DE69938045T2 (de) * | 1998-06-03 | 2009-01-15 | Cryptography Research Inc., San Francisco | Verwendung von unvorhersagbarer Information zur Leckminimierung von Chipkarten und anderen Kryptosystemen |
EP1090480B1 (en) * | 1998-06-03 | 2019-01-09 | Cryptography Research, Inc. | Improved des and other cryptographic processes with leak minimization for smartcards and other cryptosystems |
JP3600454B2 (ja) * | 1998-08-20 | 2004-12-15 | 株式会社東芝 | 暗号化・復号装置、暗号化・復号方法、およびそのプログラム記憶媒体 |
JP4317607B2 (ja) * | 1998-12-14 | 2009-08-19 | 株式会社日立製作所 | 情報処理装置、耐タンパ処理装置 |
-
1999
- 1999-02-17 FR FR9901937A patent/FR2789776B1/fr not_active Expired - Fee Related
-
2000
- 2000-01-20 US US09/913,884 patent/US7471791B1/en not_active Expired - Fee Related
- 2000-01-20 JP JP2000600393A patent/JP2002540654A/ja not_active Abandoned
- 2000-01-20 CN CNB008063486A patent/CN100393029C/zh not_active Expired - Lifetime
- 2000-01-20 MX MXPA01008201A patent/MXPA01008201A/es active IP Right Grant
- 2000-01-20 ES ES00900632T patent/ES2262502T3/es not_active Expired - Lifetime
- 2000-01-20 EP EP00900632A patent/EP1198921B1/fr not_active Expired - Lifetime
- 2000-01-20 WO PCT/FR2000/000130 patent/WO2000049765A2/fr active IP Right Grant
- 2000-01-20 DE DE60027163T patent/DE60027163T2/de not_active Expired - Lifetime
- 2000-01-20 AU AU30575/00A patent/AU3057500A/en not_active Abandoned
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
FR2672402A1 (fr) * | 1991-02-05 | 1992-08-07 | Gemplus Card Int | Procede et dispositif pour la generation de nombres pseudo-aleatoires uniques. |
US5764766A (en) * | 1996-06-11 | 1998-06-09 | Digital Equipment Corporation | System and method for generation of one-time encryption keys for data communications and a computer program product for implementing the same |
Non-Patent Citations (2)
Title |
---|
METHOD FOR OBTAINING CRYPTOGRAPHICALLYSTRONG 8X8 S-BOXES. YI X ET AL.IEEE TELECOMMUNICATIONS CONFERENCE. 1997 |
METHOD FOR OBTAINING CRYPTOGRAPHICALLYSTRONG 8X8 S-BOXES. YI X ET AL.IEEE TELECOMMUNICATIONS CONFERENCE. 1997 * |
Also Published As
Publication number | Publication date |
---|---|
CN1630999A (zh) | 2005-06-22 |
FR2789776A1 (fr) | 2000-08-18 |
EP1198921A2 (fr) | 2002-04-24 |
EP1198921B1 (fr) | 2006-04-05 |
FR2789776B1 (fr) | 2001-04-06 |
AU3057500A (en) | 2000-09-04 |
DE60027163T2 (de) | 2007-03-29 |
ES2262502T3 (es) | 2006-12-01 |
US7471791B1 (en) | 2008-12-30 |
WO2000049765A3 (fr) | 2002-02-28 |
DE60027163D1 (de) | 2006-05-18 |
JP2002540654A (ja) | 2002-11-26 |
MXPA01008201A (es) | 2003-07-21 |
WO2000049765A2 (fr) | 2000-08-24 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
AU2016386405B2 (en) | Fast format-preserving encryption for variable length data | |
CN101006677B (zh) | 用于实施加密运算的方法和装置 | |
CN101206816B (zh) | 运算处理装置和运算处理控制方法 | |
EP1873671B2 (en) | A method for protecting IC Cards against power analysis attacks | |
KR100674550B1 (ko) | 정보 처리 장치 | |
EP1308885B1 (en) | Information processing and encryption unit | |
US8000473B2 (en) | Method and apparatus for generating cryptographic sets of instructions automatically and code generator | |
CN100393029C (zh) | 在使用密钥密码学算法的电子元件中的防范方法 | |
US20120093308A1 (en) | Apparatus and method for generating random data | |
US20090245510A1 (en) | Block cipher with security intrinsic aspects | |
Meijer et al. | Ciphertext-only cryptanalysis on hardened Mifare classic cards | |
US6820814B1 (en) | Countermeasure method in an electric component using a secret key cryptographic algorithm | |
Jain et al. | Implementation of hybrid cryptography algorithm | |
Zeyad et al. | Another look on bucketing attack to defeat white-box implementations | |
Dmukh et al. | Modification of the key schedule of the 2-GOST block cipher and its implementation on FPGA | |
CN1319312C (zh) | 在电子组件中使用密钥密码算法的对抗方法及电子组件 | |
EP3662613A1 (en) | Method to secure a software code performing accesses to look-up tables | |
Bulygin et al. | Study of the invariant coset attack on printcipher: more weak keys with practical key recovery | |
EP3913509A1 (en) | Method to secure computer code | |
Golić | DeKaRT: A new paradigm for key-dependent reversible circuits | |
US7747012B2 (en) | Process of security of an electronic unit with cryptoprocessor | |
JP2006025366A (ja) | 暗号化装置及び半導体集積回路 | |
US20190384894A1 (en) | Intrinsic authentication of program code | |
JP4003723B2 (ja) | 情報処理装置、耐タンパ処理装置 | |
Andraşiu et al. | Evaluation Of Cryptographic Algorithms |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
ASS | Succession or assignment of patent right |
Owner name: JIN YATUO Free format text: FORMER OWNER: GEMPLUS CO. Effective date: 20120828 |
|
C41 | Transfer of patent application or patent right or utility model | ||
C56 | Change in the name or address of the patentee |
Owner name: SETEC OY Free format text: FORMER NAME: JIN YATUO |
|
CP01 | Change in the name or title of a patent holder |
Address after: East France Patentee after: GEMALTO OY Address before: East France Patentee before: Jin Yatuo |
|
TR01 | Transfer of patent right |
Effective date of registration: 20120828 Address after: East France Patentee after: Jin Yatuo Address before: French gemenos Patentee before: GEMPLUS |
|
CX01 | Expiry of patent term |
Granted publication date: 20080604 |
|
CX01 | Expiry of patent term |