FR3069993B1 - Dispositifs et procedes de masquage d'operations de chiffrement rsa - Google Patents
Dispositifs et procedes de masquage d'operations de chiffrement rsa Download PDFInfo
- Publication number
- FR3069993B1 FR3069993B1 FR1757555A FR1757555A FR3069993B1 FR 3069993 B1 FR3069993 B1 FR 3069993B1 FR 1757555 A FR1757555 A FR 1757555A FR 1757555 A FR1757555 A FR 1757555A FR 3069993 B1 FR3069993 B1 FR 3069993B1
- Authority
- FR
- France
- Prior art keywords
- memory
- erasable
- masking
- methods
- devices
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/78—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
- G06F21/79—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data in semiconductor storage media, e.g. directly-addressable memories
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G09—EDUCATION; CRYPTOGRAPHY; DISPLAY; ADVERTISING; SEALS
- G09C—CIPHERING OR DECIPHERING APPARATUS FOR CRYPTOGRAPHIC OR OTHER PURPOSES INVOLVING THE NEED FOR SECRECY
- G09C1/00—Apparatus or methods whereby a given sequence of signs, e.g. an intelligible text, is transformed into an unintelligible sequence of signs by transposing the signs or groups of signs or by replacing them by others according to a predetermined system
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/002—Countermeasures against attacks on cryptographic mechanisms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0869—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0894—Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
- H04L9/3006—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters
- H04L9/302—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters involving the integer factorization problem, e.g. RSA or quadratic sieve [QS] schemes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2143—Clearing memory, e.g. to prevent the data from being stolen
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F7/00—Methods or arrangements for processing data by operating upon the order or content of the data handled
- G06F7/58—Random or pseudo-random number generators
- G06F7/588—Random number generators, i.e. based on natural stochastic processes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/04—Masking or blinding
- H04L2209/046—Masking or blinding of operations, operands or results of the operations
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Computing Systems (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- General Engineering & Computer Science (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Storage Device Security (AREA)
Abstract
Il est présenté des dispositifs et procédés destinés à protéger des données secrètes qui sont contenues dans une mémoire afin d'empêcher des accès et manipulation de données non autorisés. Différents modes de réalisation peuvent être appliqués afin de cacher ou masquer un exposant RSA utilisé pour la cryptographie à clef publique et mémorisé dans un bloc cryptographique matériel qui utilise une mémoire de travail ne pouvant être effacée pour des calculs. Dans certains modes de réalisation, le masquage d'exposants RSA est réalisé par un processus en deux étapes qui associe une valeur aléatoire et secrète, calculée de manière spécifique, à l'exposant secret. La valeur aléatoire est mémorisée dans une mémoire pouvant être effacée, de telle sorte qu'en cas d'attaque, à la fois la mémoire pouvant être effacée et la mémoire ne pouvant l'être ne laissent paraître aucun des secrets intégrés. Le sur-coût en ressources de mémoire n'affecte les performances du dispositif que seulement de manière insignifiante.
Priority Applications (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
FR1757555A FR3069993B1 (fr) | 2017-08-07 | 2017-08-07 | Dispositifs et procedes de masquage d'operations de chiffrement rsa |
US16/039,014 US11115210B2 (en) | 2017-08-07 | 2018-07-18 | Systems and methods for masking RSA operations |
CN201810889230.6A CN109388976B (zh) | 2017-08-07 | 2018-08-07 | 用于屏蔽rsa运算的***和方法 |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
FR1757555 | 2017-08-07 | ||
FR1757555A FR3069993B1 (fr) | 2017-08-07 | 2017-08-07 | Dispositifs et procedes de masquage d'operations de chiffrement rsa |
Publications (2)
Publication Number | Publication Date |
---|---|
FR3069993A1 FR3069993A1 (fr) | 2019-02-08 |
FR3069993B1 true FR3069993B1 (fr) | 2020-09-18 |
Family
ID=60923571
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
FR1757555A Active FR3069993B1 (fr) | 2017-08-07 | 2017-08-07 | Dispositifs et procedes de masquage d'operations de chiffrement rsa |
Country Status (3)
Country | Link |
---|---|
US (1) | US11115210B2 (fr) |
CN (1) | CN109388976B (fr) |
FR (1) | FR3069993B1 (fr) |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110048840B (zh) * | 2019-04-28 | 2021-10-15 | 苏州国芯科技股份有限公司 | 一种基于rsa算法的信息处理方法、***及相关组件 |
CN111190733B (zh) * | 2019-12-27 | 2023-11-17 | 华为技术有限公司 | 用于进行rsa计算的计算资源调度方法及装置 |
Family Cites Families (19)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPH1165439A (ja) * | 1996-08-09 | 1999-03-05 | Nippon Telegr & Teleph Corp <Ntt> | N進表現暗号による通信および認証方法、ならびにそれらの装置、およびn進表現暗号による通信および認証プログラムを格納した記憶媒体 |
US7366305B2 (en) * | 2003-09-30 | 2008-04-29 | Intel Corporation | Platform and method for establishing trust without revealing identity |
FR2867635B1 (fr) * | 2004-03-11 | 2006-09-22 | Oberthur Card Syst Sa | Procede de traitement de donnees securise, base notamment sur un algorithme cryptographique |
US7590880B1 (en) * | 2004-09-13 | 2009-09-15 | National Semiconductor Corporation | Circuitry and method for detecting and protecting against over-clocking attacks |
JP4962165B2 (ja) | 2007-06-22 | 2012-06-27 | 大日本印刷株式会社 | 暗号処理装置,暗号処理プログラム及び暗号処理方法 |
US20090016523A1 (en) * | 2007-07-12 | 2009-01-15 | Atmel Corporation | Masking and Additive Decomposition Techniques for Cryptographic Field Operations |
JP5182364B2 (ja) * | 2008-03-28 | 2013-04-17 | 富士通株式会社 | サイドチャネル攻撃に対する耐タンパ性を有する暗号処理方法 |
US20130265163A1 (en) * | 2010-06-09 | 2013-10-10 | Raytheon Company | Magnetic Field Activated Intrusion Detection |
FR2966953B1 (fr) * | 2010-11-02 | 2015-08-28 | St Microelectronics Rousset | Procede de contremesure cryptographique par derivation d'une donnee secrete |
EP2506176A1 (fr) * | 2011-03-30 | 2012-10-03 | Irdeto Corporate B.V. | Établissement de clé unique durant la fabrication de puce |
GB2494731B (en) * | 2011-09-06 | 2013-11-20 | Nds Ltd | Preventing data extraction by sidechannel attack |
JP5481455B2 (ja) * | 2011-09-27 | 2014-04-23 | 株式会社東芝 | 暗号処理装置 |
US9335967B1 (en) * | 2013-06-13 | 2016-05-10 | Cadence Design Systems, Inc. | Accurate floating-point calculation method and device |
FR3010210B1 (fr) * | 2013-08-29 | 2017-01-13 | Stmicroelectronics Rousset | Protection d'un calcul contre des attaques par canaux caches |
US10263770B2 (en) * | 2013-11-06 | 2019-04-16 | Pure Storage, Inc. | Data protection in a storage system using external secrets |
KR102279027B1 (ko) * | 2014-12-03 | 2021-07-19 | 삼성전자주식회사 | 멀티 스레드를 실행하는 방법 및 장치 |
WO2016113886A1 (fr) | 2015-01-15 | 2016-07-21 | 三菱電機株式会社 | Dispositif d'extension de nombre aléatoire, procédé d'extension de nombre aléatoire et programme d'extension de nombre aléatoire |
FR3033965B1 (fr) * | 2015-03-18 | 2018-12-07 | Maxim Integrated Products, Inc. | Systèmes et procédés de commande de dispositifs de cryptage sur courbe elliptique sécurisés |
US10205598B2 (en) * | 2015-05-03 | 2019-02-12 | Ronald Francis Sulpizio, JR. | Temporal key generation and PKI gateway |
-
2017
- 2017-08-07 FR FR1757555A patent/FR3069993B1/fr active Active
-
2018
- 2018-07-18 US US16/039,014 patent/US11115210B2/en active Active
- 2018-08-07 CN CN201810889230.6A patent/CN109388976B/zh active Active
Also Published As
Publication number | Publication date |
---|---|
US20190044717A1 (en) | 2019-02-07 |
CN109388976B (zh) | 2023-12-05 |
US11115210B2 (en) | 2021-09-07 |
CN109388976A (zh) | 2019-02-26 |
FR3069993A1 (fr) | 2019-02-08 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Yu et al. | Optical image encryption algorithm based on phase-truncated short-time fractional Fourier transform and hyper-chaotic system | |
Chen et al. | Asymmetric color cryptosystem using chaotic Ushiki map and equal modulus decomposition in fractional Fourier transform domains | |
Bao et al. | Image encryption: Generating visually meaningful encrypted images | |
Akhshani et al. | A novel scheme for image encryption based on 2D piecewise chaotic maps | |
JP5599728B2 (ja) | ホワイトボックス実装 | |
Huang et al. | Visually asymmetric image encryption algorithm based on SHA-3 and compressive sensing by embedding encrypted image | |
FR3069993B1 (fr) | Dispositifs et procedes de masquage d'operations de chiffrement rsa | |
Farwa et al. | A novel image encryption based on algebraic S-box and Arnold transform | |
Gayathri et al. | An efficient spatiotemporal chaotic image cipher with an improved scrambling algorithm driven by dynamic diffusion phase | |
TWI762283B (zh) | 圖像的隱私保護方法、裝置及設備 | |
JP2016510914A (ja) | 非対称マスク済み乗算 | |
Dorrendorf et al. | Cryptanalysis of the windows random number generator | |
Rachmawanto et al. | A comparative study of image cryptographic method | |
GB0423889D0 (en) | Method and apparatus for providing short-term private keys in public-key cryptographic systems | |
DE112017007095T5 (de) | Verschlüsselungsvorrichtung und entschlüsselungsvorrichtung | |
CN105024812A (zh) | 云存储中基于身份的指定测试者的可搜索的加密方法 | |
Irawan et al. | Hybrid encryption using confused and stream cipher to improved medical images security | |
Raheema et al. | Design and implementation of speech encryption based on hybrid chaotic maps | |
Sowmya et al. | Symmetric key image encryption scheme with key sequences derived from random sequence of cyclic elliptic curve points over GF (p) | |
RU2403682C2 (ru) | Способ и устройство для выполнения криптографического вычисления | |
Saeed et al. | A gray-scale image encryption using Fisher-Yates chaotic shuffling in wavelet domain | |
Kutade et al. | A survey on various approaches of image steganography | |
FR3085215B1 (fr) | Dispositifs et procedes de masquage d'operations de cryptographie ecc | |
FR2814619A1 (fr) | Procede d'encodage de messages longs schemas de signature electronique a base de rsa | |
FR2814620A1 (fr) | Procede de transmission accelere de signature electronique |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PLSC | Publication of the preliminary search report |
Effective date: 20190208 |
|
PLFP | Fee payment |
Year of fee payment: 3 |
|
PLFP | Fee payment |
Year of fee payment: 4 |
|
PLFP | Fee payment |
Year of fee payment: 5 |
|
PLFP | Fee payment |
Year of fee payment: 6 |
|
PLFP | Fee payment |
Year of fee payment: 7 |