AU2001287675A1 - Method and device for carrying out a modular exponentiation in a cryptographic processor - Google Patents
Method and device for carrying out a modular exponentiation in a cryptographic processorInfo
- Publication number
- AU2001287675A1 AU2001287675A1 AU2001287675A AU8767501A AU2001287675A1 AU 2001287675 A1 AU2001287675 A1 AU 2001287675A1 AU 2001287675 A AU2001287675 A AU 2001287675A AU 8767501 A AU8767501 A AU 8767501A AU 2001287675 A1 AU2001287675 A1 AU 2001287675A1
- Authority
- AU
- Australia
- Prior art keywords
- carrying
- cryptographic processor
- modular exponentiation
- exponentiation
- modular
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/002—Countermeasures against attacks on cryptographic mechanisms
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F12/00—Accessing, addressing or allocating within memory systems or architectures
- G06F12/14—Protection against unauthorised use of memory or access to memory
- G06F12/1416—Protection against unauthorised use of memory or access to memory by checking the object accessibility, e.g. type of access defined by the memory independently of subject rights
- G06F12/145—Protection against unauthorised use of memory or access to memory by checking the object accessibility, e.g. type of access defined by the memory independently of subject rights the protection being virtual, e.g. for virtual blocks or segments before a translation mechanism
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/75—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information by inhibiting the analysis of circuitry or operation
- G06F21/755—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information by inhibiting the analysis of circuitry or operation with measures against power attack
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F7/00—Methods or arrangements for processing data by operating upon the order or content of the data handled
- G06F7/60—Methods or arrangements for performing computations using a digital non-denominational number representation, i.e. number representation without radix; Computing devices using combinations of denominational and non-denominational quantity representations, e.g. using difunction pulse trains, STEELE computers, phase computers
- G06F7/72—Methods or arrangements for performing computations using a digital non-denominational number representation, i.e. number representation without radix; Computing devices using combinations of denominational and non-denominational quantity representations, e.g. using difunction pulse trains, STEELE computers, phase computers using residue arithmetic
- G06F7/723—Modular exponentiation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
- H04L9/3006—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters
- H04L9/302—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters involving the integer factorization problem, e.g. RSA or quadratic sieve [QS] schemes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2207/00—Indexing scheme relating to methods or arrangements for processing data by operating upon the order or content of the data handled
- G06F2207/72—Indexing scheme relating to groups G06F7/72 - G06F7/729
- G06F2207/7219—Countermeasures against side channel or fault attacks
- G06F2207/7223—Randomisation as countermeasure against side channel attacks
- G06F2207/7257—Random modification not requiring correction
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2207/00—Indexing scheme relating to methods or arrangements for processing data by operating upon the order or content of the data handled
- G06F2207/72—Indexing scheme relating to groups G06F7/72 - G06F7/729
- G06F2207/7219—Countermeasures against side channel or fault attacks
- G06F2207/7271—Fault verification, e.g. comparing two values which should be the same, unless a computational fault occurred
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- Computer Security & Cryptography (AREA)
- General Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- Computing Systems (AREA)
- Computer Hardware Design (AREA)
- Mathematical Physics (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Computational Mathematics (AREA)
- Mathematical Analysis (AREA)
- Mathematical Optimization (AREA)
- Pure & Applied Mathematics (AREA)
- Software Systems (AREA)
- Storage Device Security (AREA)
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
DE10042234A DE10042234C2 (en) | 2000-08-28 | 2000-08-28 | Method and device for performing a modular exponentiation in a cryptographic processor |
DE10042234.9 | 2000-08-28 | ||
PCT/EP2001/009285 WO2002019065A2 (en) | 2000-08-28 | 2001-08-10 | Method and device for carrying out a modular exponentiation in a cryptographic processor |
Publications (1)
Publication Number | Publication Date |
---|---|
AU2001287675A1 true AU2001287675A1 (en) | 2002-03-13 |
Family
ID=7654065
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
AU2001287675A Abandoned AU2001287675A1 (en) | 2000-08-28 | 2001-08-10 | Method and device for carrying out a modular exponentiation in a cryptographic processor |
Country Status (3)
Country | Link |
---|---|
AU (1) | AU2001287675A1 (en) |
DE (1) | DE10042234C2 (en) |
WO (1) | WO2002019065A2 (en) |
Families Citing this family (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
DE10304451B3 (en) * | 2003-02-04 | 2004-09-02 | Infineon Technologies Ag | Modular exponentiation with randomized exponent |
DE10326057B4 (en) * | 2003-06-11 | 2010-06-10 | Cv Cryptovision Gmbh | Anti-aliasing method for testing a natural number for primality |
FR2869430A1 (en) * | 2004-04-27 | 2005-10-28 | St Microelectronics Sa | MONITORING THE EXECUTION OF AN ALGORITHM BY AN INTEGRATED CIRCUIT |
KR20110014630A (en) * | 2008-05-07 | 2011-02-11 | 이르데토 비.브이. | Exponent obfuscation |
DE102010039273B4 (en) * | 2010-08-12 | 2014-12-04 | Infineon Technologies Ag | Cryptography processor, smart card and method of calculating a result of exponentiation |
DE102011115082A1 (en) | 2011-09-19 | 2013-03-21 | Giesecke & Devrient Gmbh | Against spying on protectable secret RSA encryption exponent |
Family Cites Families (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5046094A (en) * | 1989-02-02 | 1991-09-03 | Kabushiki Kaisha Toshiba | Server-aided computation method and distributed information processing unit |
US5991415A (en) * | 1997-05-12 | 1999-11-23 | Yeda Research And Development Co. Ltd. At The Weizmann Institute Of Science | Method and apparatus for protecting public key schemes from timing and fault attacks |
DE19828936A1 (en) * | 1998-05-29 | 1999-12-02 | Siemens Ag | Method and device for processing data |
-
2000
- 2000-08-28 DE DE10042234A patent/DE10042234C2/en not_active Expired - Fee Related
-
2001
- 2001-08-10 AU AU2001287675A patent/AU2001287675A1/en not_active Abandoned
- 2001-08-10 WO PCT/EP2001/009285 patent/WO2002019065A2/en active Application Filing
Also Published As
Publication number | Publication date |
---|---|
DE10042234A1 (en) | 2002-03-14 |
DE10042234C2 (en) | 2002-06-20 |
WO2002019065A2 (en) | 2002-03-07 |
WO2002019065A8 (en) | 2002-09-26 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
AU2001229506A1 (en) | Method and apparatus for pausing execution in a processor | |
WO2002061652A8 (en) | Method and system for interacting with a user in an experiential environment | |
AU2002228718A1 (en) | An integrated tessellator in a graphics processing unit | |
AU2001273585A1 (en) | System and method for activating a rendering device in a multi-level rights-management architecture | |
AU1710101A (en) | Electronic device and a method in an electronic device | |
AU2001257417A1 (en) | Method and system for providing a flexible and efficient processor for use in graphics processing | |
AU2001269290A1 (en) | Apparatus and method for use in a computer hosting services environment | |
AU2001265967A1 (en) | Cryptographic method and cryptographic device | |
AU2001292146A1 (en) | Plate processing device and method for processing a plate | |
HK1059481A1 (en) | System and method for utilizing system configurations in a modular computer system. | |
EP1172963A3 (en) | Computing apparatus using an SPN structure in an F function and a computation method thereof | |
AU2002219921A1 (en) | Method for dynamically using cryptographic keys in a postage meter | |
GB0026620D0 (en) | Metering in a data processing system | |
AU2897001A (en) | Method and processor in a telecommunication system | |
AU2002229155A1 (en) | A parallel counter and a logic circuit for performing multiplication | |
AU2001287675A1 (en) | Method and device for carrying out a modular exponentiation in a cryptographic processor | |
AU2002340566A1 (en) | Method and device for guaranteeing a calculation in a cryptographic algorithm | |
AU2001226806A1 (en) | Device for identifying persons in a dactyloscopic manner | |
AU2002212563A1 (en) | A technique for reducing processing power in 3g systems | |
AU2001254615A1 (en) | Method for determining the efficiency of a liquid processing unit and device using said method | |
AU2001292510A1 (en) | Arrangement in a packaging machine and a method | |
AU2001287708A1 (en) | Method and device for regulating a vacuum in a chamber | |
AU4176899A (en) | Method and device in a cleaning machine | |
AU2001264026A1 (en) | Method for cryptographic calculation comprising a modular exponentiation routine | |
GB2381354B (en) | Method and apparatus for implementing compact type signatures in a virtual machine environment |