GB2345229B - Method for encrypting data - Google Patents

Method for encrypting data

Info

Publication number
GB2345229B
GB2345229B GB9828538A GB9828538A GB2345229B GB 2345229 B GB2345229 B GB 2345229B GB 9828538 A GB9828538 A GB 9828538A GB 9828538 A GB9828538 A GB 9828538A GB 2345229 B GB2345229 B GB 2345229B
Authority
GB
United Kingdom
Prior art keywords
encrypting data
encrypting
data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
GB9828538A
Other versions
GB2345229A (en
GB9828538D0 (en
Inventor
Bo Lin
Stephen Mcspadden
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Motorola Solutions UK Ltd
Original Assignee
Motorola Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Motorola Ltd filed Critical Motorola Ltd
Priority to GB9828538A priority Critical patent/GB2345229B/en
Publication of GB9828538D0 publication Critical patent/GB9828538D0/en
Publication of GB2345229A publication Critical patent/GB2345229A/en
Application granted granted Critical
Publication of GB2345229B publication Critical patent/GB2345229B/en
Anticipated expiration legal-status Critical
Expired - Fee Related legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/75Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information by inhibiting the analysis of circuitry or operation
    • G06F21/755Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information by inhibiting the analysis of circuitry or operation with measures against power attack
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0618Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
    • H04L9/0625Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation with splitting of the data block into left and right halves, e.g. Feistel based algorithms, DES, FEAL, IDEA or KASUMI
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/72Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in cryptographic circuits
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/002Countermeasures against attacks on cryptographic mechanisms
    • H04L9/003Countermeasures against attacks on cryptographic mechanisms for power analysis, e.g. differential power analysis [DPA] or simple power analysis [SPA]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2207/00Indexing scheme relating to methods or arrangements for processing data by operating upon the order or content of the data handled
    • G06F2207/72Indexing scheme relating to groups G06F7/72 - G06F7/729
    • G06F2207/7219Countermeasures against side channel or fault attacks
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2211/00Indexing scheme relating to details of data-processing equipment not covered by groups G06F3/00 - G06F13/00
    • G06F2211/007Encryption, En-/decode, En-/decipher, En-/decypher, Scramble, (De-)compress
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/08Randomization, e.g. dummy operations or using noise
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/24Key scheduling, i.e. generating round keys or sub-keys for block encryption
GB9828538A 1998-12-23 1998-12-23 Method for encrypting data Expired - Fee Related GB2345229B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
GB9828538A GB2345229B (en) 1998-12-23 1998-12-23 Method for encrypting data

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
GB9828538A GB2345229B (en) 1998-12-23 1998-12-23 Method for encrypting data

Publications (3)

Publication Number Publication Date
GB9828538D0 GB9828538D0 (en) 1999-02-17
GB2345229A GB2345229A (en) 2000-06-28
GB2345229B true GB2345229B (en) 2003-12-03

Family

ID=10844967

Family Applications (1)

Application Number Title Priority Date Filing Date
GB9828538A Expired - Fee Related GB2345229B (en) 1998-12-23 1998-12-23 Method for encrypting data

Country Status (1)

Country Link
GB (1) GB2345229B (en)

Families Citing this family (32)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7000111B1 (en) 2000-11-07 2006-02-14 Ericsson Inc. Method for masking secret multiplicands
JP4199937B2 (en) * 2001-03-06 2008-12-24 株式会社日立製作所 Anti-tamper encryption method
DE10149191C2 (en) * 2001-10-05 2003-12-18 Infineon Technologies Ag Method and device for determining original source data from original input data on the basis of a cryptographic operation
FR2831739B1 (en) * 2001-10-31 2005-07-22 Gemplus Card Int METHOD FOR SECURELY IMPLEMENTING A FUNCTIONAL MODULE IN AN ELECTRONIC COMPONENT AND CORRESPONDING COMPONENT
DE10162309A1 (en) 2001-12-19 2003-07-03 Philips Intellectual Property Method and arrangement for increasing the security of circuits against unauthorized access
JP2005527853A (en) * 2002-05-23 2005-09-15 アトメル・コーポレイション Advanced Encryption Standard (AES) hardware cryptography engine
JP2004212828A (en) * 2003-01-08 2004-07-29 Sony Corp Encryption processing device, encryption processing method, and computer program
DE102004018874B4 (en) * 2004-04-19 2009-08-06 Infineon Technologies Ag Method and device for determining a result
FR2873523B1 (en) * 2004-07-22 2007-08-10 Sagem METHOD AND DEVICE FOR PERFORMING A CRYPTOGRAPHIC CALCULATION
EP1831812A1 (en) * 2004-12-20 2007-09-12 Philips Intellectual Property & Standards GmbH Data processing device and method for operating such data processing device
WO2007000702A2 (en) 2005-06-29 2007-01-04 Koninklijke Philips Electronics N.V. Arrangement for and method of protecting a data processing device against a cryptographic attack or analysis
FR2893796B1 (en) * 2005-11-21 2008-01-04 Atmel Corp ENCRYPTION PROTECTION METHOD
FR2897216B1 (en) * 2006-02-08 2008-05-02 Sagem Defense Securite PROTECTION OF CRYPTOGRAPHIC ALGORITHM
IL174784A0 (en) * 2006-04-04 2006-12-31 Nds Ltd Robust cipher design
DE602006008599D1 (en) 2006-06-29 2009-10-01 Incard Sa Method for protecting IC cards from power analysis attacks
US8321666B2 (en) 2006-08-15 2012-11-27 Sap Ag Implementations of secure computation protocols
US8091139B2 (en) 2007-11-01 2012-01-03 Discretix Technologies Ltd. System and method for masking arbitrary Boolean functions
FR2923305B1 (en) * 2007-11-02 2011-04-29 Inside Contactless METHOD AND DEVICES FOR PROTECTING A MICROCIRCUIT AGAINST ATTACKS TO DISCOVER SECRET DATA
EP2173056A1 (en) * 2008-09-04 2010-04-07 Gemplus Method for countermeasure in an electronic component using a secret key algorithm
JP5433498B2 (en) * 2010-05-27 2014-03-05 株式会社東芝 Cryptographic processing device
US20120079281A1 (en) * 2010-06-28 2012-03-29 Lionstone Capital Corporation Systems and methods for diversification of encryption algorithms and obfuscation symbols, symbol spaces and/or schemas
US8583937B2 (en) 2010-12-16 2013-11-12 Blackberry Limited Method and apparatus for securing a computing device
EP2466523B1 (en) * 2010-12-16 2015-04-29 BlackBerry Limited Method and apparatus for securing a computing device
GB2487723A (en) 2011-01-26 2012-08-08 Nds Ltd Protection device for stored data values comprising a switching circuit
DE102014016548A1 (en) * 2014-11-10 2016-05-12 Giesecke & Devrient Gmbh Method for testing and hardening software applications
US11227071B2 (en) 2017-03-20 2022-01-18 Nanyang Technological University Hardware security to countermeasure side-channel attacks
US11669426B2 (en) 2017-06-30 2023-06-06 International Business Machines Corporation Kernel-based power consumption and isolation and defense against emerging power attacks
WO2020220034A1 (en) 2019-04-26 2020-10-29 Csub Auxiliary For Sponsored Programs Administration Reconfigurable security hardware and methods for internet of things (iot) systems
CN111597551B (en) * 2020-05-20 2024-02-27 中国科学技术大学 Protection method for side channel attack aiming at deep learning algorithm
CN112511292B (en) * 2021-02-05 2021-05-04 浙江地芯引力科技有限公司 Working performance detection and adaptive guiding method and device for security chip
CN113343276B (en) * 2021-07-01 2022-06-14 衡阳师范学院 Encryption method of light-weight block cipher algorithm GCM based on generalized two-dimensional cat mapping
CN116055039B (en) * 2022-12-29 2023-11-14 北京海泰方圆科技股份有限公司 Random number generation method and device based on block cipher algorithm

Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO1997022192A1 (en) * 1995-12-08 1997-06-19 Northern Telecom Limited Constructing symmetric ciphers using the cast design procedure
GB2327581A (en) * 1997-06-23 1999-01-27 Samsung Electronics Co Ltd Block cypher resists differential or linear cryptoanalysis
WO1999014889A1 (en) * 1997-09-17 1999-03-25 Luyster Frank C Improved block cipher method
EP0907269A1 (en) * 1997-04-02 1999-04-07 Alexandr Andreevich Moldovyan Encryption device for information in binary code
WO1999063696A1 (en) * 1998-06-03 1999-12-09 Cryptography Research, Inc. Using unpredictable information to minimize leakage from smartcards and other cryptosystems
WO1999067919A2 (en) * 1998-06-03 1999-12-29 Cryptography Research, Inc. Improved des and other cryptographic processes with leak minimization for smartcards and other cryptosystems
EP0982895A2 (en) * 1998-08-24 2000-03-01 Kabushiki Kaisha Toshiba Cryptographic data processor, communication system and recording medium
WO2000024156A1 (en) * 1998-10-16 2000-04-27 Gemplus Countermeasure method in an electronic component using a secret key cryptographic algorithm
WO2000024155A1 (en) * 1998-10-16 2000-04-27 Gemplus Countermeasure method in an electronic component using a secret key cryptographic algorithm
WO2000027068A1 (en) * 1998-10-29 2000-05-11 Gemplus Countermeasure method in an electronic component using a secret key cryptographic algorithm
EP1059760A1 (en) * 1998-02-24 2000-12-13 Otkrytoe Aktsionernoe Obschestvo " Moskovskaya Gorodskaya Telefonnaya Set" Method for the block-encryption of discrete data

Patent Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO1997022192A1 (en) * 1995-12-08 1997-06-19 Northern Telecom Limited Constructing symmetric ciphers using the cast design procedure
EP0907269A1 (en) * 1997-04-02 1999-04-07 Alexandr Andreevich Moldovyan Encryption device for information in binary code
GB2327581A (en) * 1997-06-23 1999-01-27 Samsung Electronics Co Ltd Block cypher resists differential or linear cryptoanalysis
WO1999014889A1 (en) * 1997-09-17 1999-03-25 Luyster Frank C Improved block cipher method
EP1059760A1 (en) * 1998-02-24 2000-12-13 Otkrytoe Aktsionernoe Obschestvo " Moskovskaya Gorodskaya Telefonnaya Set" Method for the block-encryption of discrete data
WO1999063696A1 (en) * 1998-06-03 1999-12-09 Cryptography Research, Inc. Using unpredictable information to minimize leakage from smartcards and other cryptosystems
WO1999067919A2 (en) * 1998-06-03 1999-12-29 Cryptography Research, Inc. Improved des and other cryptographic processes with leak minimization for smartcards and other cryptosystems
EP0982895A2 (en) * 1998-08-24 2000-03-01 Kabushiki Kaisha Toshiba Cryptographic data processor, communication system and recording medium
WO2000024156A1 (en) * 1998-10-16 2000-04-27 Gemplus Countermeasure method in an electronic component using a secret key cryptographic algorithm
WO2000024155A1 (en) * 1998-10-16 2000-04-27 Gemplus Countermeasure method in an electronic component using a secret key cryptographic algorithm
WO2000027068A1 (en) * 1998-10-29 2000-05-11 Gemplus Countermeasure method in an electronic component using a secret key cryptographic algorithm

Also Published As

Publication number Publication date
GB2345229A (en) 2000-06-28
GB9828538D0 (en) 1999-02-17

Similar Documents

Publication Publication Date Title
GB2345229B (en) Method for encrypting data
HK1049731A1 (en) Recording method
IL135437A0 (en) Method for protecting important data bits using less important data bits
EP1003320A4 (en) Data communication apparatus
IL149080A0 (en) System and method for data visualization
AU2427199A (en) Method and arrangement for ciphering information transfer
HUP0001150A3 (en) Method for the data transmission
IL128846A0 (en) Method and apparatus for data encryption
EP1059760A4 (en) Method for the block-encryption of discrete data
EP1118946A4 (en) Data interpolation method
EP1072101A4 (en) Methods and apparatus for exchanging data
HU9901733D0 (en) Method for transmitting data
GB9828367D0 (en) Method and apparatus for communicating information
GB9802475D0 (en) Method
HK1024121A1 (en) Data transfer method
GB9724655D0 (en) Method for limiting cryptographic data throughput
SG115325A1 (en) Data recording apparatus
AU5847399A (en) Method for transmitting data
AU1265500A (en) Security interface for data exchange
GB9806836D0 (en) Data communication apparatus
HU9701946D0 (en) Method for data transmission
SG85680A1 (en) Method for processing information
IL148285A0 (en) Multiple module encryption method
GB9828872D0 (en) Method for data serial transfer
HUP0104003A2 (en) Method for transmitting binary data

Legal Events

Date Code Title Description
PCNP Patent ceased through non-payment of renewal fee

Effective date: 20091223