ATE348456T1 - Sicherheitsgegenmassnahmen gegen angriffe durch stromverbrauchsanalysen - Google Patents
Sicherheitsgegenmassnahmen gegen angriffe durch stromverbrauchsanalysenInfo
- Publication number
- ATE348456T1 ATE348456T1 AT04101591T AT04101591T ATE348456T1 AT E348456 T1 ATE348456 T1 AT E348456T1 AT 04101591 T AT04101591 T AT 04101591T AT 04101591 T AT04101591 T AT 04101591T AT E348456 T1 ATE348456 T1 AT E348456T1
- Authority
- AT
- Austria
- Prior art keywords
- split mask
- power consumption
- countermeasures against
- consumption analysis
- against attacks
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0618—Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
- H04L9/0631—Substitution permutation network [SPN], i.e. cipher composed of a number of stages or rounds each involving linear and nonlinear transformations, e.g. AES algorithms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/002—Countermeasures against attacks on cryptographic mechanisms
- H04L9/003—Countermeasures against attacks on cryptographic mechanisms for power analysis, e.g. differential power analysis [DPA] or simple power analysis [SPA]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/04—Masking or blinding
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/24—Key scheduling, i.e. generating round keys or sub-keys for block encryption
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Storage Device Security (AREA)
- Compositions Of Oxide Ceramics (AREA)
- Remote Monitoring And Control Of Power-Distribution Networks (AREA)
- Measurement And Recording Of Electrical Phenomena And Electrical Characteristics Of The Living Body (AREA)
- Amplifiers (AREA)
- Control Of Eletrric Generators (AREA)
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| EP04101591A EP1587237B1 (de) | 2004-04-16 | 2004-04-16 | Sicherheitsgegenmassnahmen gegen Angriffe durch Stromverbrauchsanalysen |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| ATE348456T1 true ATE348456T1 (de) | 2007-01-15 |
Family
ID=34928971
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| AT04101591T ATE348456T1 (de) | 2004-04-16 | 2004-04-16 | Sicherheitsgegenmassnahmen gegen angriffe durch stromverbrauchsanalysen |
Country Status (4)
| Country | Link |
|---|---|
| EP (1) | EP1587237B1 (de) |
| AT (1) | ATE348456T1 (de) |
| CA (1) | CA2504338C (de) |
| DE (1) | DE602004003675T2 (de) |
Families Citing this family (11)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| FR2893796B1 (fr) | 2005-11-21 | 2008-01-04 | Atmel Corp | Procede de protection par chiffrement |
| US8050403B2 (en) | 2007-03-06 | 2011-11-01 | Research In Motion Limited | Method and apparatus for generating a public key in a manner that counters power analysis attacks |
| FR2914129B1 (fr) * | 2007-03-21 | 2009-06-12 | Oberthur Card Syst Sa | Procede de traitement de donnees au sein d'une entite electronique |
| US8582765B2 (en) | 2007-08-01 | 2013-11-12 | Stmicroelectronics S.A. | Masking of data in a calculation |
| EP2662796A3 (de) | 2008-06-24 | 2014-03-05 | Nds Limited | Sicherheit in integrierten Schaltkreisen |
| DE102011107104B4 (de) * | 2011-07-12 | 2020-11-12 | Giesecke+Devrient Mobile Security Gmbh | Tragbares Sicherheitsmodul und Verfahren zu dessen Betrieb zur Abwehr eines Angriffs in Echtzeit per Mustererkennung |
| US9269418B2 (en) * | 2012-02-06 | 2016-02-23 | Arm Limited | Apparatus and method for controlling refreshing of data in a DRAM |
| FR3056322B1 (fr) * | 2016-09-21 | 2018-09-21 | Safran Identity & Security | Procede de chiffrement ou de dechiffrement protege contre des attaques par canaux caches |
| EP4002754A1 (de) * | 2017-08-31 | 2022-05-25 | Visa International Service Association | Einzelknoten-mehrpartei-verschlüsselung |
| JP7314108B2 (ja) * | 2020-08-27 | 2023-07-25 | 株式会社東芝 | 暗号処理装置、暗号処理方法およびプログラム |
| CN112787800B (zh) * | 2021-01-19 | 2022-06-17 | 清华大学 | 基于二阶掩码的加解密方法、装置、电子设备及存储介质 |
Family Cites Families (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| AU6381699A (en) * | 1998-06-03 | 2000-01-10 | Cryptography Research, Inc. | Improved des and other cryptographic processes with leak minimization for smartcards and other cryptosystems |
| US6295606B1 (en) * | 1999-07-26 | 2001-09-25 | Motorola, Inc. | Method and apparatus for preventing information leakage attacks on a microelectronic assembly |
-
2004
- 2004-04-16 DE DE602004003675T patent/DE602004003675T2/de not_active Expired - Lifetime
- 2004-04-16 EP EP04101591A patent/EP1587237B1/de not_active Expired - Lifetime
- 2004-04-16 AT AT04101591T patent/ATE348456T1/de not_active IP Right Cessation
-
2005
- 2005-04-15 CA CA2504338A patent/CA2504338C/en not_active Expired - Lifetime
Also Published As
| Publication number | Publication date |
|---|---|
| CA2504338A1 (en) | 2005-10-16 |
| CA2504338C (en) | 2011-03-22 |
| EP1587237B1 (de) | 2006-12-13 |
| DE602004003675D1 (de) | 2007-01-25 |
| EP1587237A1 (de) | 2005-10-19 |
| DE602004003675T2 (de) | 2007-10-25 |
| HK1082346A1 (en) | 2006-06-02 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| ATE348456T1 (de) | Sicherheitsgegenmassnahmen gegen angriffe durch stromverbrauchsanalysen | |
| ATE534962T1 (de) | Raumeffizientes tabellennachschlagen mit schutz gegen angriff aus seitenkanälen | |
| BRPI0503785A (pt) | sistema eletrÈnico de permuta de dados | |
| SG152289A1 (en) | System and method for application authorization | |
| ATE383618T1 (de) | Sicherheitseinrichtung und system | |
| DE602005002349D1 (de) | Schlüsselmaskierung für kryptographische Prozesse | |
| MY144418A (en) | Verifying human interaction to a computer entity by way of a trusted component on a computing device or the like | |
| ATE413656T1 (de) | Zuverlässiger systemzeitgeber | |
| EP1924023A3 (de) | Verschlüsselungsvorrichtung für symmetrische Schlüsselchiffres | |
| EP1648111A4 (de) | Manipulationsbeständige verschlüsselung mit individuellem schlüssel | |
| McCall-Smith | Interpreting international human rights standards: Treaty body general comments as a chisel or hammer? | |
| ATE345620T1 (de) | Tabellenmaskierung zur beständigkeit gegen angriffe durch analyse der leistungsaufnahme. | |
| ATE493699T1 (de) | Schutz vor leistungsanalyse-angriffen | |
| WO2006012070A3 (en) | Conditional instruction for a single instruction, multiple data execution engine | |
| Bowman | On inertial-range scaling laws | |
| BRPI0506256A (pt) | ambiente de computação portátil | |
| WO2003060696A3 (en) | Method and apparatus for multi-table accessing of input/output devices using target security | |
| Hanna et al. | “Building a Bridge”: communication, trust and commitment in human-intelligent virtual agent teams | |
| Landwehr | Cybersecurity: From engineering to science | |
| Stobbs et al. | Therapeutic jurisprudence-A strong community and a maturing discipline | |
| FR2916317B1 (fr) | Protection d'execution d'un calcul cryptographique | |
| Mogers et al. | Towards mapping lift to deep neural network accelerators | |
| Petri | Lightweight Software-Hardware Codesign for Post-Quantum Cryptography | |
| Muzaffar | Some interesting series arising from the power series expansion of(sin-1 x) q | |
| Lipp | Cache attacks and rowhammer on arm |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| RER | Ceased as to paragraph 5 lit. 3 law introducing patent treaties |