ATE348456T1 - Sicherheitsgegenmassnahmen gegen angriffe durch stromverbrauchsanalysen - Google Patents

Sicherheitsgegenmassnahmen gegen angriffe durch stromverbrauchsanalysen

Info

Publication number
ATE348456T1
ATE348456T1 AT04101591T AT04101591T ATE348456T1 AT E348456 T1 ATE348456 T1 AT E348456T1 AT 04101591 T AT04101591 T AT 04101591T AT 04101591 T AT04101591 T AT 04101591T AT E348456 T1 ATE348456 T1 AT E348456T1
Authority
AT
Austria
Prior art keywords
split mask
power consumption
countermeasures against
consumption analysis
against attacks
Prior art date
Application number
AT04101591T
Other languages
English (en)
Inventor
Catherine Helen Gebotys
Original Assignee
Research In Motion Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Research In Motion Ltd filed Critical Research In Motion Ltd
Application granted granted Critical
Publication of ATE348456T1 publication Critical patent/ATE348456T1/de

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0618Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
    • H04L9/0631Substitution permutation network [SPN], i.e. cipher composed of a number of stages or rounds each involving linear and nonlinear transformations, e.g. AES algorithms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/002Countermeasures against attacks on cryptographic mechanisms
    • H04L9/003Countermeasures against attacks on cryptographic mechanisms for power analysis, e.g. differential power analysis [DPA] or simple power analysis [SPA]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/04Masking or blinding
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/24Key scheduling, i.e. generating round keys or sub-keys for block encryption

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Storage Device Security (AREA)
  • Remote Monitoring And Control Of Power-Distribution Networks (AREA)
  • Compositions Of Oxide Ceramics (AREA)
  • Measurement And Recording Of Electrical Phenomena And Electrical Characteristics Of The Living Body (AREA)
  • Amplifiers (AREA)
  • Control Of Eletrric Generators (AREA)
AT04101591T 2004-04-16 2004-04-16 Sicherheitsgegenmassnahmen gegen angriffe durch stromverbrauchsanalysen ATE348456T1 (de)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
EP04101591A EP1587237B1 (de) 2004-04-16 2004-04-16 Sicherheitsgegenmassnahmen gegen Angriffe durch Stromverbrauchsanalysen

Publications (1)

Publication Number Publication Date
ATE348456T1 true ATE348456T1 (de) 2007-01-15

Family

ID=34928971

Family Applications (1)

Application Number Title Priority Date Filing Date
AT04101591T ATE348456T1 (de) 2004-04-16 2004-04-16 Sicherheitsgegenmassnahmen gegen angriffe durch stromverbrauchsanalysen

Country Status (5)

Country Link
EP (1) EP1587237B1 (de)
AT (1) ATE348456T1 (de)
CA (1) CA2504338C (de)
DE (1) DE602004003675T2 (de)
HK (1) HK1082346A1 (de)

Families Citing this family (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
FR2893796B1 (fr) * 2005-11-21 2008-01-04 Atmel Corp Procede de protection par chiffrement
US8050403B2 (en) 2007-03-06 2011-11-01 Research In Motion Limited Method and apparatus for generating a public key in a manner that counters power analysis attacks
FR2914129B1 (fr) * 2007-03-21 2009-06-12 Oberthur Card Syst Sa Procede de traitement de donnees au sein d'une entite electronique
US8582765B2 (en) 2007-08-01 2013-11-12 Stmicroelectronics S.A. Masking of data in a calculation
EP2300954B1 (de) 2008-06-24 2014-12-03 NDS Limited Sicherheit in integrierten schaltkreisen
DE102011107104B4 (de) * 2011-07-12 2020-11-12 Giesecke+Devrient Mobile Security Gmbh Tragbares Sicherheitsmodul und Verfahren zu dessen Betrieb zur Abwehr eines Angriffs in Echtzeit per Mustererkennung
US9269418B2 (en) 2012-02-06 2016-02-23 Arm Limited Apparatus and method for controlling refreshing of data in a DRAM
FR3056322B1 (fr) * 2016-09-21 2018-09-21 Safran Identity & Security Procede de chiffrement ou de dechiffrement protege contre des attaques par canaux caches
SG11202001001WA (en) 2017-08-31 2020-03-30 Visa Int Service Ass Single node multi-party encryption
JP7314108B2 (ja) * 2020-08-27 2023-07-25 株式会社東芝 暗号処理装置、暗号処理方法およびプログラム
CN112787800B (zh) * 2021-01-19 2022-06-17 清华大学 基于二阶掩码的加解密方法、装置、电子设备及存储介质

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CA2333095C (en) * 1998-06-03 2005-05-10 Cryptography Research, Inc. Improved des and other cryptographic processes with leak minimization for smartcards and other cryptosystems
US6295606B1 (en) * 1999-07-26 2001-09-25 Motorola, Inc. Method and apparatus for preventing information leakage attacks on a microelectronic assembly

Also Published As

Publication number Publication date
EP1587237B1 (de) 2006-12-13
CA2504338A1 (en) 2005-10-16
DE602004003675T2 (de) 2007-10-25
DE602004003675D1 (de) 2007-01-25
HK1082346A1 (en) 2006-06-02
EP1587237A1 (de) 2005-10-19
CA2504338C (en) 2011-03-22

Similar Documents

Publication Publication Date Title
HK1082346A1 (en) Security countermeasures for power analysis attacks
HK1083956A1 (en) Table masking for resistance to power analysis attacks
WO2004061628A3 (en) Attestation using both fixed token and portable token
DE602005002632D1 (de) Schlüsselmaskierung für kryptographische Prozesse mittels einer Kombination von Zufallsmaskenwerten
BRPI0518743A2 (pt) dispositivo oticamente variÁvel que tem uma camada eletricamente ativa
BRPI0503785A (pt) sistema eletrÈnico de permuta de dados
DE60318592D1 (de) Sicherheitseinrichtung und system
WO2006012070A3 (en) Conditional instruction for a single instruction, multiple data execution engine
DE60324593D1 (de) Zuverlässiger systemzeitgeber
EP1924023A3 (de) Verschlüsselungsvorrichtung für symmetrische Schlüsselchiffres
WO2003107151A3 (en) METHOD FOR CONFIRMING AN EXCHANGE OF SECURITY KEYS
ATE493699T1 (de) Schutz vor leistungsanalyse-angriffen
WO2005043283A3 (en) Secure exchange of information in electronic design automation
JP2005236977A (ja) 電力分析攻撃に安全な基本演算装置および方法
ATE342548T1 (de) Schutz eines gerätes gegen unerwünschte verwendung in einem sicheren umfeld
Keohane Commentary on the democratic accountability of non-governmental organizations
Bergmair Towards linguistic steganography: A systematic investigation of approaches, systems, and issues
Landwehr Cybersecurity: From engineering to science|
Croome et al. Character Codegrees of Maximal Class-groups
CL2006003086A1 (es) Sistema y metodo de declaracion y evaluacion de solvencia
DE502005001032D1 (de) Übergang von einer booleschen Maskierung zu einer arithmetischen Maskierung
Lipp Cache attacks and rowhammer on arm
Pasalic On Boolean functions in symmetric-key ciphers
Kar et al. Low power requirements and side-channel protection of encryption engines: Challenges and opportunities
ATE409349T1 (de) Floating-gate- analogspannungsrückkopplungsschaltung

Legal Events

Date Code Title Description
RER Ceased as to paragraph 5 lit. 3 law introducing patent treaties