ATE348456T1 - Sicherheitsgegenmassnahmen gegen angriffe durch stromverbrauchsanalysen - Google Patents

Sicherheitsgegenmassnahmen gegen angriffe durch stromverbrauchsanalysen

Info

Publication number
ATE348456T1
ATE348456T1 AT04101591T AT04101591T ATE348456T1 AT E348456 T1 ATE348456 T1 AT E348456T1 AT 04101591 T AT04101591 T AT 04101591T AT 04101591 T AT04101591 T AT 04101591T AT E348456 T1 ATE348456 T1 AT E348456T1
Authority
AT
Austria
Prior art keywords
split mask
power consumption
countermeasures against
consumption analysis
against attacks
Prior art date
Application number
AT04101591T
Other languages
English (en)
Inventor
Catherine Helen Gebotys
Original Assignee
Research In Motion Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Research In Motion Ltd filed Critical Research In Motion Ltd
Application granted granted Critical
Publication of ATE348456T1 publication Critical patent/ATE348456T1/de

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0618Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
    • H04L9/0631Substitution permutation network [SPN], i.e. cipher composed of a number of stages or rounds each involving linear and nonlinear transformations, e.g. AES algorithms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/002Countermeasures against attacks on cryptographic mechanisms
    • H04L9/003Countermeasures against attacks on cryptographic mechanisms for power analysis, e.g. differential power analysis [DPA] or simple power analysis [SPA]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/04Masking or blinding
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/24Key scheduling, i.e. generating round keys or sub-keys for block encryption

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Storage Device Security (AREA)
  • Compositions Of Oxide Ceramics (AREA)
  • Remote Monitoring And Control Of Power-Distribution Networks (AREA)
  • Measurement And Recording Of Electrical Phenomena And Electrical Characteristics Of The Living Body (AREA)
  • Amplifiers (AREA)
  • Control Of Eletrric Generators (AREA)
AT04101591T 2004-04-16 2004-04-16 Sicherheitsgegenmassnahmen gegen angriffe durch stromverbrauchsanalysen ATE348456T1 (de)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
EP04101591A EP1587237B1 (de) 2004-04-16 2004-04-16 Sicherheitsgegenmassnahmen gegen Angriffe durch Stromverbrauchsanalysen

Publications (1)

Publication Number Publication Date
ATE348456T1 true ATE348456T1 (de) 2007-01-15

Family

ID=34928971

Family Applications (1)

Application Number Title Priority Date Filing Date
AT04101591T ATE348456T1 (de) 2004-04-16 2004-04-16 Sicherheitsgegenmassnahmen gegen angriffe durch stromverbrauchsanalysen

Country Status (4)

Country Link
EP (1) EP1587237B1 (de)
AT (1) ATE348456T1 (de)
CA (1) CA2504338C (de)
DE (1) DE602004003675T2 (de)

Families Citing this family (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
FR2893796B1 (fr) 2005-11-21 2008-01-04 Atmel Corp Procede de protection par chiffrement
US8050403B2 (en) 2007-03-06 2011-11-01 Research In Motion Limited Method and apparatus for generating a public key in a manner that counters power analysis attacks
FR2914129B1 (fr) * 2007-03-21 2009-06-12 Oberthur Card Syst Sa Procede de traitement de donnees au sein d'une entite electronique
US8582765B2 (en) 2007-08-01 2013-11-12 Stmicroelectronics S.A. Masking of data in a calculation
EP2662796A3 (de) 2008-06-24 2014-03-05 Nds Limited Sicherheit in integrierten Schaltkreisen
DE102011107104B4 (de) * 2011-07-12 2020-11-12 Giesecke+Devrient Mobile Security Gmbh Tragbares Sicherheitsmodul und Verfahren zu dessen Betrieb zur Abwehr eines Angriffs in Echtzeit per Mustererkennung
US9269418B2 (en) * 2012-02-06 2016-02-23 Arm Limited Apparatus and method for controlling refreshing of data in a DRAM
FR3056322B1 (fr) * 2016-09-21 2018-09-21 Safran Identity & Security Procede de chiffrement ou de dechiffrement protege contre des attaques par canaux caches
EP4002754A1 (de) * 2017-08-31 2022-05-25 Visa International Service Association Einzelknoten-mehrpartei-verschlüsselung
JP7314108B2 (ja) * 2020-08-27 2023-07-25 株式会社東芝 暗号処理装置、暗号処理方法およびプログラム
CN112787800B (zh) * 2021-01-19 2022-06-17 清华大学 基于二阶掩码的加解密方法、装置、电子设备及存储介质

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
AU6381699A (en) * 1998-06-03 2000-01-10 Cryptography Research, Inc. Improved des and other cryptographic processes with leak minimization for smartcards and other cryptosystems
US6295606B1 (en) * 1999-07-26 2001-09-25 Motorola, Inc. Method and apparatus for preventing information leakage attacks on a microelectronic assembly

Also Published As

Publication number Publication date
CA2504338A1 (en) 2005-10-16
CA2504338C (en) 2011-03-22
EP1587237B1 (de) 2006-12-13
DE602004003675D1 (de) 2007-01-25
EP1587237A1 (de) 2005-10-19
DE602004003675T2 (de) 2007-10-25
HK1082346A1 (en) 2006-06-02

Similar Documents

Publication Publication Date Title
ATE348456T1 (de) Sicherheitsgegenmassnahmen gegen angriffe durch stromverbrauchsanalysen
ATE534962T1 (de) Raumeffizientes tabellennachschlagen mit schutz gegen angriff aus seitenkanälen
BRPI0503785A (pt) sistema eletrÈnico de permuta de dados
SG152289A1 (en) System and method for application authorization
ATE383618T1 (de) Sicherheitseinrichtung und system
DE602005002349D1 (de) Schlüsselmaskierung für kryptographische Prozesse
MY144418A (en) Verifying human interaction to a computer entity by way of a trusted component on a computing device or the like
ATE413656T1 (de) Zuverlässiger systemzeitgeber
EP1924023A3 (de) Verschlüsselungsvorrichtung für symmetrische Schlüsselchiffres
EP1648111A4 (de) Manipulationsbeständige verschlüsselung mit individuellem schlüssel
McCall-Smith Interpreting international human rights standards: Treaty body general comments as a chisel or hammer?
ATE345620T1 (de) Tabellenmaskierung zur beständigkeit gegen angriffe durch analyse der leistungsaufnahme.
ATE493699T1 (de) Schutz vor leistungsanalyse-angriffen
WO2006012070A3 (en) Conditional instruction for a single instruction, multiple data execution engine
Bowman On inertial-range scaling laws
BRPI0506256A (pt) ambiente de computação portátil
WO2003060696A3 (en) Method and apparatus for multi-table accessing of input/output devices using target security
Hanna et al. “Building a Bridge”: communication, trust and commitment in human-intelligent virtual agent teams
Landwehr Cybersecurity: From engineering to science
Stobbs et al. Therapeutic jurisprudence-A strong community and a maturing discipline
FR2916317B1 (fr) Protection d'execution d'un calcul cryptographique
Mogers et al. Towards mapping lift to deep neural network accelerators
Petri Lightweight Software-Hardware Codesign for Post-Quantum Cryptography
Muzaffar Some interesting series arising from the power series expansion of(sin-1 x) q
Lipp Cache attacks and rowhammer on arm

Legal Events

Date Code Title Description
RER Ceased as to paragraph 5 lit. 3 law introducing patent treaties