ATE472133T1 - Entschlüsselungsverfahren - Google Patents
EntschlüsselungsverfahrenInfo
- Publication number
- ATE472133T1 ATE472133T1 AT07705885T AT07705885T ATE472133T1 AT E472133 T1 ATE472133 T1 AT E472133T1 AT 07705885 T AT07705885 T AT 07705885T AT 07705885 T AT07705885 T AT 07705885T AT E472133 T1 ATE472133 T1 AT E472133T1
- Authority
- AT
- Austria
- Prior art keywords
- determined
- secret key
- decryption procedure
- plaintext
- variable
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F7/00—Methods or arrangements for processing data by operating upon the order or content of the data handled
- G06F7/60—Methods or arrangements for performing computations using a digital non-denominational number representation, i.e. number representation without radix; Computing devices using combinations of denominational and non-denominational quantity representations, e.g. using difunction pulse trains, STEELE computers, phase computers
- G06F7/72—Methods or arrangements for performing computations using a digital non-denominational number representation, i.e. number representation without radix; Computing devices using combinations of denominational and non-denominational quantity representations, e.g. using difunction pulse trains, STEELE computers, phase computers using residue arithmetic
- G06F7/723—Modular exponentiation
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F7/00—Methods or arrangements for processing data by operating upon the order or content of the data handled
- G06F7/60—Methods or arrangements for performing computations using a digital non-denominational number representation, i.e. number representation without radix; Computing devices using combinations of denominational and non-denominational quantity representations, e.g. using difunction pulse trains, STEELE computers, phase computers
- G06F7/72—Methods or arrangements for performing computations using a digital non-denominational number representation, i.e. number representation without radix; Computing devices using combinations of denominational and non-denominational quantity representations, e.g. using difunction pulse trains, STEELE computers, phase computers using residue arithmetic
- G06F7/724—Finite field arithmetic
- G06F7/725—Finite field arithmetic over elliptic curves
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/002—Countermeasures against attacks on cryptographic mechanisms
- H04L9/004—Countermeasures against attacks on cryptographic mechanisms for fault attacks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/002—Countermeasures against attacks on cryptographic mechanisms
- H04L9/005—Countermeasures against attacks on cryptographic mechanisms for timing attacks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
- H04L9/3006—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters
- H04L9/302—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters involving the integer factorization problem, e.g. RSA or quadratic sieve [QS] schemes
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2207/00—Indexing scheme relating to methods or arrangements for processing data by operating upon the order or content of the data handled
- G06F2207/72—Indexing scheme relating to groups G06F7/72 - G06F7/729
- G06F2207/7219—Countermeasures against side channel or fault attacks
- G06F2207/7261—Uniform execution, e.g. avoiding jumps, or using formulae with the same power profile
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2207/00—Indexing scheme relating to methods or arrangements for processing data by operating upon the order or content of the data handled
- G06F2207/72—Indexing scheme relating to groups G06F7/72 - G06F7/729
- G06F2207/7219—Countermeasures against side channel or fault attacks
- G06F2207/7271—Fault verification, e.g. comparing two values which should be the same, unless a computational fault occurred
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computer Security & Cryptography (AREA)
- Computing Systems (AREA)
- Mathematical Analysis (AREA)
- Computational Mathematics (AREA)
- Mathematical Optimization (AREA)
- Pure & Applied Mathematics (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- General Engineering & Computer Science (AREA)
- Mathematical Physics (AREA)
- Software Systems (AREA)
- Computer Hardware Design (AREA)
- Storage Device Security (AREA)
- Communication Control (AREA)
- Compression, Expansion, Code Conversion, And Decoders (AREA)
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| EP06112279 | 2006-04-06 | ||
| PCT/IB2007/050493 WO2007113697A2 (en) | 2006-04-06 | 2007-02-15 | Secure decryption method |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| ATE472133T1 true ATE472133T1 (de) | 2010-07-15 |
Family
ID=38050103
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| AT07705885T ATE472133T1 (de) | 2006-04-06 | 2007-02-15 | Entschlüsselungsverfahren |
Country Status (8)
| Country | Link |
|---|---|
| US (1) | US8065531B2 (de) |
| EP (1) | EP2005291B1 (de) |
| JP (1) | JP2009532973A (de) |
| KR (1) | KR20090006176A (de) |
| CN (1) | CN101416154A (de) |
| AT (1) | ATE472133T1 (de) |
| DE (1) | DE602007007310D1 (de) |
| WO (1) | WO2007113697A2 (de) |
Families Citing this family (14)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN101689233B (zh) * | 2007-07-05 | 2013-01-02 | Nxp股份有限公司 | 安全敏感系统中的微处理器 |
| FR2979725B1 (fr) * | 2011-09-06 | 2016-05-27 | Oberthur Technologies | Procede de calculs cryptographique resistant aux defaillances materielles |
| US8804952B2 (en) | 2012-12-26 | 2014-08-12 | Umm Al-Qura University | System and method for securing scalar multiplication against differential power attacks |
| US8861721B2 (en) * | 2012-12-26 | 2014-10-14 | Umm Al-Qura University | System and method for securing scalar multiplication against simple power attacks |
| JP6262085B2 (ja) * | 2014-06-25 | 2018-01-17 | ルネサスエレクトロニクス株式会社 | データ処理装置及び復号処理方法 |
| TWI580243B (zh) * | 2015-10-06 | 2017-04-21 | 瑞昱半導體股份有限公司 | 解密裝置、方法及電路 |
| TWI575924B (zh) * | 2015-10-06 | 2017-03-21 | 瑞昱半導體股份有限公司 | 解密裝置、方法及電路 |
| CN106571916B (zh) * | 2015-10-12 | 2020-06-30 | 瑞昱半导体股份有限公司 | 解密装置、方法及电路 |
| CN106571922B (zh) * | 2015-10-12 | 2020-03-10 | 瑞昱半导体股份有限公司 | 解密装置、方法及电路 |
| US10171235B2 (en) | 2016-05-19 | 2019-01-01 | Nxp B.V. | User-initiated migration of encryption keys |
| US9741449B1 (en) | 2016-08-09 | 2017-08-22 | Nxp Usa, Inc. | Sample and hold circuit |
| US9680453B1 (en) | 2016-08-09 | 2017-06-13 | Nxp Usa, Inc. | Oscillator circuit |
| US10050526B2 (en) | 2016-08-09 | 2018-08-14 | Nxp Usa, Inc. | Switching power converter |
| EP3579493A1 (de) * | 2018-06-08 | 2019-12-11 | STMicroelectronics (Rousset) SAS | Schutz einer iterativen berechnung |
Family Cites Families (16)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN1235446A (zh) * | 1998-03-05 | 1999-11-17 | 松下电器产业株式会社 | 椭圆曲线变换装置、利用装置和利用系统 |
| CA2243761C (en) * | 1998-07-21 | 2009-10-06 | Certicom Corp. | Timing attack resistant cryptographic system |
| CA2252078C (en) * | 1998-10-28 | 2009-02-17 | Certicom Corp. | Power signature attack resistant cryptographic system |
| US6298135B1 (en) * | 1999-04-29 | 2001-10-02 | Motorola, Inc. | Method of preventing power analysis attacks on microelectronic assemblies |
| US6832316B1 (en) * | 1999-12-22 | 2004-12-14 | Intertrust Technologies, Corp. | Systems and methods for protecting data secrecy and integrity |
| FR2815734B1 (fr) * | 2000-10-19 | 2006-07-28 | Oberthur Card Systems Sas | Unite de calcul pour l'execution d'un protocole cryptographique |
| JP2003131569A (ja) * | 2001-10-24 | 2003-05-09 | Matsushita Electric Ind Co Ltd | 二乗剰余演算回路、二乗剰余演算方法及びプログラム |
| FR2838210B1 (fr) * | 2002-04-03 | 2005-11-04 | Gemplus Card Int | Procede cryptographique protege contre les attaques de type a canal cache |
| EP1387519A3 (de) * | 2002-07-09 | 2004-02-18 | Cp8 | Verfahren zur Sicherung von Schaltkreisen gegen fehlerbasierte Seitenkanalangriffe |
| US7388957B2 (en) | 2003-01-28 | 2008-06-17 | Matsushita Electric Industrial Co., Ltd. | Elliptic curve exponentiation apparatus that can counter differential fault attack, and information security apparatus |
| EP1648111B1 (de) * | 2003-07-22 | 2014-01-15 | Fujitsu Limited | Manipulationsbeständige verschlüsselung mit geheimem schlüssel |
| FR2858496B1 (fr) * | 2003-07-31 | 2005-09-30 | Gemplus Card Int | Procede pour la mise en oeuvre securisee d'un algorithme de cryptographie de type rsa et composant correspondant |
| US7404089B1 (en) * | 2005-06-03 | 2008-07-22 | Pitney Bowes Inc. | Method and system for protecting against side channel attacks when performing cryptographic operations |
| DE102005042339B4 (de) * | 2005-09-06 | 2007-08-16 | Siemens Ag | Verfahren zum sicheren Ver- oder Entschlüsseln einer Nachricht |
| US8243920B2 (en) * | 2005-10-28 | 2012-08-14 | Telecom Italia S.P.A. | Method for scalar multiplication in elliptic curve groups over binary polynomial fields for side-channel attack-resistant cryptosystems |
| EP1912148A1 (de) * | 2006-10-09 | 2008-04-16 | Axalto S.A. | Schutzeinrichtung gegen einem Seitenkanalangriff mit einer Integritätsprüfung |
-
2007
- 2007-02-15 WO PCT/IB2007/050493 patent/WO2007113697A2/en not_active Ceased
- 2007-02-15 AT AT07705885T patent/ATE472133T1/de not_active IP Right Cessation
- 2007-02-15 KR KR1020087027196A patent/KR20090006176A/ko not_active Ceased
- 2007-02-15 DE DE602007007310T patent/DE602007007310D1/de active Active
- 2007-02-15 EP EP07705885A patent/EP2005291B1/de active Active
- 2007-02-15 CN CNA2007800119771A patent/CN101416154A/zh active Pending
- 2007-02-15 JP JP2009503694A patent/JP2009532973A/ja not_active Withdrawn
- 2007-02-15 US US12/295,995 patent/US8065531B2/en active Active
Also Published As
| Publication number | Publication date |
|---|---|
| US20090180610A1 (en) | 2009-07-16 |
| JP2009532973A (ja) | 2009-09-10 |
| EP2005291B1 (de) | 2010-06-23 |
| EP2005291A2 (de) | 2008-12-24 |
| CN101416154A (zh) | 2009-04-22 |
| WO2007113697A3 (en) | 2007-12-21 |
| KR20090006176A (ko) | 2009-01-14 |
| DE602007007310D1 (de) | 2010-08-05 |
| WO2007113697A2 (en) | 2007-10-11 |
| US8065531B2 (en) | 2011-11-22 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| ATE472133T1 (de) | Entschlüsselungsverfahren | |
| WO2009134937A3 (en) | Format-preserving cryptographic systems | |
| FI20075776A0 (fi) | Päästä-päähän salattu viestintä | |
| WO2010024874A3 (en) | Message authentication code pre-computation with applications to secure memory | |
| MA32613B1 (fr) | Creation de cle cryptographique | |
| GB2442546B (en) | Authenticated encryption method and apparatus | |
| ATE440336T1 (de) | Verfahren zum schutz von ic-karten vor leistungsanalyse-attacken | |
| EA201891822A1 (ru) | Безопасность персональных устройств с использованием криптографии на основе эллиптических кривых для разделения секрета | |
| WO2006081122A3 (en) | Method and system for deriving an encryption key using joint randomness not shared by others | |
| TW200618572A (en) | Tokens/keys for wireless communications | |
| WO2007121178A3 (en) | Methods for creating secret keys based upon one or more shared characteristics and system thereof | |
| RU2010100891A (ru) | Нечеткие ключи | |
| NZ596935A (en) | Generating an encryption/decryption key by comparing data sets received from a central server | |
| DE602005015560D1 (de) | Sclüsselbasierte verschlüsselung | |
| WO2008068655A3 (en) | Privacy enhanced comparison of data sets | |
| NZ603822A (en) | Permutation data transform to enhance security | |
| WO2010112739A9 (fr) | Procede pour effectuer une tache cryptographique dans un composant electronique | |
| WO2008114829A1 (ja) | 暗号装置、復号装置、暗号プログラム、復号プログラム、及び記録媒体 | |
| KR101362675B1 (ko) | 저전력 암호화 장치 및 방법 | |
| MY139625A (en) | Repetition coded compression for encrypting highly correlated data | |
| WO2007107976A3 (en) | Period keys | |
| CN108369784A (zh) | 具有密钥相关掩码计算步骤(sbox调用)的加密算法 | |
| MX2009011831A (es) | Metodo de autenticacion y dispositivo electronico para ejecutar la autenticacion. | |
| RU2009146386A (ru) | Защита выполнения криптографического вычисления | |
| ATE525825T1 (de) | Schutz für einen kryptografischen algorithmus |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| RER | Ceased as to paragraph 5 lit. 3 law introducing patent treaties |