ATE484794T1 - Vorrichtung und verfahren zur durchführung eines kryptographischen algorithmus - Google Patents

Vorrichtung und verfahren zur durchführung eines kryptographischen algorithmus

Info

Publication number
ATE484794T1
ATE484794T1 AT01976117T AT01976117T ATE484794T1 AT E484794 T1 ATE484794 T1 AT E484794T1 AT 01976117 T AT01976117 T AT 01976117T AT 01976117 T AT01976117 T AT 01976117T AT E484794 T1 ATE484794 T1 AT E484794T1
Authority
AT
Austria
Prior art keywords
mix columns
coprocessor
cpu
cryptographic algorithm
transformation
Prior art date
Application number
AT01976117T
Other languages
English (en)
Inventor
Antonio Valverde
Jean-Pierre Seifert
Original Assignee
Infineon Technologies Ag
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Infineon Technologies Ag filed Critical Infineon Technologies Ag
Application granted granted Critical
Publication of ATE484794T1 publication Critical patent/ATE484794T1/de

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/30Arrangements for executing machine instructions, e.g. instruction decode
    • G06F9/30003Arrangements for executing specific machine instructions
    • G06F9/30007Arrangements for executing specific machine instructions to perform operations on data operands
    • G06F9/30029Logical and Boolean instructions, e.g. XOR, NOT
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/30Arrangements for executing machine instructions, e.g. instruction decode
    • G06F9/30003Arrangements for executing specific machine instructions
    • G06F9/30007Arrangements for executing specific machine instructions to perform operations on data operands
    • G06F9/30032Movement instructions, e.g. MOVE, SHIFT, ROTATE, SHUFFLE
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/30Arrangements for executing machine instructions, e.g. instruction decode
    • G06F9/38Concurrent instruction execution, e.g. pipeline or look ahead
    • G06F9/3877Concurrent instruction execution, e.g. pipeline or look ahead using a slave processor, e.g. coprocessor
    • G06F9/3879Concurrent instruction execution, e.g. pipeline or look ahead using a slave processor, e.g. coprocessor for non-native instruction execution, e.g. executing a command; for Java instruction set
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/002Countermeasures against attacks on cryptographic mechanisms
    • H04L9/003Countermeasures against attacks on cryptographic mechanisms for power analysis, e.g. differential power analysis [DPA] or simple power analysis [SPA]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/002Countermeasures against attacks on cryptographic mechanisms
    • H04L9/005Countermeasures against attacks on cryptographic mechanisms for timing attacks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0618Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
    • H04L9/0631Substitution permutation network [SPN], i.e. cipher composed of a number of stages or rounds each involving linear and nonlinear transformations, e.g. AES algorithms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/04Masking or blinding
    • H04L2209/046Masking or blinding of operations, operands or results of the operations
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/12Details relating to cryptographic hardware or logic circuitry
    • H04L2209/125Parallelization or pipelining, e.g. for accelerating processing of cryptographic operations

Landscapes

  • Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)
  • Complex Calculations (AREA)
  • Circuits Of Receivers In General (AREA)
AT01976117T 2001-08-20 2001-08-20 Vorrichtung und verfahren zur durchführung eines kryptographischen algorithmus ATE484794T1 (de)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/EP2001/009583 WO2003019357A1 (en) 2001-08-20 2001-08-20 Apparatus and method for performing a cryptographic algorithm

Publications (1)

Publication Number Publication Date
ATE484794T1 true ATE484794T1 (de) 2010-10-15

Family

ID=8164554

Family Applications (1)

Application Number Title Priority Date Filing Date
AT01976117T ATE484794T1 (de) 2001-08-20 2001-08-20 Vorrichtung und verfahren zur durchführung eines kryptographischen algorithmus

Country Status (4)

Country Link
EP (1) EP1419436B1 (de)
AT (1) ATE484794T1 (de)
DE (1) DE60143275D1 (de)
WO (1) WO2003019357A1 (de)

Families Citing this family (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TW527783B (en) * 2001-10-04 2003-04-11 Ind Tech Res Inst Encryption/deciphering device capable of supporting advanced encryption standard
KR100594265B1 (ko) 2004-03-16 2006-06-30 삼성전자주식회사 매스킹 방법이 적용된 데이터 암호처리장치, aes암호시스템 및 aes 암호방법.
US7949130B2 (en) 2006-12-28 2011-05-24 Intel Corporation Architecture and instruction set for implementing advanced encryption standard (AES)
US8538015B2 (en) 2007-03-28 2013-09-17 Intel Corporation Flexible architecture and instruction for advanced encryption standard (AES)
US8787565B2 (en) 2007-08-20 2014-07-22 Intel Corporation Method and apparatus for generating an advanced encryption standard (AES) key schedule
US8624624B1 (en) 2011-08-26 2014-01-07 Lockheed Martin Corporation Power isolation during sensitive operations
US8525545B1 (en) 2011-08-26 2013-09-03 Lockheed Martin Corporation Power isolation during sensitive operations

Also Published As

Publication number Publication date
DE60143275D1 (de) 2010-11-25
WO2003019357A1 (en) 2003-03-06
EP1419436B1 (de) 2010-10-13
EP1419436A1 (de) 2004-05-19

Similar Documents

Publication Publication Date Title
DE602006008599D1 (de) Verfahren zum Schutz von IC-Karten vor Leistungsanalyse-Attacken
EP2207087B1 (de) Verfahren zum Schutz einer kryptografischen Vorrichtung gegen SPA-, DPA- und Zeitangriffe
DE60313519D1 (de) Verfahren zur Erzeugung eines Schlüssels, Inhaltsbereitstellungsverfahren, Entschlüsselungsverfahren für verschlüsselte Inhalte, Verfahren zur Erkennung von illegalen Benutzern, System zum Bereitstellen von Inhalten, Benutzersystem, Verfahren zur Ablaufverfolgung, Verschlüsselungsgerät, Entschlüsselungsgerät, und Computerprogramm
DE602004031729D1 (de) Gerät und verfahren für auswählbare hardware-beschleuniger in einer datengesteuerten architektur
EP1469371A3 (de) Mikroprozessorvorrichtung und Verfahren zur Durchführung kryptographischer Funktionen zur Blockchiffrierung
DE60001393D1 (de) Verfahren zur überwachung des programmablaufs
ATE341134T1 (de) Vorrichtung und verfahren zur dynamischen verschlüsselung
BR0213057A (pt) Sistema, dispositivo portátil e método para autentificação, criptografia e assinatura digitais, através da geração de chaves criptográficas de curta duração
CN1989726A (zh) 用于执行加密计算的方法和装置
EP2637349A2 (de) Kryptographieverarbeitungsvorrichtung
DE602005023166D1 (de) System und Verfahren zur Verschlüsselung von Tastenanschlägen bezüglich eines Passworts
ATE389986T1 (de) Verfahren und vorrichtung zur erzeugung und gemeinsamen nutzung eines systemschlüssels in einem drm-system
CA2578316A1 (en) Table splitting for cryptographic processes
ATE484794T1 (de) Vorrichtung und verfahren zur durchführung eines kryptographischen algorithmus
EP2119100A4 (de) Verfahren und vorrichtung zur durchführung einer skalarmultiplikation auf einer elliptischen kurve mittels teilung
Wiemers et al. Entropy reduction for the correlation-enhanced power analysis collision attack
EP3291478A1 (de) Software-schutz gegen differenzielle fehleranalyse
RU2003131278A (ru) Способ шифрования данных
DE60237494D1 (de) Vorrichtung, Verfahren und Rechnerprogramm zum Anzeigen von Signalverarbeitungsdaten
DE602004011965D1 (de) Verfahren und schaltung zum identifizieren und/oder verifizieren von hardware und/oder software eines geräts und eines mit dem gerät arbeitenden datenträgers
WO2005067414A3 (en) System and method for high speed reversible data encryption
TW200512648A (en) Microprocessor apparatus and method for performing block cipher cryptographic functions
Maro Modelling of power consumption for Advanced Encryption Standard and PRESENT ciphers
Bucci et al. Testing power-analysis attack susceptibility in register-transfer level designs
TW200517948A (en) Microprocessor apparatus and method for employing configurable block cipher cryptographic algorithms

Legal Events

Date Code Title Description
RER Ceased as to paragraph 5 lit. 3 law introducing patent treaties