ATE527594T1 - Verfahren und vorrichtung zur erzeugung eines öffentlichen schlüssel gegen leistungsanalyseangriffe - Google Patents
Verfahren und vorrichtung zur erzeugung eines öffentlichen schlüssel gegen leistungsanalyseangriffeInfo
- Publication number
- ATE527594T1 ATE527594T1 AT08733545T AT08733545T ATE527594T1 AT E527594 T1 ATE527594 T1 AT E527594T1 AT 08733545 T AT08733545 T AT 08733545T AT 08733545 T AT08733545 T AT 08733545T AT E527594 T1 ATE527594 T1 AT E527594T1
- Authority
- AT
- Austria
- Prior art keywords
- public key
- generating
- analysis attacks
- performance analysis
- private key
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F7/00—Methods or arrangements for processing data by operating upon the order or content of the data handled
- G06F7/60—Methods or arrangements for performing computations using a digital non-denominational number representation, i.e. number representation without radix; Computing devices using combinations of denominational and non-denominational quantity representations, e.g. using difunction pulse trains, STEELE computers, phase computers
- G06F7/72—Methods or arrangements for performing computations using a digital non-denominational number representation, i.e. number representation without radix; Computing devices using combinations of denominational and non-denominational quantity representations, e.g. using difunction pulse trains, STEELE computers, phase computers using residue arithmetic
- G06F7/724—Finite field arithmetic
- G06F7/725—Finite field arithmetic over elliptic curves
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/002—Countermeasures against attacks on cryptographic mechanisms
- H04L9/003—Countermeasures against attacks on cryptographic mechanisms for power analysis, e.g. differential power analysis [DPA] or simple power analysis [SPA]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
- H04L9/3066—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2207/00—Indexing scheme relating to methods or arrangements for processing data by operating upon the order or content of the data handled
- G06F2207/72—Indexing scheme relating to groups G06F7/72 - G06F7/729
- G06F2207/7219—Countermeasures against side channel or fault attacks
- G06F2207/7261—Uniform execution, e.g. avoiding jumps, or using formulae with the same power profile
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/80—Wireless
- H04L2209/805—Lightweight hardware, e.g. radio-frequency identification [RFID] or sensor
Landscapes
- Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Mathematical Analysis (AREA)
- Pure & Applied Mathematics (AREA)
- Mathematical Optimization (AREA)
- Computer Security & Cryptography (AREA)
- Computational Mathematics (AREA)
- Mathematical Physics (AREA)
- Computing Systems (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Algebra (AREA)
- General Engineering & Computer Science (AREA)
- Mobile Radio Communication Systems (AREA)
- Input From Keyboards Or The Like (AREA)
- Supply And Distribution Of Alternating Current (AREA)
- Complex Calculations (AREA)
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US89329707P | 2007-03-06 | 2007-03-06 | |
US12/039,998 US8050403B2 (en) | 2007-03-06 | 2008-02-29 | Method and apparatus for generating a public key in a manner that counters power analysis attacks |
PCT/CA2008/000441 WO2008106789A1 (en) | 2007-03-06 | 2008-03-06 | Method and apparatus for generating a public key in a manner that counters power analysis attacks |
Publications (1)
Publication Number | Publication Date |
---|---|
ATE527594T1 true ATE527594T1 (de) | 2011-10-15 |
Family
ID=39737743
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
AT08733545T ATE527594T1 (de) | 2007-03-06 | 2008-03-06 | Verfahren und vorrichtung zur erzeugung eines öffentlichen schlüssel gegen leistungsanalyseangriffe |
Country Status (5)
Country | Link |
---|---|
US (2) | US8050403B2 (de) |
EP (1) | EP2119098B1 (de) |
AT (1) | ATE527594T1 (de) |
CA (1) | CA2680045C (de) |
WO (1) | WO2008106789A1 (de) |
Families Citing this family (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8050403B2 (en) | 2007-03-06 | 2011-11-01 | Research In Motion Limited | Method and apparatus for generating a public key in a manner that counters power analysis attacks |
US7991162B2 (en) * | 2007-09-14 | 2011-08-02 | University Of Ottawa | Accelerating scalar multiplication on elliptic curve cryptosystems over prime fields |
US7991154B2 (en) * | 2008-05-14 | 2011-08-02 | Univeristy of Castilla-La Mancha | Exponentiation method using multibase number representation |
US8548160B2 (en) * | 2010-01-13 | 2013-10-01 | Microsoft Corporation | Determination of pairings on a curve using aggregated inversions |
WO2012090288A1 (ja) | 2010-12-27 | 2012-07-05 | 富士通株式会社 | 暗号処理装置、暗号処理方法、およびプログラム |
US10148285B1 (en) | 2012-07-25 | 2018-12-04 | Erich Schmitt | Abstraction and de-abstraction of a digital data stream |
US10795858B1 (en) | 2014-02-18 | 2020-10-06 | Erich Schmitt | Universal abstraction and de-abstraction of a digital data stream |
US9531531B2 (en) * | 2015-05-06 | 2016-12-27 | Qualcomm Incorporated | Methods and devices for fixed execution flow multiplier recoding and scalar multiplication |
WO2018145189A1 (en) * | 2017-02-13 | 2018-08-16 | Infosec Global Inc. | Countermeasures and optimizations in elliptic curve cryptographic schemes |
US10635404B2 (en) * | 2017-06-29 | 2020-04-28 | Intel Corporation | Mixed-coordinate point multiplication |
CN108964872B (zh) * | 2018-07-23 | 2020-05-26 | 武汉大学 | 一种基于aes的加密方法及装置 |
CN116522351A (zh) * | 2022-01-20 | 2023-08-01 | 瑞昱半导体股份有限公司 | 降低成功率的方法、密码系统处理电路及电子装置 |
Family Cites Families (18)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP3796993B2 (ja) * | 1998-12-22 | 2006-07-12 | 株式会社日立製作所 | 楕円曲線暗号実行方法及び装置並びに記録媒体 |
US6490352B1 (en) | 1999-03-05 | 2002-12-03 | Richard Schroeppel | Cryptographic elliptic curve apparatus and method |
US7200225B1 (en) | 1999-11-12 | 2007-04-03 | Richard Schroeppel | Elliptic curve point ambiguity resolution apparatus and method |
EP1267515A3 (de) * | 2000-01-21 | 2004-04-07 | Sony Computer Entertainment Inc. | Verfahren und Vorrichtung zur symmetrischen Verschlüsselung/Entschlüsselung von aufgezeichneten Daten |
US7308096B2 (en) * | 2000-05-30 | 2007-12-11 | Hitachi, Ltd. | Elliptic scalar multiplication system |
JP4067818B2 (ja) * | 2001-12-10 | 2008-03-26 | 富士通株式会社 | 楕円曲線暗号装置、楕円曲線暗号プログラム及び楕円曲線暗号の演算方法 |
WO2004055756A1 (ja) | 2002-12-18 | 2004-07-01 | Fujitsu Limited | 秘密鍵を用いた耐タンパ楕円曲線暗号処理 |
KR100720726B1 (ko) | 2003-10-09 | 2007-05-22 | 삼성전자주식회사 | Rsa 알고리즘을 이용한 보안유지시스템 및 그 방법 |
KR100530372B1 (ko) * | 2003-12-20 | 2005-11-22 | 삼성전자주식회사 | 사이드채널 공격을 방지할 수 있는 타원곡선 암호화 방법 |
US7885411B2 (en) | 2004-04-02 | 2011-02-08 | Research In Motion Limited | Key agreement and re-keying over a bidirectional communication path |
JP3958754B2 (ja) | 2004-04-09 | 2007-08-15 | リンナイ株式会社 | 筒状バーナ |
EP1587237B1 (de) | 2004-04-16 | 2006-12-13 | Research In Motion Limited | Sicherheitsgegenmassnahmen gegen Angriffe durch Stromverbrauchsanalysen |
ATE345620T1 (de) | 2004-05-24 | 2006-12-15 | Research In Motion Ltd | Tabellenmaskierung zur beständigkeit gegen angriffe durch analyse der leistungsaufnahme. |
JP2006145945A (ja) * | 2004-11-22 | 2006-06-08 | Sony Corp | 暗号処理演算方法、および暗号処理装置、並びにコンピュータ・プログラム |
JP4825199B2 (ja) * | 2005-04-27 | 2011-11-30 | パナソニック株式会社 | 情報セキュリティ装置及び楕円曲線演算装置 |
CA2542556C (en) | 2005-06-03 | 2014-09-16 | Tata Consultancy Services Limited | An authentication system executing an elliptic curve digital signature cryptographic process |
US7602907B2 (en) | 2005-07-01 | 2009-10-13 | Microsoft Corporation | Elliptic curve point multiplication |
US8050403B2 (en) | 2007-03-06 | 2011-11-01 | Research In Motion Limited | Method and apparatus for generating a public key in a manner that counters power analysis attacks |
-
2008
- 2008-02-29 US US12/039,998 patent/US8050403B2/en active Active
- 2008-03-06 EP EP08733545A patent/EP2119098B1/de active Active
- 2008-03-06 WO PCT/CA2008/000441 patent/WO2008106789A1/en active Application Filing
- 2008-03-06 AT AT08733545T patent/ATE527594T1/de not_active IP Right Cessation
- 2008-03-06 CA CA2680045A patent/CA2680045C/en active Active
-
2011
- 2011-10-20 US US13/277,434 patent/US8379849B2/en active Active
Also Published As
Publication number | Publication date |
---|---|
EP2119098B1 (de) | 2011-10-05 |
CA2680045C (en) | 2014-07-15 |
EP2119098A1 (de) | 2009-11-18 |
EP2119098A4 (de) | 2010-11-10 |
WO2008106789A1 (en) | 2008-09-12 |
US20120033808A1 (en) | 2012-02-09 |
US8050403B2 (en) | 2011-11-01 |
US8379849B2 (en) | 2013-02-19 |
CA2680045A1 (en) | 2008-09-12 |
US20080219438A1 (en) | 2008-09-11 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
ATE527594T1 (de) | Verfahren und vorrichtung zur erzeugung eines öffentlichen schlüssel gegen leistungsanalyseangriffe | |
ATE527776T1 (de) | Verfahren und vorrichtung zur durchführung einer skalarmultiplikation auf einer elliptischen kurve mittels teilung | |
ATE464599T1 (de) | Verfahren zur skalarmultiplikation in gruppen elliptischer kurven über primkörpern für nebenkanal-attacken-beständige kryptosysteme | |
EP2348447A3 (de) | Computerimplementiertes Verfahren zur Erzeugung eines Pseudonyms, computerlesbares Speichermedium und Computersystem | |
DE602008000738D1 (de) | Beschleunigung von Berechnungen im Galois-Counter-Modus | |
ATE519134T1 (de) | Erzeugung eines absorptionsparametermodells | |
EA200800435A1 (ru) | Моделирование скважины, связанное с добычей углеводородов из подземных формаций | |
ATE472133T1 (de) | Entschlüsselungsverfahren | |
TW200703037A (en) | Cryptographically secure modular polynomial reduction method and computational hardware for executing the same | |
EA201391828A1 (ru) | Способ генерации истинно случайных чисел на основе портативного прибора на микроструктуре и выделения шумов цифровых изображений | |
RU2011148528A (ru) | Способ и система защиты криптографического устройства | |
ATE370569T1 (de) | Verfahren zum erzeugen einer stromverschlüsselung mit mehreren schlüsseln | |
DE112006003522A5 (de) | Vorrichtung zur Erzeugung von elektrischer Energie | |
DE602004027736D1 (de) | System zur erzeugung von schockwellen | |
ATE515838T1 (de) | Vereinfachte beeinträchtigungsmatrixberechnung zur sinr-schätzung | |
SG152272A1 (en) | Secure license key method and system | |
EP2209251A3 (de) | Kryptographische Verarbeitungsvorrichtung und kryptographisches Verarbeitungsverfahren | |
DE502006007709D1 (de) | Verfahren, vorrichtung und system zum verifizieren von auf einer elliptischen kurve ermittelten punkten | |
ATE377307T1 (de) | Gegenmassnahmeverfahren in einem elektronischen baustein zur ausführung eines krypto-algorithmus mit geheimschlüssel | |
WO2007020564A3 (en) | Circuit arrangement and method for rsa key generation | |
ATE426202T1 (de) | Gegen seitenkanalangriffe geschutztes kryptographisches verfahren | |
ATE472769T1 (de) | Verbesserte natürliche montgomery- exponentenmaskierung | |
CN104683102A (zh) | 一种sm2签名计算方法和装置 | |
TW200631343A (en) | Apparatus and method for estimating a clipping parameter of an OFDM system | |
ATE539421T1 (de) | Daten verarbeitende vorrichtung und verfahren zum betreiben einer daten verarbeitenden vorrichtung |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
RER | Ceased as to paragraph 5 lit. 3 law introducing patent treaties |