AU2002220805A1 - Counter-measure method in an electronic component using a secret key encryption algorithm - Google Patents
Counter-measure method in an electronic component using a secret key encryption algorithmInfo
- Publication number
- AU2002220805A1 AU2002220805A1 AU2002220805A AU2080502A AU2002220805A1 AU 2002220805 A1 AU2002220805 A1 AU 2002220805A1 AU 2002220805 A AU2002220805 A AU 2002220805A AU 2080502 A AU2080502 A AU 2080502A AU 2002220805 A1 AU2002220805 A1 AU 2002220805A1
- Authority
- AU
- Australia
- Prior art keywords
- secret key
- counter
- electronic component
- encryption algorithm
- key encryption
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0618—Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
- H04L9/0625—Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation with splitting of the data block into left and right halves, e.g. Feistel based algorithms, DES, FEAL, IDEA or KASUMI
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/002—Countermeasures against attacks on cryptographic mechanisms
- H04L9/003—Countermeasures against attacks on cryptographic mechanisms for power analysis, e.g. differential power analysis [DPA] or simple power analysis [SPA]
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Storage Device Security (AREA)
- Credit Cards Or The Like (AREA)
- Measurement Of Resistance Or Impedance (AREA)
- Collating Specific Patterns (AREA)
Abstract
The invention concerns a method for efficiently shifting from a boolean data representation to an arithmetic data representation and inversely. Said representations are frequently used in the context of a secret key algorithm which must be protected against differential power analysis. The invention is particularly designed to be used in an electronic portable object such as a smart card.
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
FR0016579 | 2000-12-19 | ||
FR0016579A FR2818472B1 (en) | 2000-12-19 | 2000-12-19 | COUNTER-MEASUREMENT METHOD IN AN ELECTRONIC COMPONENT USING A SECRET KEY CRYPTOGRAPHY ALGORITHM |
PCT/FR2001/003646 WO2002051064A1 (en) | 2000-12-19 | 2001-11-20 | Counter-measure method in an electronic component using a secret key encryption algorithm |
Publications (1)
Publication Number | Publication Date |
---|---|
AU2002220805A1 true AU2002220805A1 (en) | 2002-07-01 |
Family
ID=8857863
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
AU2002220805A Abandoned AU2002220805A1 (en) | 2000-12-19 | 2001-11-20 | Counter-measure method in an electronic component using a secret key encryption algorithm |
Country Status (7)
Country | Link |
---|---|
EP (1) | EP1348275B1 (en) |
AT (1) | ATE445941T1 (en) |
AU (1) | AU2002220805A1 (en) |
DE (1) | DE60140210D1 (en) |
ES (1) | ES2335082T3 (en) |
FR (1) | FR2818472B1 (en) |
WO (1) | WO2002051064A1 (en) |
Families Citing this family (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
DE10341096A1 (en) * | 2003-09-05 | 2005-03-31 | Giesecke & Devrient Gmbh | Transition between masked representations of a value in cryptographic calculations |
DE102004052196B4 (en) * | 2004-10-27 | 2017-04-06 | Giesecke & Devrient Gmbh | Anti-spyware execution of operations using a mask-assisting arithmetic unit |
EP2634953A1 (en) | 2012-03-02 | 2013-09-04 | Gemalto SA | Countermeasure method against side channel analysis for cryptographic algorithms using boolean operations and arithmetic operations |
-
2000
- 2000-12-19 FR FR0016579A patent/FR2818472B1/en not_active Expired - Fee Related
-
2001
- 2001-11-20 EP EP01271712A patent/EP1348275B1/en not_active Expired - Lifetime
- 2001-11-20 AU AU2002220805A patent/AU2002220805A1/en not_active Abandoned
- 2001-11-20 AT AT01271712T patent/ATE445941T1/en not_active IP Right Cessation
- 2001-11-20 ES ES01271712T patent/ES2335082T3/en not_active Expired - Lifetime
- 2001-11-20 WO PCT/FR2001/003646 patent/WO2002051064A1/en not_active Application Discontinuation
- 2001-11-20 DE DE60140210T patent/DE60140210D1/en not_active Expired - Lifetime
Also Published As
Publication number | Publication date |
---|---|
FR2818472B1 (en) | 2003-02-14 |
ES2335082T3 (en) | 2010-03-22 |
FR2818472A1 (en) | 2002-06-21 |
EP1348275A1 (en) | 2003-10-01 |
DE60140210D1 (en) | 2009-11-26 |
ATE445941T1 (en) | 2009-10-15 |
WO2002051064A1 (en) | 2002-06-27 |
EP1348275B1 (en) | 2009-10-14 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2004038975A3 (en) | Efficient encryption and authentication for data processing systems | |
WO2004061628A3 (en) | Attestation using both fixed token and portable token | |
ATE205309T1 (en) | DIGITAL SIGNATURE METHOD WHICH USES A CERTIFICATION OF THE DIGITAL TIME WHEN DIGITAL SIGNING | |
HK1068994A1 (en) | Data processing system and method | |
IL164071A0 (en) | Use of isogenies for design of cryptosystems | |
EP1158743A3 (en) | Computing system and data decryption method and computer system with remote copy facility | |
DE60217360D1 (en) | PERSONAL DESIGN OF ELECTRONIC EQUIPMENT AND INTELLIGENT COVER | |
DE69021936D1 (en) | Method and system for data transmission. | |
CA2367778A1 (en) | Secure content objects | |
DE60142918D1 (en) | DEVICE FOR MATERIAL SECURING OF A COMPUTER | |
WO2001061914A3 (en) | Method and apparatus for balanced electronic operations | |
EP1220079A3 (en) | Method for sharing encrypted data region among processes in tamper resistant processor | |
IL152092A0 (en) | Secure data transmission system and method | |
MY127180A (en) | Methods and apparatus for facilitating data communications between a data storage device and an information-processing apparatus | |
GB0401498D0 (en) | Smart cards having protection circuits therein that inhibit power analysis attacks and methods of operating same | |
EP1251422A3 (en) | Copyright protection system and method thereof | |
EP1369829A3 (en) | Electronic value data communication method and system between IC cards | |
EP1441303A4 (en) | Information processing terminal or control method thereof | |
AU2002220805A1 (en) | Counter-measure method in an electronic component using a secret key encryption algorithm | |
Wei et al. | Image encryption based on chaotic map and reversible integer wavelet transform | |
DE69733424D1 (en) | DATA GRAPHIC RELATIONS PROCESS | |
AU2002225850A1 (en) | Electronic file protection using location | |
WO2009015979A3 (en) | Method, computerized device and computer program for efficient and low power encrypting or decrypting of data | |
WO2004064011A3 (en) | Method of constructing hyperelliptic curves suitable for cryptographic purposes and cryptographic apparatus using such a method | |
WO2002071231A8 (en) | Method and arrangement for protecting information |