CN101911009A - 用于以签名方案进行非对称加密的对策方法和设备 - Google Patents
用于以签名方案进行非对称加密的对策方法和设备 Download PDFInfo
- Publication number
- CN101911009A CN101911009A CN2009801023050A CN200980102305A CN101911009A CN 101911009 A CN101911009 A CN 101911009A CN 2009801023050 A CN2009801023050 A CN 2009801023050A CN 200980102305 A CN200980102305 A CN 200980102305A CN 101911009 A CN101911009 A CN 101911009A
- Authority
- CN
- China
- Prior art keywords
- parameter
- generate
- output data
- sequence
- value
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 66
- 238000010586 diagram Methods 0.000 title 1
- 230000006870 function Effects 0.000 claims description 82
- 238000006243 chemical reaction Methods 0.000 claims description 35
- 230000009466 transformation Effects 0.000 claims description 12
- 238000005516 engineering process Methods 0.000 description 6
- 238000004458 analytical method Methods 0.000 description 5
- 230000015572 biosynthetic process Effects 0.000 description 5
- 238000002347 injection Methods 0.000 description 5
- 239000007924 injection Substances 0.000 description 5
- 230000000873 masking effect Effects 0.000 description 4
- 230000003044 adaptive effect Effects 0.000 description 3
- 238000007689 inspection Methods 0.000 description 3
- 230000004048 modification Effects 0.000 description 3
- 238000012986 modification Methods 0.000 description 3
- 230000008569 process Effects 0.000 description 3
- 241001269238 Data Species 0.000 description 2
- 239000000654 additive Substances 0.000 description 2
- 230000000996 additive effect Effects 0.000 description 2
- 230000008859 change Effects 0.000 description 2
- 238000010276 construction Methods 0.000 description 2
- 239000011159 matrix material Substances 0.000 description 2
- 239000000243 solution Substances 0.000 description 2
- TVZRAEYQIKYCPH-UHFFFAOYSA-N 3-(trimethylsilyl)propane-1-sulfonic acid Chemical compound C[Si](C)(C)CCCS(O)(=O)=O TVZRAEYQIKYCPH-UHFFFAOYSA-N 0.000 description 1
- 230000009471 action Effects 0.000 description 1
- 230000006399 behavior Effects 0.000 description 1
- 230000008901 benefit Effects 0.000 description 1
- 230000005540 biological transmission Effects 0.000 description 1
- 238000004364 calculation method Methods 0.000 description 1
- 125000004122 cyclic group Chemical group 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 238000001514 detection method Methods 0.000 description 1
- 238000005265 energy consumption Methods 0.000 description 1
- 238000000605 extraction Methods 0.000 description 1
- 230000006872 improvement Effects 0.000 description 1
- 238000012545 processing Methods 0.000 description 1
- 230000001172 regenerating effect Effects 0.000 description 1
- 238000011160 research Methods 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F7/00—Methods or arrangements for processing data by operating upon the order or content of the data handled
- G06F7/60—Methods or arrangements for performing computations using a digital non-denominational number representation, i.e. number representation without radix; Computing devices using combinations of denominational and non-denominational quantity representations, e.g. using difunction pulse trains, STEELE computers, phase computers
- G06F7/72—Methods or arrangements for performing computations using a digital non-denominational number representation, i.e. number representation without radix; Computing devices using combinations of denominational and non-denominational quantity representations, e.g. using difunction pulse trains, STEELE computers, phase computers using residue arithmetic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/002—Countermeasures against attacks on cryptographic mechanisms
- H04L9/003—Countermeasures against attacks on cryptographic mechanisms for power analysis, e.g. differential power analysis [DPA] or simple power analysis [SPA]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
- H04L9/3006—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters
- H04L9/3013—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters involving the discrete logarithm problem, e.g. ElGamal or Diffie-Hellman systems
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
- H04L9/3252—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures using DSA or related signature schemes, e.g. elliptic based signatures, ElGamal or Schnorr schemes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2207/00—Indexing scheme relating to methods or arrangements for processing data by operating upon the order or content of the data handled
- G06F2207/72—Indexing scheme relating to groups G06F7/72 - G06F7/729
- G06F2207/7219—Countermeasures against side channel or fault attacks
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F7/00—Methods or arrangements for processing data by operating upon the order or content of the data handled
- G06F7/60—Methods or arrangements for performing computations using a digital non-denominational number representation, i.e. number representation without radix; Computing devices using combinations of denominational and non-denominational quantity representations, e.g. using difunction pulse trains, STEELE computers, phase computers
- G06F7/72—Methods or arrangements for performing computations using a digital non-denominational number representation, i.e. number representation without radix; Computing devices using combinations of denominational and non-denominational quantity representations, e.g. using difunction pulse trains, STEELE computers, phase computers using residue arithmetic
- G06F7/722—Modular multiplication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F7/00—Methods or arrangements for processing data by operating upon the order or content of the data handled
- G06F7/60—Methods or arrangements for performing computations using a digital non-denominational number representation, i.e. number representation without radix; Computing devices using combinations of denominational and non-denominational quantity representations, e.g. using difunction pulse trains, STEELE computers, phase computers
- G06F7/72—Methods or arrangements for performing computations using a digital non-denominational number representation, i.e. number representation without radix; Computing devices using combinations of denominational and non-denominational quantity representations, e.g. using difunction pulse trains, STEELE computers, phase computers using residue arithmetic
- G06F7/724—Finite field arithmetic
- G06F7/725—Finite field arithmetic over elliptic curves
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/04—Masking or blinding
- H04L2209/046—Masking or blinding of operations, operands or results of the operations
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- Computing Systems (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- General Physics & Mathematics (AREA)
- Computational Mathematics (AREA)
- Mathematical Analysis (AREA)
- Mathematical Optimization (AREA)
- Pure & Applied Mathematics (AREA)
- Mathematical Physics (AREA)
- General Engineering & Computer Science (AREA)
- Storage Device Security (AREA)
Abstract
Description
Claims (23)
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
FR0800345 | 2008-01-23 | ||
FR0800345A FR2926652B1 (fr) | 2008-01-23 | 2008-01-23 | Procede et dispositifs de contre-mesure pour cryptographie asymetrique a schema de signature |
PCT/FR2009/000072 WO2009109715A2 (fr) | 2008-01-23 | 2009-01-23 | Procede et dispositifs de contre-mesure pour cryptographie asymetrique a schema de signature |
Publications (2)
Publication Number | Publication Date |
---|---|
CN101911009A true CN101911009A (zh) | 2010-12-08 |
CN101911009B CN101911009B (zh) | 2012-10-10 |
Family
ID=39720608
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN2009801023050A Active CN101911009B (zh) | 2008-01-23 | 2009-01-23 | 用于以签名方案进行非对称加密的对策方法和设备 |
Country Status (8)
Country | Link |
---|---|
US (1) | US20110170685A1 (zh) |
EP (1) | EP2248008A2 (zh) |
JP (1) | JP2011510579A (zh) |
KR (1) | KR20100117589A (zh) |
CN (1) | CN101911009B (zh) |
CA (1) | CA2712180A1 (zh) |
FR (1) | FR2926652B1 (zh) |
WO (1) | WO2009109715A2 (zh) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105739946A (zh) * | 2014-12-08 | 2016-07-06 | 展讯通信(上海)有限公司 | 随机数生成方法及装置 |
CN107317671A (zh) * | 2017-08-22 | 2017-11-03 | 兆讯恒达微电子技术(北京)有限公司 | 防御旁路攻击的crc运算电路装置和方法 |
CN109768988A (zh) * | 2019-02-26 | 2019-05-17 | 安捷光通科技成都有限公司 | 去中心化物联网安全认证系统、设备注册和身份认证方法 |
CN111183413A (zh) * | 2017-08-03 | 2020-05-19 | 西门子股份公司 | 用于在计算机中执行程序的方法 |
Families Citing this family (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP2657925B1 (en) * | 2010-12-24 | 2018-05-16 | Mitsubishi Electric Corporation | Signature generating device, method of generating signature, and recording medium |
FR2980602B1 (fr) * | 2011-09-28 | 2015-06-26 | Oberthur Technologies | Procede de communication avec une entite electronique portable |
US8886924B1 (en) * | 2011-11-15 | 2014-11-11 | The Boeing Company | System and method for transmitting an alert |
FR3095709B1 (fr) * | 2019-05-03 | 2021-09-17 | Commissariat Energie Atomique | Procédé et système de masquage pour la cryptographie |
Family Cites Families (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5991415A (en) * | 1997-05-12 | 1999-11-23 | Yeda Research And Development Co. Ltd. At The Weizmann Institute Of Science | Method and apparatus for protecting public key schemes from timing and fault attacks |
US6144740A (en) * | 1998-05-20 | 2000-11-07 | Network Security Technology Co. | Method for designing public key cryptosystems against fault-based attacks with an implementation |
JP4671571B2 (ja) * | 1999-09-29 | 2011-04-20 | 株式会社日立製作所 | 秘密情報の処理装置および秘密情報の処理プログラムを格納するメモリ |
FR2829335A1 (fr) * | 2001-09-06 | 2003-03-07 | St Microelectronics Sa | Procede de brouillage d'un calcul a quantite secrete |
JP4086503B2 (ja) * | 2002-01-15 | 2008-05-14 | 富士通株式会社 | 暗号演算装置及び方法並びにプログラム |
AU2003304629A1 (en) * | 2003-07-22 | 2005-02-04 | Fujitsu Limited | Tamper-resistant encryption using individual key |
JP2008512060A (ja) * | 2004-08-27 | 2008-04-17 | 株式会社エヌ・ティ・ティ・ドコモ | 仮署名スキーム |
KR100891323B1 (ko) * | 2005-05-11 | 2009-03-31 | 삼성전자주식회사 | 이진 필드 ecc에서 랜덤 포인트 표현을 이용하여 파워해독의 복잡도를 증가시키기 위한 암호화 방법 및 장치 |
US7404089B1 (en) * | 2005-06-03 | 2008-07-22 | Pitney Bowes Inc. | Method and system for protecting against side channel attacks when performing cryptographic operations |
WO2007045258A1 (en) * | 2005-10-18 | 2007-04-26 | Telecom Italia S.P.A. | A method for scalar multiplication in elliptic curve groups over prime fields for side-channel attack resistant cryptosystems |
EP1840732A1 (en) * | 2006-03-31 | 2007-10-03 | Axalto SA | Protection against side channel attacks |
US20080104402A1 (en) * | 2006-09-28 | 2008-05-01 | Shay Gueron | Countermeasure against fault-based attack on RSA signature verification |
US8139763B2 (en) * | 2007-10-10 | 2012-03-20 | Spansion Llc | Randomized RSA-based cryptographic exponentiation resistant to side channel and fault attacks |
US8091139B2 (en) * | 2007-11-01 | 2012-01-03 | Discretix Technologies Ltd. | System and method for masking arbitrary Boolean functions |
-
2008
- 2008-01-23 FR FR0800345A patent/FR2926652B1/fr active Active
-
2009
- 2009-01-23 KR KR1020107017062A patent/KR20100117589A/ko not_active Application Discontinuation
- 2009-01-23 WO PCT/FR2009/000072 patent/WO2009109715A2/fr active Application Filing
- 2009-01-23 JP JP2010543544A patent/JP2011510579A/ja active Pending
- 2009-01-23 EP EP09718480A patent/EP2248008A2/fr not_active Withdrawn
- 2009-01-23 CA CA2712180A patent/CA2712180A1/fr not_active Abandoned
- 2009-01-23 CN CN2009801023050A patent/CN101911009B/zh active Active
-
2010
- 2010-07-21 US US12/840,407 patent/US20110170685A1/en not_active Abandoned
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105739946A (zh) * | 2014-12-08 | 2016-07-06 | 展讯通信(上海)有限公司 | 随机数生成方法及装置 |
CN111183413A (zh) * | 2017-08-03 | 2020-05-19 | 西门子股份公司 | 用于在计算机中执行程序的方法 |
CN111183413B (zh) * | 2017-08-03 | 2023-09-01 | 西门子股份公司 | 用于在计算机中执行程序的方法 |
CN107317671A (zh) * | 2017-08-22 | 2017-11-03 | 兆讯恒达微电子技术(北京)有限公司 | 防御旁路攻击的crc运算电路装置和方法 |
CN107317671B (zh) * | 2017-08-22 | 2019-12-24 | 兆讯恒达微电子技术(北京)有限公司 | 防御旁路攻击的crc运算电路装置和方法 |
CN109768988A (zh) * | 2019-02-26 | 2019-05-17 | 安捷光通科技成都有限公司 | 去中心化物联网安全认证系统、设备注册和身份认证方法 |
CN109768988B (zh) * | 2019-02-26 | 2021-11-26 | 安捷光通科技成都有限公司 | 去中心化物联网安全认证系统、设备注册和身份认证方法 |
Also Published As
Publication number | Publication date |
---|---|
CA2712180A1 (fr) | 2009-09-11 |
JP2011510579A (ja) | 2011-03-31 |
EP2248008A2 (fr) | 2010-11-10 |
US20110170685A1 (en) | 2011-07-14 |
WO2009109715A3 (fr) | 2010-01-14 |
WO2009109715A2 (fr) | 2009-09-11 |
FR2926652B1 (fr) | 2010-06-18 |
KR20100117589A (ko) | 2010-11-03 |
FR2926652A1 (fr) | 2009-07-24 |
CN101911009B (zh) | 2012-10-10 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN101911009B (zh) | 用于以签名方案进行非对称加密的对策方法和设备 | |
US9401805B2 (en) | Encrypting device, encrypting method, and recording medium | |
CN101925875A (zh) | 用于非对称加密的对策方法和设备 | |
CN107040362A (zh) | 模乘设备和方法 | |
Ambedkar et al. | A new factorization method to factorize rsa public key encryption | |
US20190089523A1 (en) | Countermeasure to safe-error fault injection attacks on cryptographic exponentiation algorithms | |
JP2011530093A (ja) | 累乗法による暗号化を保護する解決策 | |
US6480606B1 (en) | Elliptic curve encryption method and system | |
JP2004304800A (ja) | データ処理装置におけるサイドチャネル攻撃防止 | |
Abdullah et al. | Security improvement in elliptic curve cryptography | |
EP3698262B1 (en) | Protecting modular inversion operation from external monitoring attacks | |
US8014520B2 (en) | Exponentiation ladder for cryptography | |
Benhamouda et al. | Easing coppersmith methods using analytic combinatorics: Applications to public-key cryptography with weak pseudorandomness | |
Biyashev et al. | Modification of the cryptographic algorithms, developed on the basis of nonpositional polynomial notations | |
JP2007187908A (ja) | サイドチャネル攻撃に耐性を有するモジュラーべき乗算計算装置及びモジュラーべき乗算計算方法 | |
Katzenbeisser | Recent advances in RSA cryptography | |
Ariffin et al. | AA β public key cryptosystem-A comparative analysis against RSA and ECC | |
Dubal et al. | On pseudo-random number generation using elliptic curve cryptography | |
Krömer et al. | An acceleration of quasigroup operations by residue arithmetic | |
Courtois et al. | Evaluation of Resilience of randomized RNS implementation | |
Neves et al. | Degenerate curve attacks | |
Ciobanu et al. | Security analysis of DBTRU cryptosystem | |
Nager | Xifrat-Compact Public-Key Cryptosystems based on Quasigroups | |
Mondal | Physical attacks on CCA-Secure Lattice-based KEM SABER | |
Chen | FPGA implementation for elliptic curve cryptography over binary extension field |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
CP03 | Change of name, title or address | ||
CP03 | Change of name, title or address |
Address after: Fa Guo Meilvai Patentee after: Inside Secure Address before: Exx, Provence Patentee before: INSECCANTRES COMPANY |
|
CP03 | Change of name, title or address | ||
CP03 | Change of name, title or address |
Address after: Fa Guomeileyi Patentee after: Weimei Anshi Co., Ltd Address before: Fa Guomeilvai Patentee before: Inside Secure |
|
TR01 | Transfer of patent right | ||
TR01 | Transfer of patent right |
Effective date of registration: 20200330 Address after: California, USA Patentee after: Rambus Inc. Address before: Fa Guomeileyi Patentee before: Weimei Anshi Co., Ltd |