CN104285378B - 具有免受侧信道攻击保护的循环冗余校验方法 - Google Patents
具有免受侧信道攻击保护的循环冗余校验方法 Download PDFInfo
- Publication number
- CN104285378B CN104285378B CN201380022194.9A CN201380022194A CN104285378B CN 104285378 B CN104285378 B CN 104285378B CN 201380022194 A CN201380022194 A CN 201380022194A CN 104285378 B CN104285378 B CN 104285378B
- Authority
- CN
- China
- Prior art keywords
- data item
- mask
- binary
- masked
- cyclic redundancy
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- H—ELECTRICITY
- H03—ELECTRONIC CIRCUITRY
- H03M—CODING; DECODING; CODE CONVERSION IN GENERAL
- H03M13/00—Coding, decoding or code conversion, for error detection or error correction; Coding theory basic assumptions; Coding bounds; Error probability evaluation methods; Channel models; Simulation or testing of codes
- H03M13/03—Error detection or forward error correction by redundancy in data representation, i.e. code words containing more digits than the source words
- H03M13/05—Error detection or forward error correction by redundancy in data representation, i.e. code words containing more digits than the source words using block codes, i.e. a predetermined number of check bits joined to a predetermined number of information bits
- H03M13/09—Error detection only, e.g. using cyclic redundancy check [CRC] codes or single parity bit
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/556—Detecting local intrusion or implementing counter-measures involving covert channels, i.e. data leakage between processes
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/002—Countermeasures against attacks on cryptographic mechanisms
- H04L9/003—Countermeasures against attacks on cryptographic mechanisms for power analysis, e.g. differential power analysis [DPA] or simple power analysis [SPA]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/04—Masking or blinding
- H04L2209/046—Masking or blinding of operations, operands or results of the operations
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/34—Encoding or coding, e.g. Huffman coding or error correction
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- Software Systems (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Probability & Statistics with Applications (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Error Detection And Correction (AREA)
- Detection And Prevention Of Errors In Transmission (AREA)
Applications Claiming Priority (3)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| FR1253804 | 2012-04-25 | ||
| FR1253804A FR2990034B1 (fr) | 2012-04-25 | 2012-04-25 | Procede de controle de redondance cyclique protege contre une attaque par canal auxiliaire |
| PCT/FR2013/050646 WO2013160575A1 (fr) | 2012-04-25 | 2013-03-26 | Procédé de contrôle de redondance cyclique protégé contre une attaque par canal auxiliaire |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| CN104285378A CN104285378A (zh) | 2015-01-14 |
| CN104285378B true CN104285378B (zh) | 2017-09-22 |
Family
ID=47019080
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| CN201380022194.9A Active CN104285378B (zh) | 2012-04-25 | 2013-03-26 | 具有免受侧信道攻击保护的循环冗余校验方法 |
Country Status (6)
| Country | Link |
|---|---|
| US (1) | US9977899B2 (enExample) |
| EP (1) | EP2842232B1 (enExample) |
| CN (1) | CN104285378B (enExample) |
| FR (1) | FR2990034B1 (enExample) |
| IN (1) | IN2014KN02283A (enExample) |
| WO (1) | WO2013160575A1 (enExample) |
Families Citing this family (17)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN106897628B (zh) * | 2015-12-18 | 2021-10-22 | 紫光同芯微电子有限公司 | 一种防止被加数侧信道信息泄露的安全处理装置及方法 |
| CN107547194A (zh) * | 2016-06-28 | 2018-01-05 | 埃沙尔公司 | 免受侧信道分析的保护方法和设备 |
| US10228995B2 (en) | 2016-07-28 | 2019-03-12 | Hewlett Packard Enterprise Development Lp | Last writers of datasets in storage array errors |
| CN107766915A (zh) * | 2016-08-23 | 2018-03-06 | 华大半导体有限公司 | 用于电子标签的安全防护方法 |
| US20190259466A1 (en) * | 2016-09-21 | 2019-08-22 | Bar-Ilan University | Separable robust coding |
| US10503582B2 (en) * | 2017-03-06 | 2019-12-10 | Tttech Auto Ag | Method and computer system for fault tolerant data integrity verification of safety-related data |
| CN107317671B (zh) * | 2017-08-22 | 2019-12-24 | 兆讯恒达微电子技术(北京)有限公司 | 防御旁路攻击的crc运算电路装置和方法 |
| CN108234081B (zh) * | 2017-09-08 | 2019-02-12 | 华为技术有限公司 | 编码方法及装置 |
| FR3076151B1 (fr) * | 2017-12-22 | 2020-11-06 | Oberthur Technologies | Procede de determination d’une somme d’integrite, programme d’ordinateur et entite electronique associes |
| CN113518988B (zh) * | 2019-03-05 | 2024-08-16 | 密码研究公司 | 嵌入式中央处理单元上的抗侧通道攻击存储器访问 |
| US11507699B2 (en) * | 2019-09-27 | 2022-11-22 | Intel Corporation | Processor with private pipeline |
| CN111752747A (zh) * | 2020-06-09 | 2020-10-09 | 山东华翼微电子技术股份有限公司 | 一种增强检错能力的内存安全校验方法 |
| CN112036117B (zh) * | 2020-08-28 | 2023-06-20 | 西安微电子技术研究所 | 一种适用于多种位宽并行输入数据的crc校验控制系统 |
| US11502819B2 (en) * | 2021-01-21 | 2022-11-15 | Nxp B.V. | Efficient masked polynomial comparison |
| US11595195B2 (en) * | 2021-04-09 | 2023-02-28 | Nxp B.V. | Masked decoding of polynomials |
| CN113849844B (zh) * | 2021-11-26 | 2022-03-04 | 杭州安恒信息技术股份有限公司 | 一种多方数据安全计算方法、系统、装置及存储介质 |
| CN114520710B (zh) * | 2022-01-27 | 2024-12-27 | 络源(上海)半导体科技有限公司 | Usb2.0协议五比特循环冗余校验方法、装置和设备 |
Citations (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US5377270A (en) * | 1993-06-30 | 1994-12-27 | United Technologies Automotive, Inc. | Cryptographic authentication of transmitted messages using pseudorandom numbers |
| US7523305B2 (en) * | 2003-12-17 | 2009-04-21 | International Business Machines Corporation | Employing cyclic redundancy checks to provide data security |
Family Cites Families (16)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| EP0980605A2 (en) * | 1998-03-05 | 2000-02-23 | Koninklijke Philips Electronics N.V. | Mask generating polynomials for pseudo-random noise generators |
| US6310870B1 (en) * | 1998-03-30 | 2001-10-30 | Oki Telecom, Inc. | Method for transmitting high data rate information in code division multiple access systems |
| US6788707B1 (en) * | 1999-08-31 | 2004-09-07 | Broadcom Corporation | Method for the suppression and expansion of packet header information in cable modem and cable modem termination system devices |
| US6915473B2 (en) * | 2001-05-14 | 2005-07-05 | Interdigital Technology Corporation | Method and system for implicit user equipment identification |
| US7047453B2 (en) * | 2003-11-13 | 2006-05-16 | Nokia, Inc. | Method and apparatus for managing network traffic using cyclical redundancy check hash functions |
| US8156343B2 (en) * | 2003-11-26 | 2012-04-10 | Intel Corporation | Accessing private data about the state of a data processing machine from storage that is publicly accessible |
| US7171604B2 (en) * | 2003-12-30 | 2007-01-30 | Intel Corporation | Method and apparatus for calculating cyclic redundancy check (CRC) on data using a programmable CRC engine |
| EP1912148A1 (en) * | 2006-10-09 | 2008-04-16 | Axalto S.A. | Protection against side channel attacks with an integrity check |
| FR2919739B1 (fr) * | 2007-08-03 | 2009-12-04 | Oberthur Card Syst Sa | Procede de traitement de donnees protege contre les attaques par generation de fautes et dispositif associe |
| US8749400B2 (en) * | 2008-08-18 | 2014-06-10 | Halliburton Energy Services, Inc. | Symbol synchronization for downhole OFDM telemetry |
| CN101562522A (zh) * | 2009-05-06 | 2009-10-21 | 深圳先进技术研究院 | 抗侧信道攻击的椭圆曲线密码系统实现方法 |
| EP2404391B1 (en) * | 2009-05-27 | 2019-01-02 | LG Electronics Inc. | Method of indicating number of antennas in network broadcast system |
| US8392494B2 (en) * | 2009-06-26 | 2013-03-05 | Intel Corporation | Method and apparatus for performing efficient side-channel attack resistant reduction using montgomery or barrett reduction |
| US8478258B2 (en) * | 2010-03-05 | 2013-07-02 | Intel Corporation | Techniques to reduce false detection of control channel messages in a wireless network |
| US8627171B2 (en) * | 2010-05-03 | 2014-01-07 | Samsung Electronics Co., Ltd. | Techniques for cyclic redundancy check encoding in communication system |
| US8793563B2 (en) * | 2011-02-08 | 2014-07-29 | Institute For Information Industry | Wireless apparatus and method for de-masking a packet |
-
2012
- 2012-04-25 FR FR1253804A patent/FR2990034B1/fr active Active
-
2013
- 2013-03-26 IN IN2283KON2014 patent/IN2014KN02283A/en unknown
- 2013-03-26 EP EP13719930.3A patent/EP2842232B1/fr active Active
- 2013-03-26 WO PCT/FR2013/050646 patent/WO2013160575A1/fr not_active Ceased
- 2013-03-26 CN CN201380022194.9A patent/CN104285378B/zh active Active
- 2013-03-26 US US14/397,330 patent/US9977899B2/en active Active
Patent Citations (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US5377270A (en) * | 1993-06-30 | 1994-12-27 | United Technologies Automotive, Inc. | Cryptographic authentication of transmitted messages using pseudorandom numbers |
| US7523305B2 (en) * | 2003-12-17 | 2009-04-21 | International Business Machines Corporation | Employing cyclic redundancy checks to provide data security |
Also Published As
| Publication number | Publication date |
|---|---|
| US20150082435A1 (en) | 2015-03-19 |
| FR2990034A1 (fr) | 2013-11-01 |
| EP2842232A1 (fr) | 2015-03-04 |
| FR2990034B1 (fr) | 2014-04-25 |
| CN104285378A (zh) | 2015-01-14 |
| IN2014KN02283A (enExample) | 2015-05-01 |
| EP2842232B1 (fr) | 2016-09-21 |
| US9977899B2 (en) | 2018-05-22 |
| WO2013160575A1 (fr) | 2013-10-31 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| CN104285378B (zh) | 具有免受侧信道攻击保护的循环冗余校验方法 | |
| US11824967B2 (en) | Electronic device using homomorphic encryption and encrypted data processing method thereof | |
| Subramanian et al. | Reliable hardware architectures for cryptographic block ciphers LED and HIGHT | |
| Mozaffari-Kermani et al. | Fault-resilient lightweight cryptographic block ciphers for secure embedded systems | |
| Schneider et al. | ParTI–towards combined hardware countermeasures against side-channel and fault-injection attacks | |
| CN109388955B (zh) | 用于实施加密运算的方法和设备及存储介质 | |
| Maes et al. | Low-overhead implementation of a soft decision helper data algorithm for SRAM PUFs | |
| De Meyer et al. | M&M: Masks and macs against physical attacks | |
| CN104079304B (zh) | 用于处理数据的设备和方法 | |
| Rashidi | High‐throughput and flexible ASIC implementations of SIMON and SPECK lightweight block ciphers | |
| CN107798248B (zh) | 防止差分故障分析的软件保护 | |
| Michail et al. | Design and implementation of totally-self checking SHA-1 and SHA-256 hash functions’ architectures | |
| Canto et al. | Reliable constructions for the key generator of code-based post-quantum cryptosystems on FPGA | |
| US12170719B2 (en) | Electronic device using homomorphic encryption and encrypted data processing method thereof | |
| Wang et al. | A performance and area efficient ASIP for higher-order DPA-resistant AES | |
| Bedoui et al. | A Secure Hardware Implementation for Elliptic Curve Digital Signature Algorithm. | |
| CN111259370A (zh) | 一种fpga程序安全验证方法、系统、终端及存储介质 | |
| Karp et al. | Security-oriented code-based architectures for mitigating fault attacks | |
| Ito et al. | A formal approach to identifying hardware Trojans in cryptographic hardware | |
| Mazumdar et al. | A compact implementation of Salsa20 and its power analysis vulnerabilities | |
| CN116982039A (zh) | 用于rsa签名验证的强化编码消息检查 | |
| Ueno et al. | Formal approach for verifying Galois field arithmetic circuits of higher degrees | |
| CN114205104A (zh) | 针对功率和电磁侧信道攻击的对认证标签计算的保护 | |
| Akdemir et al. | Non-linear error detection for finite state machines | |
| Bagadia et al. | Revisiting the Security of LPN Based RFID Authentication Protocol and Potential Exploits in Hardware Implementations |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| C06 | Publication | ||
| PB01 | Publication | ||
| C10 | Entry into substantive examination | ||
| SE01 | Entry into force of request for substantive examination | ||
| GR01 | Patent grant | ||
| GR01 | Patent grant | ||
| CP03 | Change of name, title or address |
Address after: Fa Guomeileyi Patentee after: Weimei Anshi Co., Ltd Address before: Fa Guomeilvai Patentee before: Inside Secure |
|
| CP03 | Change of name, title or address | ||
| TR01 | Transfer of patent right |
Effective date of registration: 20200401 Address after: California, USA Patentee after: Rambus Inc. Address before: Fa Guomeileyi Patentee before: Weimei Anshi Co., Ltd |
|
| TR01 | Transfer of patent right |