CN1218531C - 实现椭圆曲线类型公共密钥加密算法的电子部件中的对策方法 - Google Patents
实现椭圆曲线类型公共密钥加密算法的电子部件中的对策方法 Download PDFInfo
- Publication number
- CN1218531C CN1218531C CN00805519XA CN00805519A CN1218531C CN 1218531 C CN1218531 C CN 1218531C CN 00805519X A CN00805519X A CN 00805519XA CN 00805519 A CN00805519 A CN 00805519A CN 1218531 C CN1218531 C CN 1218531C
- Authority
- CN
- China
- Prior art keywords
- algorithm
- integer
- elliptic curve
- decoding
- key
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Lifetime
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F7/00—Methods or arrangements for processing data by operating upon the order or content of the data handled
- G06F7/60—Methods or arrangements for performing computations using a digital non-denominational number representation, i.e. number representation without radix; Computing devices using combinations of denominational and non-denominational quantity representations, e.g. using difunction pulse trains, STEELE computers, phase computers
- G06F7/72—Methods or arrangements for performing computations using a digital non-denominational number representation, i.e. number representation without radix; Computing devices using combinations of denominational and non-denominational quantity representations, e.g. using difunction pulse trains, STEELE computers, phase computers using residue arithmetic
- G06F7/724—Finite field arithmetic
- G06F7/725—Finite field arithmetic over elliptic curves
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/002—Countermeasures against attacks on cryptographic mechanisms
- H04L9/003—Countermeasures against attacks on cryptographic mechanisms for power analysis, e.g. differential power analysis [DPA] or simple power analysis [SPA]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
- H04L9/3066—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2207/00—Indexing scheme relating to methods or arrangements for processing data by operating upon the order or content of the data handled
- G06F2207/72—Indexing scheme relating to groups G06F7/72 - G06F7/729
- G06F2207/7219—Countermeasures against side channel or fault attacks
- G06F2207/7223—Randomisation as countermeasure against side channel attacks
- G06F2207/7233—Masking, e.g. (A**e)+r mod n
- G06F2207/7238—Operand masking, i.e. message blinding, e.g. (A+r)**e mod n; k.(P+R)
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2207/00—Indexing scheme relating to methods or arrangements for processing data by operating upon the order or content of the data handled
- G06F2207/72—Indexing scheme relating to groups G06F7/72 - G06F7/729
- G06F2207/7219—Countermeasures against side channel or fault attacks
- G06F2207/7223—Randomisation as countermeasure against side channel attacks
- G06F2207/7233—Masking, e.g. (A**e)+r mod n
- G06F2207/7247—Modulo masking, e.g. A**e mod (n*r)
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2207/00—Indexing scheme relating to methods or arrangements for processing data by operating upon the order or content of the data handled
- G06F2207/72—Indexing scheme relating to groups G06F7/72 - G06F7/729
- G06F2207/7219—Countermeasures against side channel or fault attacks
- G06F2207/7223—Randomisation as countermeasure against side channel attacks
- G06F2207/7257—Random modification not requiring correction
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/04—Masking or blinding
- H04L2209/046—Masking or blinding of operations, operands or results of the operations
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/08—Randomization, e.g. dummy operations or using noise
Landscapes
- Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Pure & Applied Mathematics (AREA)
- Mathematical Optimization (AREA)
- Mathematical Analysis (AREA)
- Computing Systems (AREA)
- Mathematical Physics (AREA)
- Computational Mathematics (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- General Engineering & Computer Science (AREA)
- Algebra (AREA)
- Storage Device Security (AREA)
Abstract
Description
Claims (5)
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
FR9903920A FR2791496B1 (fr) | 1999-03-26 | 1999-03-26 | Procedes de contre-mesure dans un composant electronique mettant en oeuvre un algorithme de crytographie a cle publique de type courbe elliptique |
FR99/03920 | 1999-03-26 |
Publications (2)
Publication Number | Publication Date |
---|---|
CN1345496A CN1345496A (zh) | 2002-04-17 |
CN1218531C true CN1218531C (zh) | 2005-09-07 |
Family
ID=9543774
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN00805519XA Expired - Lifetime CN1218531C (zh) | 1999-03-26 | 2000-03-22 | 实现椭圆曲线类型公共密钥加密算法的电子部件中的对策方法 |
Country Status (8)
Country | Link |
---|---|
US (1) | US7286666B1 (zh) |
EP (1) | EP1166495A1 (zh) |
JP (1) | JP2002540484A (zh) |
CN (1) | CN1218531C (zh) |
AU (1) | AU3660300A (zh) |
FR (1) | FR2791496B1 (zh) |
MX (1) | MXPA01009402A (zh) |
WO (1) | WO2000059157A1 (zh) |
Families Citing this family (18)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2000305453A (ja) * | 1999-04-21 | 2000-11-02 | Nec Corp | 暗号化装置,復号装置,および暗号化・復号装置 |
FR2809893B1 (fr) * | 2000-06-02 | 2002-11-15 | Gemplus Card Int | Procede de contre-mesure dans un composant electronique mettant en oeuvre un algorithme de cryptographie a cle publique sur courbe elliptique |
FR2821945B1 (fr) * | 2001-03-12 | 2003-05-30 | Gemplus Card Int | Procede de protection contre les attaques par mesure de courant ou de rayonnement electromagnetique |
FR2821944B1 (fr) * | 2001-03-12 | 2003-05-30 | Gemplus Card Int | Procede de protection contre les attaques par mesure de courant ou de rayonnement electromagnetique |
FR2824210B1 (fr) * | 2001-04-27 | 2003-05-30 | Gemplus Card Int | Procede de contre-mesure dans un composant electronique mettant en oeuvre un algorithme cryptographique du type a cle publique sur une courbe elliptique |
US7372960B2 (en) * | 2001-12-31 | 2008-05-13 | Certicom Corp. | Method and apparatus for performing finite field calculations |
EP1648111B1 (en) * | 2003-07-22 | 2014-01-15 | Fujitsu Limited | Tamper-resistant encryption using a private key |
KR100652377B1 (ko) * | 2004-08-06 | 2007-02-28 | 삼성전자주식회사 | 모듈라 지수승 알고리즘, 기록매체 및 시스템 |
FR2881300B1 (fr) * | 2005-01-21 | 2007-03-16 | Gemplus Sa | Procede de generation d'une courbe elliptique, application a un procede cryptographique, et procede cryptographique une telle courbe |
US8396213B2 (en) * | 2005-01-21 | 2013-03-12 | Certicom Corp. | Elliptic curve random number generation |
WO2007000702A2 (en) | 2005-06-29 | 2007-01-04 | Koninklijke Philips Electronics N.V. | Arrangement for and method of protecting a data processing device against a cryptographic attack or analysis |
JP4513752B2 (ja) * | 2006-01-16 | 2010-07-28 | ソニー株式会社 | 暗号処理装置、および暗号処理方法、並びにコンピュータ・プログラム |
DE102006013515A1 (de) * | 2006-03-23 | 2007-10-04 | Siemens Ag | Kryptographisches Verfahren mit elliptischen Kurven |
FR2941115B1 (fr) * | 2009-01-14 | 2011-02-25 | Sagem Securite | Codage de points d'une courbe elliptique |
JP5407352B2 (ja) | 2009-01-19 | 2014-02-05 | 富士通株式会社 | 復号処理装置、復号処理プログラム、復号処理方法 |
EP2326041A1 (en) * | 2009-11-19 | 2011-05-25 | Gemalto SA | Countermeasures against power attacks for the randomization of the exponent |
EP3220304B1 (en) * | 2016-02-22 | 2018-11-07 | Eshard | Method of testing the resistance of a circuit to a side channel analysis |
US10674045B2 (en) * | 2017-05-31 | 2020-06-02 | Google Llc | Mutual noise estimation for videos |
Family Cites Families (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6064740A (en) * | 1997-11-12 | 2000-05-16 | Curiger; Andreas | Method and apparatus for masking modulo exponentiation calculations in an integrated circuit |
US6466668B1 (en) * | 1998-01-28 | 2002-10-15 | Hitachi, Ltd. | IC card equipped with elliptical curve encryption processing facility |
FR2809893B1 (fr) * | 2000-06-02 | 2002-11-15 | Gemplus Card Int | Procede de contre-mesure dans un composant electronique mettant en oeuvre un algorithme de cryptographie a cle publique sur courbe elliptique |
-
1999
- 1999-03-26 FR FR9903920A patent/FR2791496B1/fr not_active Expired - Lifetime
-
2000
- 2000-03-22 WO PCT/FR2000/000723 patent/WO2000059157A1/fr not_active Application Discontinuation
- 2000-03-22 AU AU36603/00A patent/AU3660300A/en not_active Abandoned
- 2000-03-22 CN CN00805519XA patent/CN1218531C/zh not_active Expired - Lifetime
- 2000-03-22 US US09/937,397 patent/US7286666B1/en not_active Expired - Lifetime
- 2000-03-22 JP JP2000608546A patent/JP2002540484A/ja active Pending
- 2000-03-22 EP EP00915215A patent/EP1166495A1/fr not_active Withdrawn
- 2000-03-22 MX MXPA01009402A patent/MXPA01009402A/es unknown
Also Published As
Publication number | Publication date |
---|---|
WO2000059157A1 (fr) | 2000-10-05 |
AU3660300A (en) | 2000-10-16 |
EP1166495A1 (fr) | 2002-01-02 |
US7286666B1 (en) | 2007-10-23 |
FR2791496A1 (fr) | 2000-09-29 |
CN1345496A (zh) | 2002-04-17 |
FR2791496B1 (fr) | 2001-10-19 |
MXPA01009402A (es) | 2002-06-04 |
JP2002540484A (ja) | 2002-11-26 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN1218531C (zh) | 实现椭圆曲线类型公共密钥加密算法的电子部件中的对策方法 | |
Huang et al. | An image encryption algorithm based on hyper-chaos and DNA sequence | |
Kim et al. | Private genome analysis through homomorphic encryption | |
US7162033B1 (en) | Countermeasure procedures in an electronic component implementing an elliptical curve type public key encryption algorithm | |
US20080240443A1 (en) | Method and apparatus for securely processing secret data | |
US20160234010A1 (en) | Method and system for homomorphicly randomizing an input | |
US8422671B2 (en) | Methods of encryption and decryption using operand ordering and encryption systems using the same | |
US7908641B2 (en) | Modular exponentiation with randomized exponent | |
US6914986B2 (en) | Countermeasure method in an electronic component using a public key cryptography algorithm on an elliptic curve | |
US10721056B2 (en) | Key processing method and device | |
CN1425231A (zh) | 椭圆曲线上的密码学方法 | |
CN101005350A (zh) | 加密处理设备、加密处理方法和计算机程序 | |
CN1592190A (zh) | 硬件加密引擎和加密方法 | |
CN1429360A (zh) | 加密的方法和装置 | |
CN1314223C (zh) | 密码专用密钥的存储和复原方法及设备 | |
US7123717B1 (en) | Countermeasure method in an electronic component which uses an RSA-type public key cryptographic algorithm | |
CN1543725A (zh) | 使用离散对数函数产生不对称加密系统的加密单元的方法 | |
CN1571952A (zh) | 用于椭圆曲线上的点的通用计算方法 | |
US7903814B2 (en) | Enhancing the security of public key cryptosystem implementations | |
Rui et al. | A k-RSA algorithm | |
Houria et al. | A comparison between the secp256r1 and the koblitz secp256k1 bitcoin curves | |
CN111368317A (zh) | 一种计算机数据加密系统及方法 | |
Bendaoud et al. | A new image encryption scheme based on enhanced elliptic curve cryptosystem using DNA computing | |
Sundararajan et al. | A comprehensive survey on lightweight asymmetric key cryptographic algorithm for resource constrained devices | |
JP5323196B2 (ja) | 演算装置、方法およびプログラム |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C06 | Publication | ||
PB01 | Publication | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
ASS | Succession or assignment of patent right |
Owner name: JIN YATUO Free format text: FORMER OWNER: GEMPLUS CO. Effective date: 20120828 |
|
C41 | Transfer of patent application or patent right or utility model | ||
C56 | Change in the name or address of the patentee |
Owner name: SETEC OY Free format text: FORMER NAME: JIN YATUO |
|
CP01 | Change in the name or title of a patent holder |
Address after: East France Patentee after: GEMALTO OY Address before: East France Patentee before: Jin Yatuo |
|
TR01 | Transfer of patent right |
Effective date of registration: 20120828 Address after: East France Patentee after: Jin Yatuo Address before: French gemenos Patentee before: GEMPLUS |
|
CX01 | Expiry of patent term |
Granted publication date: 20050907 |
|
CX01 | Expiry of patent term |