EA003874B1 - Способ обработки данных, устойчивый к извлечению данных с помощью анализа непреднамеренных сигналов побочного ввода-вывода - Google Patents
Способ обработки данных, устойчивый к извлечению данных с помощью анализа непреднамеренных сигналов побочного ввода-вывода Download PDFInfo
- Publication number
- EA003874B1 EA003874B1 EA200200468A EA200200468A EA003874B1 EA 003874 B1 EA003874 B1 EA 003874B1 EA 200200468 A EA200200468 A EA 200200468A EA 200200468 A EA200200468 A EA 200200468A EA 003874 B1 EA003874 B1 EA 003874B1
- Authority
- EA
- Eurasian Patent Office
- Prior art keywords
- data
- mappings
- mapping
- algorithm
- mapped
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F7/00—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
- G07F7/08—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
- G07F7/10—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data
- G07F7/1008—Active credit-cards provided with means to personalise their use, e.g. with PIN-introduction/comparison system
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/75—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information by inhibiting the analysis of circuitry or operation
- G06F21/755—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information by inhibiting the analysis of circuitry or operation with measures against power attack
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/34—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
- G06Q20/341—Active cards, i.e. cards including their own processing means, e.g. including an IC or chip
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F7/00—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
- G07F7/08—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
- G07F7/0806—Details of the card
- G07F7/0813—Specific details related to card security
- G07F7/082—Features insuring the integrity of the data on or in the card
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F7/00—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
- G07F7/08—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
- G07F7/0806—Details of the card
- G07F7/0833—Card having specific functional components
- G07F7/084—Additional components relating to data transfer and storing, e.g. error detection, self-diagnosis
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F7/00—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
- G07F7/08—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
- G07F7/10—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data
- G07F7/1025—Identification of user by a PIN code
- G07F7/1083—Counting of PIN attempts
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/002—Countermeasures against attacks on cryptographic mechanisms
- H04L9/003—Countermeasures against attacks on cryptographic mechanisms for power analysis, e.g. differential power analysis [DPA] or simple power analysis [SPA]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0618—Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
- H04L9/0625—Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation with splitting of the data block into left and right halves, e.g. Feistel based algorithms, DES, FEAL, IDEA or KASUMI
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2207/00—Indexing scheme relating to methods or arrangements for processing data by operating upon the order or content of the data handled
- G06F2207/72—Indexing scheme relating to groups G06F7/72 - G06F7/729
- G06F2207/7219—Countermeasures against side channel or fault attacks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/16—Obfuscation or hiding, e.g. involving white box
Landscapes
- Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- Computer Security & Cryptography (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Computer Hardware Design (AREA)
- Signal Processing (AREA)
- Business, Economics & Management (AREA)
- Software Systems (AREA)
- General Engineering & Computer Science (AREA)
- Mathematical Physics (AREA)
- Microelectronics & Electronic Packaging (AREA)
- Accounting & Taxation (AREA)
- Strategic Management (AREA)
- General Business, Economics & Management (AREA)
- Storage Device Security (AREA)
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US16104799P | 1999-10-25 | 1999-10-25 | |
PCT/ZA2000/000192 WO2001031422A2 (fr) | 1999-10-25 | 2000-10-19 | Procede permettant au traitement de donnees de resister a l'extraction de donnees par l'analyse de signaux de voies laterales indesirables |
Publications (2)
Publication Number | Publication Date |
---|---|
EA200200468A1 EA200200468A1 (ru) | 2002-10-31 |
EA003874B1 true EA003874B1 (ru) | 2003-10-30 |
Family
ID=22579586
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
EA200200468A EA003874B1 (ru) | 1999-10-25 | 2000-10-19 | Способ обработки данных, устойчивый к извлечению данных с помощью анализа непреднамеренных сигналов побочного ввода-вывода |
Country Status (8)
Country | Link |
---|---|
EP (1) | EP1226681A2 (fr) |
JP (1) | JP2003513490A (fr) |
CN (1) | CN1413398A (fr) |
AU (1) | AU773982B2 (fr) |
CA (1) | CA2388971A1 (fr) |
EA (1) | EA003874B1 (fr) |
WO (1) | WO2001031422A2 (fr) |
ZA (1) | ZA200202798B (fr) |
Families Citing this family (21)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7142670B2 (en) * | 2001-08-14 | 2006-11-28 | International Business Machines Corporation | Space-efficient, side-channel attack resistant table lookups |
CN1640051B (zh) * | 2002-03-07 | 2011-05-18 | 艾斯奥托公司 | 使具有秘密密钥的电子密码装置安全的方法 |
FR2842376B1 (fr) * | 2002-07-10 | 2004-09-24 | Somfy | Procede de communication selective entre objets |
EP1457858A1 (fr) * | 2003-03-14 | 2004-09-15 | SCHLUMBERGER Systèmes | Procédé de sécurisation d'un ensemble électronique à cryptoprocesseur |
DE10341096A1 (de) * | 2003-09-05 | 2005-03-31 | Giesecke & Devrient Gmbh | Übergang zwischen maskierten Repräsentationen eines Wertes bei kryptographischen Berechnungen |
US7620182B2 (en) * | 2003-11-13 | 2009-11-17 | Magiq Technologies, Inc. | QKD with classical bit encryption |
KR101061906B1 (ko) * | 2004-02-19 | 2011-09-02 | 삼성전자주식회사 | 전력분석공격에 안전한 기본 연산 장치 및 방법 |
EP1596278A1 (fr) * | 2004-05-11 | 2005-11-16 | Axalto SA | Procédé de protection d'un ensemble cryptographique par masquage homographique |
FR2873523B1 (fr) * | 2004-07-22 | 2007-08-10 | Sagem | Procede et dispositif d'execution d'un calcul cryptographique |
DE102004043243A1 (de) * | 2004-09-07 | 2006-03-23 | Comvenient Gmbh & Co. Kg | Verfahren zum Schutz von Schlüsseln |
EP1646174A1 (fr) * | 2004-10-07 | 2006-04-12 | Axalto SA | Méthode et appareil pour générer un jeux d'instructions cryptographique automatiquement et génération d'un code |
JP5026275B2 (ja) * | 2004-10-28 | 2012-09-12 | イルデト・コーポレート・ビー・ヴイ | 暗号化関数を難読化するための方法及びシステム |
JP2008181225A (ja) * | 2007-01-23 | 2008-08-07 | Toshiba Corp | Icカード |
CN102016871B (zh) * | 2008-03-05 | 2017-11-07 | 爱迪德技术有限公司 | 密码系统 |
EP2525298B1 (fr) * | 2011-05-17 | 2016-07-13 | Nxp B.V. | Procédé d'authentification |
EP2620890A1 (fr) * | 2012-01-25 | 2013-07-31 | Gemalto SA | Procédé de détection de défaillance injectée dans des registres de matériel d'un dispositif électronique |
DE102012018924A1 (de) | 2012-09-25 | 2014-03-27 | Giesecke & Devrient Gmbh | Seitenkanalgeschützte Maskierung |
US9009495B2 (en) | 2013-06-28 | 2015-04-14 | Envieta, LLC | High speed cryptographic combining system, and method for programmable logic devices |
JP6264935B2 (ja) * | 2014-02-24 | 2018-01-24 | 大日本印刷株式会社 | 情報処理装置の認証方法 |
CN104104587B (zh) * | 2014-04-18 | 2017-12-26 | 天津大学 | 一种认证邮件协议的后一致性分析方法 |
CN105757878B (zh) * | 2016-02-19 | 2018-07-27 | 广东美的暖通设备有限公司 | 通讯数据的编码及解码方法、装置和空调器 |
-
2000
- 2000-10-19 EA EA200200468A patent/EA003874B1/ru not_active IP Right Cessation
- 2000-10-19 CN CN00817503A patent/CN1413398A/zh active Pending
- 2000-10-19 WO PCT/ZA2000/000192 patent/WO2001031422A2/fr active Search and Examination
- 2000-10-19 JP JP2001533494A patent/JP2003513490A/ja active Pending
- 2000-10-19 AU AU23014/01A patent/AU773982B2/en not_active Ceased
- 2000-10-19 EP EP00986837A patent/EP1226681A2/fr not_active Withdrawn
- 2000-10-19 CA CA002388971A patent/CA2388971A1/fr not_active Abandoned
-
2002
- 2002-04-10 ZA ZA200202798A patent/ZA200202798B/xx unknown
Also Published As
Publication number | Publication date |
---|---|
EA200200468A1 (ru) | 2002-10-31 |
AU773982B2 (en) | 2004-06-10 |
WO2001031422B1 (fr) | 2002-01-10 |
CN1413398A (zh) | 2003-04-23 |
AU2301401A (en) | 2001-05-08 |
JP2003513490A (ja) | 2003-04-08 |
CA2388971A1 (fr) | 2001-05-03 |
EP1226681A2 (fr) | 2002-07-31 |
ZA200202798B (en) | 2003-09-23 |
WO2001031422A3 (fr) | 2001-12-13 |
WO2001031422A2 (fr) | 2001-05-03 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EA003874B1 (ru) | Способ обработки данных, устойчивый к извлечению данных с помощью анализа непреднамеренных сигналов побочного ввода-вывода | |
CA2333095C (fr) | Perfectionnement de normes cryptographiques et autres procedes cryptographiques a reduction des fuites pour cartes a puces et autres systemes cryptographiques | |
KR102539111B1 (ko) | 메시지 부호화 및 복호화를 위한 블록 암호화 방법 및 이 방법을 구현하기 위한 암호화 장치 | |
Kanso et al. | A novel image encryption algorithm based on a 3D chaotic map | |
Adams et al. | The structured design of cryptographically good S-boxes | |
KR101680918B1 (ko) | 특히 고차의 관측 공격에 대해 보호되는 암호화 회로 | |
RU2711193C2 (ru) | Криптографическое устройство, приспособленное для вычисления целевого блочного шифра | |
US8000473B2 (en) | Method and apparatus for generating cryptographic sets of instructions automatically and code generator | |
JP2005510095A (ja) | 情報漏洩が低減される装置および方法 | |
KR100834096B1 (ko) | 고차 전력분석공격에 대응하는 블록 암호 알고리즘aria의 암호화 방법 | |
Shah et al. | A novel efficient image encryption algorithm based on affine transformation combine with linear fractional transformation | |
KR100574965B1 (ko) | 유한체 곱셈기 | |
Duluta et al. | Secure communication method based on encryption and steganography | |
Saha et al. | White-box cryptography based data encryption-decryption scheme for iot environment | |
Brier et al. | Fast primitives for internal data scrambling in tamper resistant hardware | |
KR20190049875A (ko) | 테이블 기반 구현에서의 차수 2 이상의 dca 공격에 대응하는 방법 | |
JP2004310752A (ja) | データ処理装置における誤り検出 | |
Arribas et al. | Guards in action: First-order SCA secure implementations of KETJE without additional randomness | |
Nissar et al. | Implementation of security enhancement in AES by inducting dynamicity in AES s-box | |
Assafli et al. | The Evaluation of Time-Dependent Initialization Vector Advanced Encryption Standard Algorithm for Image Encryption | |
Ullagaddi et al. | Symmetric synchronous stream encryption using images | |
Fu et al. | Medical image protection using hyperchaos-based encryption | |
Mokhnache | Implémentation d’algorithmes avancés de traitement de l’information dédiés au cryptage et à la cryptanalyse | |
Won et al. | Novel Leakage Against Realistic Masking and Shuffling Countermeasures: Case Study on PRINCE and SEED | |
Shiba et al. | Cubicle: A family of space‐hard ciphers for IoT |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
MM4A | Lapse of a eurasian patent due to non-payment of renewal fees within the time limit in the following designated state(s) |
Designated state(s): AM AZ BY KZ KG MD TJ TM |
|
MM4A | Lapse of a eurasian patent due to non-payment of renewal fees within the time limit in the following designated state(s) |
Designated state(s): RU |