EA200200468A1 - Метод для создания системы обработки данных, устойчивой к извлечению данных с помощью анализа непреднамеренных сигналов побочного ввода-вывода - Google Patents

Метод для создания системы обработки данных, устойчивой к извлечению данных с помощью анализа непреднамеренных сигналов побочного ввода-вывода

Info

Publication number
EA200200468A1
EA200200468A1 EA200200468A EA200200468A EA200200468A1 EA 200200468 A1 EA200200468 A1 EA 200200468A1 EA 200200468 A EA200200468 A EA 200200468A EA 200200468 A EA200200468 A EA 200200468A EA 200200468 A1 EA200200468 A1 EA 200200468A1
Authority
EA
Eurasian Patent Office
Prior art keywords
data
display
modification
technique
cryptographic
Prior art date
Application number
EA200200468A
Other languages
English (en)
Other versions
EA003874B1 (ru
Inventor
Манфред Вон Виллих
Original Assignee
Кифермакс Консультантс Лимитид
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Кифермакс Консультантс Лимитид filed Critical Кифермакс Консультантс Лимитид
Publication of EA200200468A1 publication Critical patent/EA200200468A1/ru
Publication of EA003874B1 publication Critical patent/EA003874B1/ru

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F7/00Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
    • G07F7/08Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
    • G07F7/10Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data
    • G07F7/1008Active credit-cards provided with means to personalise their use, e.g. with PIN-introduction/comparison system
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/75Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information by inhibiting the analysis of circuitry or operation
    • G06F21/755Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information by inhibiting the analysis of circuitry or operation with measures against power attack
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/34Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
    • G06Q20/341Active cards, i.e. cards including their own processing means, e.g. including an IC or chip
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F7/00Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
    • G07F7/08Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
    • G07F7/0806Details of the card
    • G07F7/0813Specific details related to card security
    • G07F7/082Features insuring the integrity of the data on or in the card
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F7/00Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
    • G07F7/08Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
    • G07F7/0806Details of the card
    • G07F7/0833Card having specific functional components
    • G07F7/084Additional components relating to data transfer and storing, e.g. error detection, self-diagnosis
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F7/00Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
    • G07F7/08Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
    • G07F7/10Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data
    • G07F7/1025Identification of user by a PIN code
    • G07F7/1083Counting of PIN attempts
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/002Countermeasures against attacks on cryptographic mechanisms
    • H04L9/003Countermeasures against attacks on cryptographic mechanisms for power analysis, e.g. differential power analysis [DPA] or simple power analysis [SPA]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0618Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
    • H04L9/0625Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation with splitting of the data block into left and right halves, e.g. Feistel based algorithms, DES, FEAL, IDEA or KASUMI
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2207/00Indexing scheme relating to methods or arrangements for processing data by operating upon the order or content of the data handled
    • G06F2207/72Indexing scheme relating to groups G06F7/72 - G06F7/729
    • G06F2207/7219Countermeasures against side channel or fault attacks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/16Obfuscation or hiding, e.g. involving white box

Landscapes

  • Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computer Hardware Design (AREA)
  • Signal Processing (AREA)
  • Business, Economics & Management (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Mathematical Physics (AREA)
  • Microelectronics & Electronic Packaging (AREA)
  • Accounting & Taxation (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • Storage Device Security (AREA)

Abstract

Изобретение относится к защите данных, в частности, это изобретение касается уменьшения риска несанкционированного доступа к данным. Изобретение обеспечивает практическую и эффективную модификацию криптографических и других процессов, при этом такая модификация основано на секретности данных через изменяющееся отображение всех секретных данных и промежуточных данных для вычисления и хранения. Примерами таких данных являются криптографические коды, сохраненные и сообщенные данные. Там, где или отображенные данные, или выбранное отображение (или все отображения составного объекта, где это используется) неизвестны, не может быть определена никакая информация относительно секретных данных. Эта методика обладает значительными возможностями уменьшить утечку через побочный канал ввода-вывода количества доступной информации, касающейся первоначальных данных, при условии, что наблюдаемая утечка побочного канала ввода-вывода достаточно низкая. Таким образом, чтобы получить преимущества от изобретения, здесь предлагается метод обработки данных для того, чтобы уменьшить риск неуполномоченного доступа к данным, например, через DPA, этот метод включает в себя следующие шаги: разработку алгоритмов, в частности, но не исключительно шифров, для получения максимальной выгоды от этой методики; расширение общеизвестной методики селективно блокирующихся данных до большего набора отображений; видоизменение выполнения алгоритма, чтобы работать по отображенным данным; первоначальное отображение данных, особенно криптографических кодов, для хранения; изменение получения отображения от каждого прежнего отображения при
EA200200468A 1999-10-25 2000-10-19 Способ обработки данных, устойчивый к извлечению данных с помощью анализа непреднамеренных сигналов побочного ввода-вывода EA003874B1 (ru)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US16104799P 1999-10-25 1999-10-25
PCT/ZA2000/000192 WO2001031422A2 (en) 1999-10-25 2000-10-19 Method for protection against analysis of unintended side-channel signals

Publications (2)

Publication Number Publication Date
EA200200468A1 true EA200200468A1 (ru) 2002-10-31
EA003874B1 EA003874B1 (ru) 2003-10-30

Family

ID=22579586

Family Applications (1)

Application Number Title Priority Date Filing Date
EA200200468A EA003874B1 (ru) 1999-10-25 2000-10-19 Способ обработки данных, устойчивый к извлечению данных с помощью анализа непреднамеренных сигналов побочного ввода-вывода

Country Status (8)

Country Link
EP (1) EP1226681A2 (ru)
JP (1) JP2003513490A (ru)
CN (1) CN1413398A (ru)
AU (1) AU773982B2 (ru)
CA (1) CA2388971A1 (ru)
EA (1) EA003874B1 (ru)
WO (1) WO2001031422A2 (ru)
ZA (1) ZA200202798B (ru)

Families Citing this family (21)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7142670B2 (en) * 2001-08-14 2006-11-28 International Business Machines Corporation Space-efficient, side-channel attack resistant table lookups
CN1640051B (zh) * 2002-03-07 2011-05-18 艾斯奥托公司 使具有秘密密钥的电子密码装置安全的方法
FR2842376B1 (fr) * 2002-07-10 2004-09-24 Somfy Procede de communication selective entre objets
EP1457858A1 (fr) * 2003-03-14 2004-09-15 SCHLUMBERGER Systèmes Procédé de sécurisation d'un ensemble électronique à cryptoprocesseur
DE10341096A1 (de) 2003-09-05 2005-03-31 Giesecke & Devrient Gmbh Übergang zwischen maskierten Repräsentationen eines Wertes bei kryptographischen Berechnungen
WO2005057927A1 (en) * 2003-11-13 2005-06-23 Magiq Technologies, Inc Qkd with classical bit encryption
KR101061906B1 (ko) * 2004-02-19 2011-09-02 삼성전자주식회사 전력분석공격에 안전한 기본 연산 장치 및 방법
EP1596278A1 (fr) * 2004-05-11 2005-11-16 Axalto SA Procédé de protection d'un ensemble cryptographique par masquage homographique
FR2873523B1 (fr) * 2004-07-22 2007-08-10 Sagem Procede et dispositif d'execution d'un calcul cryptographique
DE102004043243A1 (de) * 2004-09-07 2006-03-23 Comvenient Gmbh & Co. Kg Verfahren zum Schutz von Schlüsseln
EP1646174A1 (en) * 2004-10-07 2006-04-12 Axalto SA Method and apparatus for generating cryptographic sets of instructions automatically and code generation
US7881466B2 (en) 2004-10-28 2011-02-01 Irdeto B.V. Method and system for obfuscating a cryptographic function
JP2008181225A (ja) * 2007-01-23 2008-08-07 Toshiba Corp Icカード
EP2255317B1 (en) * 2008-03-05 2013-05-15 Irdeto B.V. Cryptographic system
EP2525298B1 (en) * 2011-05-17 2016-07-13 Nxp B.V. Authentication method
EP2620890A1 (en) * 2012-01-25 2013-07-31 Gemalto SA Method for detecting a fault injected in hardware registers of an electronic device
DE102012018924A1 (de) 2012-09-25 2014-03-27 Giesecke & Devrient Gmbh Seitenkanalgeschützte Maskierung
US9009495B2 (en) 2013-06-28 2015-04-14 Envieta, LLC High speed cryptographic combining system, and method for programmable logic devices
JP6264935B2 (ja) * 2014-02-24 2018-01-24 大日本印刷株式会社 情報処理装置の認証方法
CN104104587B (zh) * 2014-04-18 2017-12-26 天津大学 一种认证邮件协议的后一致性分析方法
CN105757878B (zh) * 2016-02-19 2018-07-27 广东美的暖通设备有限公司 通讯数据的编码及解码方法、装置和空调器

Also Published As

Publication number Publication date
AU2301401A (en) 2001-05-08
CA2388971A1 (en) 2001-05-03
WO2001031422A2 (en) 2001-05-03
CN1413398A (zh) 2003-04-23
EP1226681A2 (en) 2002-07-31
WO2001031422B1 (en) 2002-01-10
AU773982B2 (en) 2004-06-10
WO2001031422A3 (en) 2001-12-13
EA003874B1 (ru) 2003-10-30
ZA200202798B (en) 2003-09-23
JP2003513490A (ja) 2003-04-08

Similar Documents

Publication Publication Date Title
EA200200468A1 (ru) Метод для создания системы обработки данных, устойчивой к извлечению данных с помощью анализа непреднамеренных сигналов побочного ввода-вывода
RU2357365C2 (ru) Способ и устройство для выполнения криптографического вычисления
US8296577B2 (en) Cryptographic bus architecture for the prevention of differential power analysis
US8332634B2 (en) Cryptographic systems for encrypting input data using an address associated with the input data, error detection circuits, and methods of operating the same
DE60044168D1 (de) Verfahren zur sicherung einer elektronischen verschlüsselungsvorrichtung mit geheimschlüssel gegen angriffe mittels physischer analyse
CN110100422B (zh) 基于区块链智能合约的数据写入方法、装置及存储介质
JP2002519722A (ja) スマートカードおよび他の暗号システム用の、漏洩を最小に抑える、改良desおよび他の暗号プロセス
US20030084308A1 (en) Memory encryption
US20030093684A1 (en) Device and method with reduced information leakage
JP2005510095A (ja) 情報漏洩が低減される装置および方法
ES2138461T3 (es) Codificacion y decodificacion de datos multimedia.
BR9710169A (pt) Método e sistema aperfeiçoados para criptografar entrada de acesso de uma tela de toque
CN1989726A (zh) 用于执行加密计算的方法和装置
ATE293323T1 (de) Verfahren und vorrichtung für ein robustes und schnelles kryptosystem
US20120047417A1 (en) Operation unit and program
JPH0834587B2 (ja) 画像データの秘匿方法
US7000111B1 (en) Method for masking secret multiplicands
GB2403880A (en) Non-repudiation of service agreements
EP1237322A3 (en) Fault detection method for cryptographic process
US10805066B2 (en) Cryptographic algorithm having a key-dependent masked computing step (SBOX call)
GB2438972A (en) Encrypting data using an address associated with the data
US20060159258A1 (en) Processor for encrypting and/or decrypting data and method of encrypting and/or decrypting data using such a processor
JO2271B1 (en) A method of encoding a multiple unit of measurement
KR101203474B1 (ko) 암호화 프로세서를 갖는 단위 전자장치의 보안화 방법
Ali et al. Implementation of triple data encryption algorithm using vhdl

Legal Events

Date Code Title Description
MM4A Lapse of a eurasian patent due to non-payment of renewal fees within the time limit in the following designated state(s)

Designated state(s): AM AZ BY KZ KG MD TJ TM

MM4A Lapse of a eurasian patent due to non-payment of renewal fees within the time limit in the following designated state(s)

Designated state(s): RU