EA200200468A1 - Метод для создания системы обработки данных, устойчивой к извлечению данных с помощью анализа непреднамеренных сигналов побочного ввода-вывода - Google Patents
Метод для создания системы обработки данных, устойчивой к извлечению данных с помощью анализа непреднамеренных сигналов побочного ввода-выводаInfo
- Publication number
- EA200200468A1 EA200200468A1 EA200200468A EA200200468A EA200200468A1 EA 200200468 A1 EA200200468 A1 EA 200200468A1 EA 200200468 A EA200200468 A EA 200200468A EA 200200468 A EA200200468 A EA 200200468A EA 200200468 A1 EA200200468 A1 EA 200200468A1
- Authority
- EA
- Eurasian Patent Office
- Prior art keywords
- data
- display
- modification
- technique
- cryptographic
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F7/00—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
- G07F7/08—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
- G07F7/10—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data
- G07F7/1008—Active credit-cards provided with means to personalise their use, e.g. with PIN-introduction/comparison system
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/75—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information by inhibiting the analysis of circuitry or operation
- G06F21/755—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information by inhibiting the analysis of circuitry or operation with measures against power attack
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/34—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
- G06Q20/341—Active cards, i.e. cards including their own processing means, e.g. including an IC or chip
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F7/00—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
- G07F7/08—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
- G07F7/0806—Details of the card
- G07F7/0813—Specific details related to card security
- G07F7/082—Features insuring the integrity of the data on or in the card
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F7/00—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
- G07F7/08—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
- G07F7/0806—Details of the card
- G07F7/0833—Card having specific functional components
- G07F7/084—Additional components relating to data transfer and storing, e.g. error detection, self-diagnosis
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F7/00—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
- G07F7/08—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
- G07F7/10—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data
- G07F7/1025—Identification of user by a PIN code
- G07F7/1083—Counting of PIN attempts
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/002—Countermeasures against attacks on cryptographic mechanisms
- H04L9/003—Countermeasures against attacks on cryptographic mechanisms for power analysis, e.g. differential power analysis [DPA] or simple power analysis [SPA]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0618—Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
- H04L9/0625—Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation with splitting of the data block into left and right halves, e.g. Feistel based algorithms, DES, FEAL, IDEA or KASUMI
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2207/00—Indexing scheme relating to methods or arrangements for processing data by operating upon the order or content of the data handled
- G06F2207/72—Indexing scheme relating to groups G06F7/72 - G06F7/729
- G06F2207/7219—Countermeasures against side channel or fault attacks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/16—Obfuscation or hiding, e.g. involving white box
Landscapes
- Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- Computer Security & Cryptography (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Computer Hardware Design (AREA)
- Signal Processing (AREA)
- Business, Economics & Management (AREA)
- Software Systems (AREA)
- General Engineering & Computer Science (AREA)
- Mathematical Physics (AREA)
- Microelectronics & Electronic Packaging (AREA)
- Accounting & Taxation (AREA)
- Strategic Management (AREA)
- General Business, Economics & Management (AREA)
- Storage Device Security (AREA)
Abstract
Изобретение относится к защите данных, в частности, это изобретение касается уменьшения риска несанкционированного доступа к данным. Изобретение обеспечивает практическую и эффективную модификацию криптографических и других процессов, при этом такая модификация основано на секретности данных через изменяющееся отображение всех секретных данных и промежуточных данных для вычисления и хранения. Примерами таких данных являются криптографические коды, сохраненные и сообщенные данные. Там, где или отображенные данные, или выбранное отображение (или все отображения составного объекта, где это используется) неизвестны, не может быть определена никакая информация относительно секретных данных. Эта методика обладает значительными возможностями уменьшить утечку через побочный канал ввода-вывода количества доступной информации, касающейся первоначальных данных, при условии, что наблюдаемая утечка побочного канала ввода-вывода достаточно низкая. Таким образом, чтобы получить преимущества от изобретения, здесь предлагается метод обработки данных для того, чтобы уменьшить риск неуполномоченного доступа к данным, например, через DPA, этот метод включает в себя следующие шаги: разработку алгоритмов, в частности, но не исключительно шифров, для получения максимальной выгоды от этой методики; расширение общеизвестной методики селективно блокирующихся данных до большего набора отображений; видоизменение выполнения алгоритма, чтобы работать по отображенным данным; первоначальное отображение данных, особенно криптографических кодов, для хранения; изменение получения отображения от каждого прежнего отображения при
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US16104799P | 1999-10-25 | 1999-10-25 | |
PCT/ZA2000/000192 WO2001031422A2 (en) | 1999-10-25 | 2000-10-19 | Method for protection against analysis of unintended side-channel signals |
Publications (2)
Publication Number | Publication Date |
---|---|
EA200200468A1 true EA200200468A1 (ru) | 2002-10-31 |
EA003874B1 EA003874B1 (ru) | 2003-10-30 |
Family
ID=22579586
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
EA200200468A EA003874B1 (ru) | 1999-10-25 | 2000-10-19 | Способ обработки данных, устойчивый к извлечению данных с помощью анализа непреднамеренных сигналов побочного ввода-вывода |
Country Status (8)
Country | Link |
---|---|
EP (1) | EP1226681A2 (ru) |
JP (1) | JP2003513490A (ru) |
CN (1) | CN1413398A (ru) |
AU (1) | AU773982B2 (ru) |
CA (1) | CA2388971A1 (ru) |
EA (1) | EA003874B1 (ru) |
WO (1) | WO2001031422A2 (ru) |
ZA (1) | ZA200202798B (ru) |
Families Citing this family (21)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7142670B2 (en) * | 2001-08-14 | 2006-11-28 | International Business Machines Corporation | Space-efficient, side-channel attack resistant table lookups |
CN1640051B (zh) * | 2002-03-07 | 2011-05-18 | 艾斯奥托公司 | 使具有秘密密钥的电子密码装置安全的方法 |
FR2842376B1 (fr) * | 2002-07-10 | 2004-09-24 | Somfy | Procede de communication selective entre objets |
EP1457858A1 (fr) * | 2003-03-14 | 2004-09-15 | SCHLUMBERGER Systèmes | Procédé de sécurisation d'un ensemble électronique à cryptoprocesseur |
DE10341096A1 (de) | 2003-09-05 | 2005-03-31 | Giesecke & Devrient Gmbh | Übergang zwischen maskierten Repräsentationen eines Wertes bei kryptographischen Berechnungen |
WO2005057927A1 (en) * | 2003-11-13 | 2005-06-23 | Magiq Technologies, Inc | Qkd with classical bit encryption |
KR101061906B1 (ko) * | 2004-02-19 | 2011-09-02 | 삼성전자주식회사 | 전력분석공격에 안전한 기본 연산 장치 및 방법 |
EP1596278A1 (fr) * | 2004-05-11 | 2005-11-16 | Axalto SA | Procédé de protection d'un ensemble cryptographique par masquage homographique |
FR2873523B1 (fr) * | 2004-07-22 | 2007-08-10 | Sagem | Procede et dispositif d'execution d'un calcul cryptographique |
DE102004043243A1 (de) * | 2004-09-07 | 2006-03-23 | Comvenient Gmbh & Co. Kg | Verfahren zum Schutz von Schlüsseln |
EP1646174A1 (en) * | 2004-10-07 | 2006-04-12 | Axalto SA | Method and apparatus for generating cryptographic sets of instructions automatically and code generation |
US7881466B2 (en) | 2004-10-28 | 2011-02-01 | Irdeto B.V. | Method and system for obfuscating a cryptographic function |
JP2008181225A (ja) * | 2007-01-23 | 2008-08-07 | Toshiba Corp | Icカード |
EP2255317B1 (en) * | 2008-03-05 | 2013-05-15 | Irdeto B.V. | Cryptographic system |
EP2525298B1 (en) * | 2011-05-17 | 2016-07-13 | Nxp B.V. | Authentication method |
EP2620890A1 (en) * | 2012-01-25 | 2013-07-31 | Gemalto SA | Method for detecting a fault injected in hardware registers of an electronic device |
DE102012018924A1 (de) | 2012-09-25 | 2014-03-27 | Giesecke & Devrient Gmbh | Seitenkanalgeschützte Maskierung |
US9009495B2 (en) | 2013-06-28 | 2015-04-14 | Envieta, LLC | High speed cryptographic combining system, and method for programmable logic devices |
JP6264935B2 (ja) * | 2014-02-24 | 2018-01-24 | 大日本印刷株式会社 | 情報処理装置の認証方法 |
CN104104587B (zh) * | 2014-04-18 | 2017-12-26 | 天津大学 | 一种认证邮件协议的后一致性分析方法 |
CN105757878B (zh) * | 2016-02-19 | 2018-07-27 | 广东美的暖通设备有限公司 | 通讯数据的编码及解码方法、装置和空调器 |
-
2000
- 2000-10-19 AU AU23014/01A patent/AU773982B2/en not_active Ceased
- 2000-10-19 EP EP00986837A patent/EP1226681A2/en not_active Withdrawn
- 2000-10-19 CA CA002388971A patent/CA2388971A1/en not_active Abandoned
- 2000-10-19 CN CN00817503A patent/CN1413398A/zh active Pending
- 2000-10-19 EA EA200200468A patent/EA003874B1/ru not_active IP Right Cessation
- 2000-10-19 WO PCT/ZA2000/000192 patent/WO2001031422A2/en active Search and Examination
- 2000-10-19 JP JP2001533494A patent/JP2003513490A/ja active Pending
-
2002
- 2002-04-10 ZA ZA200202798A patent/ZA200202798B/xx unknown
Also Published As
Publication number | Publication date |
---|---|
AU2301401A (en) | 2001-05-08 |
CA2388971A1 (en) | 2001-05-03 |
WO2001031422A2 (en) | 2001-05-03 |
CN1413398A (zh) | 2003-04-23 |
EP1226681A2 (en) | 2002-07-31 |
WO2001031422B1 (en) | 2002-01-10 |
AU773982B2 (en) | 2004-06-10 |
WO2001031422A3 (en) | 2001-12-13 |
EA003874B1 (ru) | 2003-10-30 |
ZA200202798B (en) | 2003-09-23 |
JP2003513490A (ja) | 2003-04-08 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EA200200468A1 (ru) | Метод для создания системы обработки данных, устойчивой к извлечению данных с помощью анализа непреднамеренных сигналов побочного ввода-вывода | |
RU2357365C2 (ru) | Способ и устройство для выполнения криптографического вычисления | |
US8296577B2 (en) | Cryptographic bus architecture for the prevention of differential power analysis | |
US8332634B2 (en) | Cryptographic systems for encrypting input data using an address associated with the input data, error detection circuits, and methods of operating the same | |
DE60044168D1 (de) | Verfahren zur sicherung einer elektronischen verschlüsselungsvorrichtung mit geheimschlüssel gegen angriffe mittels physischer analyse | |
CN110100422B (zh) | 基于区块链智能合约的数据写入方法、装置及存储介质 | |
JP2002519722A (ja) | スマートカードおよび他の暗号システム用の、漏洩を最小に抑える、改良desおよび他の暗号プロセス | |
US20030084308A1 (en) | Memory encryption | |
US20030093684A1 (en) | Device and method with reduced information leakage | |
JP2005510095A (ja) | 情報漏洩が低減される装置および方法 | |
ES2138461T3 (es) | Codificacion y decodificacion de datos multimedia. | |
BR9710169A (pt) | Método e sistema aperfeiçoados para criptografar entrada de acesso de uma tela de toque | |
CN1989726A (zh) | 用于执行加密计算的方法和装置 | |
ATE293323T1 (de) | Verfahren und vorrichtung für ein robustes und schnelles kryptosystem | |
US20120047417A1 (en) | Operation unit and program | |
JPH0834587B2 (ja) | 画像データの秘匿方法 | |
US7000111B1 (en) | Method for masking secret multiplicands | |
GB2403880A (en) | Non-repudiation of service agreements | |
EP1237322A3 (en) | Fault detection method for cryptographic process | |
US10805066B2 (en) | Cryptographic algorithm having a key-dependent masked computing step (SBOX call) | |
GB2438972A (en) | Encrypting data using an address associated with the data | |
US20060159258A1 (en) | Processor for encrypting and/or decrypting data and method of encrypting and/or decrypting data using such a processor | |
JO2271B1 (en) | A method of encoding a multiple unit of measurement | |
KR101203474B1 (ko) | 암호화 프로세서를 갖는 단위 전자장치의 보안화 방법 | |
Ali et al. | Implementation of triple data encryption algorithm using vhdl |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
MM4A | Lapse of a eurasian patent due to non-payment of renewal fees within the time limit in the following designated state(s) |
Designated state(s): AM AZ BY KZ KG MD TJ TM |
|
MM4A | Lapse of a eurasian patent due to non-payment of renewal fees within the time limit in the following designated state(s) |
Designated state(s): RU |