FR3069993B1 - Dispositifs et procedes de masquage d'operations de chiffrement rsa - Google Patents

Dispositifs et procedes de masquage d'operations de chiffrement rsa Download PDF

Info

Publication number
FR3069993B1
FR3069993B1 FR1757555A FR1757555A FR3069993B1 FR 3069993 B1 FR3069993 B1 FR 3069993B1 FR 1757555 A FR1757555 A FR 1757555A FR 1757555 A FR1757555 A FR 1757555A FR 3069993 B1 FR3069993 B1 FR 3069993B1
Authority
FR
France
Prior art keywords
memory
erasable
masking
methods
devices
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
FR1757555A
Other languages
English (en)
Other versions
FR3069993A1 (fr
Inventor
Yann Yves Rene Loisel
Frank Lhermet
Jeremy Dubeuf
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Maxim Integrated Products Inc
Original Assignee
Maxim Integrated Products Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Maxim Integrated Products Inc filed Critical Maxim Integrated Products Inc
Priority to FR1757555A priority Critical patent/FR3069993B1/fr
Priority to US16/039,014 priority patent/US11115210B2/en
Priority to CN201810889230.6A priority patent/CN109388976B/zh
Publication of FR3069993A1 publication Critical patent/FR3069993A1/fr
Application granted granted Critical
Publication of FR3069993B1 publication Critical patent/FR3069993B1/fr
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/78Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
    • G06F21/79Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data in semiconductor storage media, e.g. directly-addressable memories
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G09EDUCATION; CRYPTOGRAPHY; DISPLAY; ADVERTISING; SEALS
    • G09CCIPHERING OR DECIPHERING APPARATUS FOR CRYPTOGRAPHIC OR OTHER PURPOSES INVOLVING THE NEED FOR SECRECY
    • G09C1/00Apparatus or methods whereby a given sequence of signs, e.g. an intelligible text, is transformed into an unintelligible sequence of signs by transposing the signs or groups of signs or by replacing them by others according to a predetermined system
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/002Countermeasures against attacks on cryptographic mechanisms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0869Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0894Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • H04L9/3006Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters
    • H04L9/302Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters involving the integer factorization problem, e.g. RSA or quadratic sieve [QS] schemes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2143Clearing memory, e.g. to prevent the data from being stolen
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F7/00Methods or arrangements for processing data by operating upon the order or content of the data handled
    • G06F7/58Random or pseudo-random number generators
    • G06F7/588Random number generators, i.e. based on natural stochastic processes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/04Masking or blinding
    • H04L2209/046Masking or blinding of operations, operands or results of the operations

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computing Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Storage Device Security (AREA)

Abstract

Il est présenté des dispositifs et procédés destinés à protéger des données secrètes qui sont contenues dans une mémoire afin d'empêcher des accès et manipulation de données non autorisés. Différents modes de réalisation peuvent être appliqués afin de cacher ou masquer un exposant RSA utilisé pour la cryptographie à clef publique et mémorisé dans un bloc cryptographique matériel qui utilise une mémoire de travail ne pouvant être effacée pour des calculs. Dans certains modes de réalisation, le masquage d'exposants RSA est réalisé par un processus en deux étapes qui associe une valeur aléatoire et secrète, calculée de manière spécifique, à l'exposant secret. La valeur aléatoire est mémorisée dans une mémoire pouvant être effacée, de telle sorte qu'en cas d'attaque, à la fois la mémoire pouvant être effacée et la mémoire ne pouvant l'être ne laissent paraître aucun des secrets intégrés. Le sur-coût en ressources de mémoire n'affecte les performances du dispositif que seulement de manière insignifiante.
FR1757555A 2017-08-07 2017-08-07 Dispositifs et procedes de masquage d'operations de chiffrement rsa Active FR3069993B1 (fr)

Priority Applications (3)

Application Number Priority Date Filing Date Title
FR1757555A FR3069993B1 (fr) 2017-08-07 2017-08-07 Dispositifs et procedes de masquage d'operations de chiffrement rsa
US16/039,014 US11115210B2 (en) 2017-08-07 2018-07-18 Systems and methods for masking RSA operations
CN201810889230.6A CN109388976B (zh) 2017-08-07 2018-08-07 用于屏蔽rsa运算的系统和方法

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
FR1757555 2017-08-07
FR1757555A FR3069993B1 (fr) 2017-08-07 2017-08-07 Dispositifs et procedes de masquage d'operations de chiffrement rsa

Publications (2)

Publication Number Publication Date
FR3069993A1 FR3069993A1 (fr) 2019-02-08
FR3069993B1 true FR3069993B1 (fr) 2020-09-18

Family

ID=60923571

Family Applications (1)

Application Number Title Priority Date Filing Date
FR1757555A Active FR3069993B1 (fr) 2017-08-07 2017-08-07 Dispositifs et procedes de masquage d'operations de chiffrement rsa

Country Status (3)

Country Link
US (1) US11115210B2 (fr)
CN (1) CN109388976B (fr)
FR (1) FR3069993B1 (fr)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110048840B (zh) * 2019-04-28 2021-10-15 苏州国芯科技股份有限公司 一种基于rsa算法的信息处理方法、系统及相关组件
CN111190733B (zh) * 2019-12-27 2023-11-17 华为技术有限公司 用于进行rsa计算的计算资源调度方法及装置

Family Cites Families (19)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH1165439A (ja) * 1996-08-09 1999-03-05 Nippon Telegr & Teleph Corp <Ntt> N進表現暗号による通信および認証方法、ならびにそれらの装置、およびn進表現暗号による通信および認証プログラムを格納した記憶媒体
US7366305B2 (en) * 2003-09-30 2008-04-29 Intel Corporation Platform and method for establishing trust without revealing identity
FR2867635B1 (fr) * 2004-03-11 2006-09-22 Oberthur Card Syst Sa Procede de traitement de donnees securise, base notamment sur un algorithme cryptographique
US7590880B1 (en) * 2004-09-13 2009-09-15 National Semiconductor Corporation Circuitry and method for detecting and protecting against over-clocking attacks
JP4962165B2 (ja) 2007-06-22 2012-06-27 大日本印刷株式会社 暗号処理装置,暗号処理プログラム及び暗号処理方法
US20090016523A1 (en) * 2007-07-12 2009-01-15 Atmel Corporation Masking and Additive Decomposition Techniques for Cryptographic Field Operations
JP5182364B2 (ja) * 2008-03-28 2013-04-17 富士通株式会社 サイドチャネル攻撃に対する耐タンパ性を有する暗号処理方法
US20130265163A1 (en) * 2010-06-09 2013-10-10 Raytheon Company Magnetic Field Activated Intrusion Detection
FR2966953B1 (fr) * 2010-11-02 2015-08-28 St Microelectronics Rousset Procede de contremesure cryptographique par derivation d'une donnee secrete
EP2506176A1 (fr) * 2011-03-30 2012-10-03 Irdeto Corporate B.V. Établissement de clé unique durant la fabrication de puce
GB2494731B (en) * 2011-09-06 2013-11-20 Nds Ltd Preventing data extraction by sidechannel attack
JP5481455B2 (ja) * 2011-09-27 2014-04-23 株式会社東芝 暗号処理装置
US9335967B1 (en) * 2013-06-13 2016-05-10 Cadence Design Systems, Inc. Accurate floating-point calculation method and device
FR3010210B1 (fr) * 2013-08-29 2017-01-13 Stmicroelectronics Rousset Protection d'un calcul contre des attaques par canaux caches
US10263770B2 (en) * 2013-11-06 2019-04-16 Pure Storage, Inc. Data protection in a storage system using external secrets
KR102279027B1 (ko) * 2014-12-03 2021-07-19 삼성전자주식회사 멀티 스레드를 실행하는 방법 및 장치
US20180018147A1 (en) 2015-01-15 2018-01-18 Mitsubishi Electric Corporation Random number expanding device, random number expanding method, and non-transitory computer readable recording medium storing random number expanding program
FR3033965B1 (fr) * 2015-03-18 2018-12-07 Maxim Integrated Products, Inc. Systèmes et procédés de commande de dispositifs de cryptage sur courbe elliptique sécurisés
US10205598B2 (en) * 2015-05-03 2019-02-12 Ronald Francis Sulpizio, JR. Temporal key generation and PKI gateway

Also Published As

Publication number Publication date
FR3069993A1 (fr) 2019-02-08
CN109388976A (zh) 2019-02-26
CN109388976B (zh) 2023-12-05
US20190044717A1 (en) 2019-02-07
US11115210B2 (en) 2021-09-07

Similar Documents

Publication Publication Date Title
Yu et al. Optical image encryption algorithm based on phase-truncated short-time fractional Fourier transform and hyper-chaotic system
Bao et al. Image encryption: Generating visually meaningful encrypted images
Akhshani et al. A novel scheme for image encryption based on 2D piecewise chaotic maps
FR3069993B1 (fr) Dispositifs et procedes de masquage d&#39;operations de chiffrement rsa
Farwa et al. A novel image encryption based on algebraic S-box and Arnold transform
TWI762283B (zh) 圖像的隱私保護方法、裝置及設備
Gayathri et al. An efficient spatiotemporal chaotic image cipher with an improved scrambling algorithm driven by dynamic diffusion phase
BR112017007146A2 (pt) ações de limpeza de conteúdo móvel através dispositivos
SaghaianNejadEsfahani et al. Privacy protected image denoising with secret shares
Dorrendorf et al. Cryptanalysis of the windows random number generator
GB2419787B (en) Method and apparatus for providing short-term private keys in public-key cryptographic systems
Rachmawanto et al. A comparative study of image cryptographic method
DE112017007095T5 (de) Verschlüsselungsvorrichtung und entschlüsselungsvorrichtung
CN105024812A (zh) 云存储中基于身份的指定测试者的可搜索的加密方法
Raheema et al. Design and implementation of speech encryption based on hybrid chaotic maps
Sowmya et al. Symmetric key image encryption scheme with key sequences derived from random sequence of cyclic elliptic curve points over GF (p)
RU2403682C2 (ru) Способ и устройство для выполнения криптографического вычисления
Saeed et al. A gray-scale image encryption using Fisher-Yates chaotic shuffling in wavelet domain
Kutade et al. A survey on various approaches of image steganography
US10198584B2 (en) Non-malleable obfuscator for sparse functions
FR2814620A1 (fr) Procede de transmission accelere de signature electronique
Ain et al. Efficient cryptosystem for image security based on enhanced chaotic maps
Sasirekha et al. An improved secure code encryption approach based on indexed table
Albishi et al. Odd/Even Differential Image Steganography Approach
Grossklags et al. Financial Cryptography and Data Security

Legal Events

Date Code Title Description
PLSC Publication of the preliminary search report

Effective date: 20190208

PLFP Fee payment

Year of fee payment: 3

PLFP Fee payment

Year of fee payment: 4

PLFP Fee payment

Year of fee payment: 5

PLFP Fee payment

Year of fee payment: 6

PLFP Fee payment

Year of fee payment: 7