FR3069993B1 - Dispositifs et procedes de masquage d'operations de chiffrement rsa - Google Patents
Dispositifs et procedes de masquage d'operations de chiffrement rsa Download PDFInfo
- Publication number
- FR3069993B1 FR3069993B1 FR1757555A FR1757555A FR3069993B1 FR 3069993 B1 FR3069993 B1 FR 3069993B1 FR 1757555 A FR1757555 A FR 1757555A FR 1757555 A FR1757555 A FR 1757555A FR 3069993 B1 FR3069993 B1 FR 3069993B1
- Authority
- FR
- France
- Prior art keywords
- memory
- erasable
- masking
- methods
- devices
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/78—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
- G06F21/79—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data in semiconductor storage media, e.g. directly-addressable memories
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G09—EDUCATION; CRYPTOGRAPHY; DISPLAY; ADVERTISING; SEALS
- G09C—CIPHERING OR DECIPHERING APPARATUS FOR CRYPTOGRAPHIC OR OTHER PURPOSES INVOLVING THE NEED FOR SECRECY
- G09C1/00—Apparatus or methods whereby a given sequence of signs, e.g. an intelligible text, is transformed into an unintelligible sequence of signs by transposing the signs or groups of signs or by replacing them by others according to a predetermined system
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/002—Countermeasures against attacks on cryptographic mechanisms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0869—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0894—Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
- H04L9/3006—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters
- H04L9/302—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters involving the integer factorization problem, e.g. RSA or quadratic sieve [QS] schemes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2143—Clearing memory, e.g. to prevent the data from being stolen
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F7/00—Methods or arrangements for processing data by operating upon the order or content of the data handled
- G06F7/58—Random or pseudo-random number generators
- G06F7/588—Random number generators, i.e. based on natural stochastic processes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/04—Masking or blinding
- H04L2209/046—Masking or blinding of operations, operands or results of the operations
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Computing Systems (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- General Engineering & Computer Science (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Storage Device Security (AREA)
Abstract
Il est présenté des dispositifs et procédés destinés à protéger des données secrètes qui sont contenues dans une mémoire afin d'empêcher des accès et manipulation de données non autorisés. Différents modes de réalisation peuvent être appliqués afin de cacher ou masquer un exposant RSA utilisé pour la cryptographie à clef publique et mémorisé dans un bloc cryptographique matériel qui utilise une mémoire de travail ne pouvant être effacée pour des calculs. Dans certains modes de réalisation, le masquage d'exposants RSA est réalisé par un processus en deux étapes qui associe une valeur aléatoire et secrète, calculée de manière spécifique, à l'exposant secret. La valeur aléatoire est mémorisée dans une mémoire pouvant être effacée, de telle sorte qu'en cas d'attaque, à la fois la mémoire pouvant être effacée et la mémoire ne pouvant l'être ne laissent paraître aucun des secrets intégrés. Le sur-coût en ressources de mémoire n'affecte les performances du dispositif que seulement de manière insignifiante.
Priority Applications (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
FR1757555A FR3069993B1 (fr) | 2017-08-07 | 2017-08-07 | Dispositifs et procedes de masquage d'operations de chiffrement rsa |
US16/039,014 US11115210B2 (en) | 2017-08-07 | 2018-07-18 | Systems and methods for masking RSA operations |
CN201810889230.6A CN109388976B (zh) | 2017-08-07 | 2018-08-07 | 用于屏蔽rsa运算的系统和方法 |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
FR1757555 | 2017-08-07 | ||
FR1757555A FR3069993B1 (fr) | 2017-08-07 | 2017-08-07 | Dispositifs et procedes de masquage d'operations de chiffrement rsa |
Publications (2)
Publication Number | Publication Date |
---|---|
FR3069993A1 FR3069993A1 (fr) | 2019-02-08 |
FR3069993B1 true FR3069993B1 (fr) | 2020-09-18 |
Family
ID=60923571
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
FR1757555A Active FR3069993B1 (fr) | 2017-08-07 | 2017-08-07 | Dispositifs et procedes de masquage d'operations de chiffrement rsa |
Country Status (3)
Country | Link |
---|---|
US (1) | US11115210B2 (fr) |
CN (1) | CN109388976B (fr) |
FR (1) | FR3069993B1 (fr) |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110048840B (zh) * | 2019-04-28 | 2021-10-15 | 苏州国芯科技股份有限公司 | 一种基于rsa算法的信息处理方法、系统及相关组件 |
CN111190733B (zh) * | 2019-12-27 | 2023-11-17 | 华为技术有限公司 | 用于进行rsa计算的计算资源调度方法及装置 |
Family Cites Families (19)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPH1165439A (ja) * | 1996-08-09 | 1999-03-05 | Nippon Telegr & Teleph Corp <Ntt> | N進表現暗号による通信および認証方法、ならびにそれらの装置、およびn進表現暗号による通信および認証プログラムを格納した記憶媒体 |
US7366305B2 (en) * | 2003-09-30 | 2008-04-29 | Intel Corporation | Platform and method for establishing trust without revealing identity |
FR2867635B1 (fr) * | 2004-03-11 | 2006-09-22 | Oberthur Card Syst Sa | Procede de traitement de donnees securise, base notamment sur un algorithme cryptographique |
US7590880B1 (en) * | 2004-09-13 | 2009-09-15 | National Semiconductor Corporation | Circuitry and method for detecting and protecting against over-clocking attacks |
JP4962165B2 (ja) | 2007-06-22 | 2012-06-27 | 大日本印刷株式会社 | 暗号処理装置,暗号処理プログラム及び暗号処理方法 |
US20090016523A1 (en) * | 2007-07-12 | 2009-01-15 | Atmel Corporation | Masking and Additive Decomposition Techniques for Cryptographic Field Operations |
JP5182364B2 (ja) * | 2008-03-28 | 2013-04-17 | 富士通株式会社 | サイドチャネル攻撃に対する耐タンパ性を有する暗号処理方法 |
US20130265163A1 (en) * | 2010-06-09 | 2013-10-10 | Raytheon Company | Magnetic Field Activated Intrusion Detection |
FR2966953B1 (fr) * | 2010-11-02 | 2015-08-28 | St Microelectronics Rousset | Procede de contremesure cryptographique par derivation d'une donnee secrete |
EP2506176A1 (fr) * | 2011-03-30 | 2012-10-03 | Irdeto Corporate B.V. | Établissement de clé unique durant la fabrication de puce |
GB2494731B (en) * | 2011-09-06 | 2013-11-20 | Nds Ltd | Preventing data extraction by sidechannel attack |
JP5481455B2 (ja) * | 2011-09-27 | 2014-04-23 | 株式会社東芝 | 暗号処理装置 |
US9335967B1 (en) * | 2013-06-13 | 2016-05-10 | Cadence Design Systems, Inc. | Accurate floating-point calculation method and device |
FR3010210B1 (fr) * | 2013-08-29 | 2017-01-13 | Stmicroelectronics Rousset | Protection d'un calcul contre des attaques par canaux caches |
US10263770B2 (en) * | 2013-11-06 | 2019-04-16 | Pure Storage, Inc. | Data protection in a storage system using external secrets |
KR102279027B1 (ko) * | 2014-12-03 | 2021-07-19 | 삼성전자주식회사 | 멀티 스레드를 실행하는 방법 및 장치 |
US20180018147A1 (en) | 2015-01-15 | 2018-01-18 | Mitsubishi Electric Corporation | Random number expanding device, random number expanding method, and non-transitory computer readable recording medium storing random number expanding program |
FR3033965B1 (fr) * | 2015-03-18 | 2018-12-07 | Maxim Integrated Products, Inc. | Systèmes et procédés de commande de dispositifs de cryptage sur courbe elliptique sécurisés |
US10205598B2 (en) * | 2015-05-03 | 2019-02-12 | Ronald Francis Sulpizio, JR. | Temporal key generation and PKI gateway |
-
2017
- 2017-08-07 FR FR1757555A patent/FR3069993B1/fr active Active
-
2018
- 2018-07-18 US US16/039,014 patent/US11115210B2/en active Active
- 2018-08-07 CN CN201810889230.6A patent/CN109388976B/zh active Active
Also Published As
Publication number | Publication date |
---|---|
FR3069993A1 (fr) | 2019-02-08 |
CN109388976A (zh) | 2019-02-26 |
CN109388976B (zh) | 2023-12-05 |
US20190044717A1 (en) | 2019-02-07 |
US11115210B2 (en) | 2021-09-07 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Yu et al. | Optical image encryption algorithm based on phase-truncated short-time fractional Fourier transform and hyper-chaotic system | |
Bao et al. | Image encryption: Generating visually meaningful encrypted images | |
Akhshani et al. | A novel scheme for image encryption based on 2D piecewise chaotic maps | |
FR3069993B1 (fr) | Dispositifs et procedes de masquage d'operations de chiffrement rsa | |
Farwa et al. | A novel image encryption based on algebraic S-box and Arnold transform | |
TWI762283B (zh) | 圖像的隱私保護方法、裝置及設備 | |
Gayathri et al. | An efficient spatiotemporal chaotic image cipher with an improved scrambling algorithm driven by dynamic diffusion phase | |
BR112017007146A2 (pt) | ações de limpeza de conteúdo móvel através dispositivos | |
SaghaianNejadEsfahani et al. | Privacy protected image denoising with secret shares | |
Dorrendorf et al. | Cryptanalysis of the windows random number generator | |
GB2419787B (en) | Method and apparatus for providing short-term private keys in public-key cryptographic systems | |
Rachmawanto et al. | A comparative study of image cryptographic method | |
DE112017007095T5 (de) | Verschlüsselungsvorrichtung und entschlüsselungsvorrichtung | |
CN105024812A (zh) | 云存储中基于身份的指定测试者的可搜索的加密方法 | |
Raheema et al. | Design and implementation of speech encryption based on hybrid chaotic maps | |
Sowmya et al. | Symmetric key image encryption scheme with key sequences derived from random sequence of cyclic elliptic curve points over GF (p) | |
RU2403682C2 (ru) | Способ и устройство для выполнения криптографического вычисления | |
Saeed et al. | A gray-scale image encryption using Fisher-Yates chaotic shuffling in wavelet domain | |
Kutade et al. | A survey on various approaches of image steganography | |
US10198584B2 (en) | Non-malleable obfuscator for sparse functions | |
FR2814620A1 (fr) | Procede de transmission accelere de signature electronique | |
Ain et al. | Efficient cryptosystem for image security based on enhanced chaotic maps | |
Sasirekha et al. | An improved secure code encryption approach based on indexed table | |
Albishi et al. | Odd/Even Differential Image Steganography Approach | |
Grossklags et al. | Financial Cryptography and Data Security |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PLSC | Publication of the preliminary search report |
Effective date: 20190208 |
|
PLFP | Fee payment |
Year of fee payment: 3 |
|
PLFP | Fee payment |
Year of fee payment: 4 |
|
PLFP | Fee payment |
Year of fee payment: 5 |
|
PLFP | Fee payment |
Year of fee payment: 6 |
|
PLFP | Fee payment |
Year of fee payment: 7 |