GB9828538D0 - Method for encrypting data - Google Patents
Method for encrypting dataInfo
- Publication number
- GB9828538D0 GB9828538D0 GBGB9828538.0A GB9828538A GB9828538D0 GB 9828538 D0 GB9828538 D0 GB 9828538D0 GB 9828538 A GB9828538 A GB 9828538A GB 9828538 D0 GB9828538 D0 GB 9828538D0
- Authority
- GB
- United Kingdom
- Prior art keywords
- encrypting data
- encrypting
- data
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0618—Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
- H04L9/0625—Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation with splitting of the data block into left and right halves, e.g. Feistel based algorithms, DES, FEAL, IDEA or KASUMI
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/75—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information by inhibiting the analysis of circuitry or operation
- G06F21/755—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information by inhibiting the analysis of circuitry or operation with measures against power attack
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/72—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in cryptographic circuits
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/002—Countermeasures against attacks on cryptographic mechanisms
- H04L9/003—Countermeasures against attacks on cryptographic mechanisms for power analysis, e.g. differential power analysis [DPA] or simple power analysis [SPA]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2207/00—Indexing scheme relating to methods or arrangements for processing data by operating upon the order or content of the data handled
- G06F2207/72—Indexing scheme relating to groups G06F7/72 - G06F7/729
- G06F2207/7219—Countermeasures against side channel or fault attacks
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2211/00—Indexing scheme relating to details of data-processing equipment not covered by groups G06F3/00 - G06F13/00
- G06F2211/007—Encryption, En-/decode, En-/decipher, En-/decypher, Scramble, (De-)compress
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/08—Randomization, e.g. dummy operations or using noise
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/24—Key scheduling, i.e. generating round keys or sub-keys for block encryption
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Physics & Mathematics (AREA)
- Computer Hardware Design (AREA)
- Theoretical Computer Science (AREA)
- Mathematical Physics (AREA)
- Software Systems (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Storage Device Security (AREA)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
GB9828538A GB2345229B (en) | 1998-12-23 | 1998-12-23 | Method for encrypting data |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
GB9828538A GB2345229B (en) | 1998-12-23 | 1998-12-23 | Method for encrypting data |
Publications (3)
Publication Number | Publication Date |
---|---|
GB9828538D0 true GB9828538D0 (en) | 1999-02-17 |
GB2345229A GB2345229A (en) | 2000-06-28 |
GB2345229B GB2345229B (en) | 2003-12-03 |
Family
ID=10844967
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
GB9828538A Expired - Fee Related GB2345229B (en) | 1998-12-23 | 1998-12-23 | Method for encrypting data |
Country Status (1)
Country | Link |
---|---|
GB (1) | GB2345229B (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111597551A (en) * | 2020-05-20 | 2020-08-28 | 中国科学技术大学 | Protection method for side channel attack aiming at deep learning algorithm |
CN113343276A (en) * | 2021-07-01 | 2021-09-03 | 衡阳师范学院 | Generalized two-dimensional cat mapping-based lightweight block cipher algorithm GCM implementation method |
CN116055039A (en) * | 2022-12-29 | 2023-05-02 | 北京海泰方圆科技股份有限公司 | Random number generation method and device based on block cipher algorithm |
Families Citing this family (29)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7000111B1 (en) | 2000-11-07 | 2006-02-14 | Ericsson Inc. | Method for masking secret multiplicands |
JP4199937B2 (en) * | 2001-03-06 | 2008-12-24 | 株式会社日立製作所 | Anti-tamper encryption method |
DE10149191C2 (en) * | 2001-10-05 | 2003-12-18 | Infineon Technologies Ag | Method and device for determining original source data from original input data on the basis of a cryptographic operation |
FR2831739B1 (en) * | 2001-10-31 | 2005-07-22 | Gemplus Card Int | METHOD FOR SECURELY IMPLEMENTING A FUNCTIONAL MODULE IN AN ELECTRONIC COMPONENT AND CORRESPONDING COMPONENT |
DE10162309A1 (en) | 2001-12-19 | 2003-07-03 | Philips Intellectual Property | Method and arrangement for increasing the security of circuits against unauthorized access |
JP2005527853A (en) | 2002-05-23 | 2005-09-15 | アトメル・コーポレイション | Advanced Encryption Standard (AES) hardware cryptography engine |
JP2004212828A (en) * | 2003-01-08 | 2004-07-29 | Sony Corp | Encryption processing device, encryption processing method, and computer program |
DE102004018874B4 (en) * | 2004-04-19 | 2009-08-06 | Infineon Technologies Ag | Method and device for determining a result |
FR2873523B1 (en) * | 2004-07-22 | 2007-08-10 | Sagem | METHOD AND DEVICE FOR PERFORMING A CRYPTOGRAPHIC CALCULATION |
US20120005466A1 (en) * | 2004-12-20 | 2012-01-05 | Koninklijke Philips Electronics N.V. | Data processing device and method for operating such data processing device |
CN101213513B (en) | 2005-06-29 | 2013-06-12 | 爱迪德艾恩德霍芬公司 | Arrangement for and method of protecting a data processing device against a cryptographic attack or analysis |
FR2893796B1 (en) * | 2005-11-21 | 2008-01-04 | Atmel Corp | ENCRYPTION PROTECTION METHOD |
FR2897216B1 (en) * | 2006-02-08 | 2008-05-02 | Sagem Defense Securite | PROTECTION OF CRYPTOGRAPHIC ALGORITHM |
IL174784A0 (en) * | 2006-04-04 | 2006-12-31 | Nds Ltd | Robust cipher design |
EP1873671B2 (en) | 2006-06-29 | 2018-08-22 | STMicroelectronics International N.V. | A method for protecting IC Cards against power analysis attacks |
US8321666B2 (en) * | 2006-08-15 | 2012-11-27 | Sap Ag | Implementations of secure computation protocols |
US8091139B2 (en) * | 2007-11-01 | 2012-01-03 | Discretix Technologies Ltd. | System and method for masking arbitrary Boolean functions |
FR2923305B1 (en) * | 2007-11-02 | 2011-04-29 | Inside Contactless | METHOD AND DEVICES FOR PROTECTING A MICROCIRCUIT AGAINST ATTACKS TO DISCOVER SECRET DATA |
EP2173056A1 (en) * | 2008-09-04 | 2010-04-07 | Gemplus | Method for countermeasure in an electronic component using a secret key algorithm |
JP5433498B2 (en) * | 2010-05-27 | 2014-03-05 | 株式会社東芝 | Cryptographic processing device |
WO2012000091A1 (en) * | 2010-06-28 | 2012-01-05 | Lionstone Capital Corporation | Systems and methods for diversification of encryption algorithms and obfuscation symbols, symbol spaces and/or schemas |
US8583937B2 (en) | 2010-12-16 | 2013-11-12 | Blackberry Limited | Method and apparatus for securing a computing device |
EP2466523B1 (en) * | 2010-12-16 | 2015-04-29 | BlackBerry Limited | Method and apparatus for securing a computing device |
GB2487723A (en) | 2011-01-26 | 2012-08-08 | Nds Ltd | Protection device for stored data values comprising a switching circuit |
DE102014016548A1 (en) * | 2014-11-10 | 2016-05-12 | Giesecke & Devrient Gmbh | Method for testing and hardening software applications |
US11227071B2 (en) | 2017-03-20 | 2022-01-18 | Nanyang Technological University | Hardware security to countermeasure side-channel attacks |
US11669426B2 (en) | 2017-06-30 | 2023-06-06 | International Business Machines Corporation | Kernel-based power consumption and isolation and defense against emerging power attacks |
US11748297B2 (en) | 2019-04-26 | 2023-09-05 | Csub Auxiliary For Sponsored Programs Administration | Reconfigurable security hardware and methods for internet of things (IOT) systems |
CN112511292B (en) * | 2021-02-05 | 2021-05-04 | 浙江地芯引力科技有限公司 | Working performance detection and adaptive guiding method and device for security chip |
Family Cites Families (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CA2164768C (en) * | 1995-12-08 | 2001-01-23 | Carlisle Michael Adams | Constructing symmetric ciphers using the cast design procedure |
RU2103829C1 (en) * | 1997-04-02 | 1998-01-27 | Государственное унитарное предприятие "Специализированный центр программных систем "Спектр" | Method for encoding information which is represented in binary code |
KR100389902B1 (en) * | 1997-06-23 | 2003-09-22 | 삼성전자주식회사 | Fast block encryption method guaranteeing security for differential cryptanalysis and linear cryptanalysis |
EP1016240A1 (en) * | 1997-09-17 | 2000-07-05 | Frank C. Luyster | Improved block cipher method |
US6327661B1 (en) * | 1998-06-03 | 2001-12-04 | Cryptography Research, Inc. | Using unpredictable information to minimize leakage from smartcards and other cryptosystems |
CN1281023C (en) * | 1998-02-24 | 2006-10-18 | 莫斯科戈罗德电话设备公开股份公司 | Method for block-encryption of discrete data |
JP2002519722A (en) * | 1998-06-03 | 2002-07-02 | クリプターグラフィー リサーチ インコーポレイテッド | Improved DES and other cryptographic processes for smart cards and other cryptographic systems to minimize leakage |
JP2000066586A (en) * | 1998-08-24 | 2000-03-03 | Toshiba Corp | Data processor and communication system as well as recording medium |
FR2784831B1 (en) * | 1998-10-16 | 2000-12-15 | Gemplus Card Int | COUNTER-MEASUREMENT METHOD IN AN ELECTRONIC COMPONENT USING A SECRET KEY CRYPTOGRAPHY ALGORITHM |
FR2784829B1 (en) * | 1998-10-16 | 2000-12-29 | Gemplus Card Int | COUNTER-MEASUREMENT METHOD IN AN ELECTRONIC COMPONENT USING A SECRET KEY CRYPTOGRAPHY ALGORITHM |
FR2785477B1 (en) * | 1998-10-29 | 2000-12-29 | Gemplus Card Int | COUNTER-MEASUREMENT METHOD IN AN ELECTRONIC COMPONENT USING A SECRET KEY CRYPTOGRAPHY ALGORITHM |
-
1998
- 1998-12-23 GB GB9828538A patent/GB2345229B/en not_active Expired - Fee Related
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111597551A (en) * | 2020-05-20 | 2020-08-28 | 中国科学技术大学 | Protection method for side channel attack aiming at deep learning algorithm |
CN111597551B (en) * | 2020-05-20 | 2024-02-27 | 中国科学技术大学 | Protection method for side channel attack aiming at deep learning algorithm |
CN113343276A (en) * | 2021-07-01 | 2021-09-03 | 衡阳师范学院 | Generalized two-dimensional cat mapping-based lightweight block cipher algorithm GCM implementation method |
CN113343276B (en) * | 2021-07-01 | 2022-06-14 | 衡阳师范学院 | Encryption method of light-weight block cipher algorithm GCM based on generalized two-dimensional cat mapping |
CN116055039A (en) * | 2022-12-29 | 2023-05-02 | 北京海泰方圆科技股份有限公司 | Random number generation method and device based on block cipher algorithm |
CN116055039B (en) * | 2022-12-29 | 2023-11-14 | 北京海泰方圆科技股份有限公司 | Random number generation method and device based on block cipher algorithm |
Also Published As
Publication number | Publication date |
---|---|
GB2345229A (en) | 2000-06-28 |
GB2345229B (en) | 2003-12-03 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
GB2345229B (en) | Method for encrypting data | |
IL135437A0 (en) | Method for protecting important data bits using less important data bits | |
HK1029208A1 (en) | Computer operating method | |
EP1003320A4 (en) | Data communication apparatus | |
IL149080A0 (en) | System and method for data visualization | |
GB9809414D0 (en) | Method | |
AU2427199A (en) | Method and arrangement for ciphering information transfer | |
HUP0001150A3 (en) | Method for the data transmission | |
IL128846A0 (en) | Method and apparatus for data encryption | |
EP1059760A4 (en) | Method for the block-encryption of discrete data | |
EP1118946A4 (en) | Data interpolation method | |
EP1072101A4 (en) | Methods and apparatus for exchanging data | |
HUP9901733A3 (en) | Method for transmitting data | |
GB9828367D0 (en) | Method and apparatus for communicating information | |
GB9802475D0 (en) | Method | |
HK1024121A1 (en) | Data transfer method | |
GB9724655D0 (en) | Method for limiting cryptographic data throughput | |
AU5847399A (en) | Method for transmitting data | |
AU1265500A (en) | Security interface for data exchange | |
GB9806836D0 (en) | Data communication apparatus | |
HU9701946D0 (en) | Method for data transmission | |
SG85680A1 (en) | Method for processing information | |
HK1048407A1 (en) | Multiple module encryption method | |
GB9828872D0 (en) | Method for data serial transfer | |
HUP0104003A2 (en) | Method for transmitting binary data |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PCNP | Patent ceased through non-payment of renewal fee |
Effective date: 20091223 |