SK2892002A3 - Multiple module encryption method - Google Patents

Multiple module encryption method Download PDF

Info

Publication number
SK2892002A3
SK2892002A3 SK289-2002A SK2892002A SK2892002A3 SK 2892002 A3 SK2892002 A3 SK 2892002A3 SK 2892002 A SK2892002 A SK 2892002A SK 2892002 A3 SK2892002 A3 SK 2892002A3
Authority
SK
Slovakia
Prior art keywords
module
encryption
decryption
key
modules
Prior art date
Application number
SK289-2002A
Other languages
English (en)
Slovak (sk)
Inventor
Marco Sasselli
Christophe Nicolas
Michael John Hill
Original Assignee
Nagracard Sa
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nagracard Sa filed Critical Nagracard Sa
Publication of SK2892002A3 publication Critical patent/SK2892002A3/sk

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/002Countermeasures against attacks on cryptographic mechanisms
    • H04L9/003Countermeasures against attacks on cryptographic mechanisms for power analysis, e.g. differential power analysis [DPA] or simple power analysis [SPA]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/14Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/50Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Storage Device Security (AREA)
  • Compression, Expansion, Code Conversion, And Decoders (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Slot Machines And Peripheral Devices (AREA)
  • Coupling Device And Connection With Printed Circuit (AREA)
SK289-2002A 1999-08-30 2000-08-24 Multiple module encryption method SK2892002A3 (en)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
CH157399 1999-08-30
US19417100P 2000-04-03 2000-04-03
PCT/IB2000/001157 WO2001017159A1 (fr) 1999-08-30 2000-08-24 Methode d'encryptage multi-modules

Publications (1)

Publication Number Publication Date
SK2892002A3 true SK2892002A3 (en) 2002-07-02

Family

ID=25688037

Family Applications (1)

Application Number Title Priority Date Filing Date
SK289-2002A SK2892002A3 (en) 1999-08-30 2000-08-24 Multiple module encryption method

Country Status (27)

Country Link
EP (1) EP1208666A1 (et)
JP (1) JP2003508965A (et)
KR (1) KR20020041807A (et)
CN (1) CN100448193C (et)
AP (1) AP2002002433A0 (et)
AU (1) AU769437B2 (et)
BG (1) BG64520B1 (et)
BR (1) BR0013712A (et)
CA (1) CA2383042A1 (et)
CU (1) CU22950A3 (et)
CZ (1) CZ2002582A3 (et)
DZ (1) DZ3193A1 (et)
EA (1) EA003745B1 (et)
EE (1) EE200200106A (et)
HK (1) HK1048407B (et)
HR (1) HRP20020179A2 (et)
HU (1) HU224846B1 (et)
IL (1) IL148285A0 (et)
MA (1) MA25431A1 (et)
MX (1) MXPA02001849A (et)
NO (1) NO20020951L (et)
NZ (1) NZ517438A (et)
OA (1) OA12153A (et)
PL (1) PL353795A1 (et)
SK (1) SK2892002A3 (et)
TR (1) TR200200525T2 (et)
WO (1) WO2001017159A1 (et)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8775319B2 (en) 2006-05-15 2014-07-08 The Directv Group, Inc. Secure content transfer systems and methods to operate the same
US10397258B2 (en) 2017-01-30 2019-08-27 Microsoft Technology Licensing, Llc Continuous learning for intrusion detection

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5594797A (en) * 1995-02-22 1997-01-14 Nokia Mobile Phones Variable security level encryption
DE19539700C1 (de) * 1995-10-25 1996-11-28 Siemens Ag Sicherheitschip

Also Published As

Publication number Publication date
CN100448193C (zh) 2008-12-31
HK1048407A1 (en) 2003-03-28
BG64520B1 (bg) 2005-05-31
NO20020951D0 (no) 2002-02-27
IL148285A0 (en) 2002-09-12
WO2001017159A1 (fr) 2001-03-08
CU22950A3 (es) 2004-04-13
CZ2002582A3 (cs) 2002-07-17
AU769437B2 (en) 2004-01-29
TR200200525T2 (tr) 2002-07-22
EP1208666A1 (fr) 2002-05-29
MA25431A1 (fr) 2002-04-01
HK1048407B (zh) 2009-09-25
BG106436A (en) 2002-10-31
EA200200184A1 (ru) 2002-06-27
HU224846B1 (en) 2006-03-28
NZ517438A (en) 2003-09-26
JP2003508965A (ja) 2003-03-04
OA12153A (fr) 2006-05-08
HRP20020179A2 (en) 2004-02-29
BR0013712A (pt) 2002-05-07
MXPA02001849A (es) 2004-02-26
CA2383042A1 (en) 2001-03-08
HUP0202691A2 (en) 2002-12-28
AP2002002433A0 (en) 2002-03-31
KR20020041807A (ko) 2002-06-03
NO20020951L (no) 2002-04-23
DZ3193A1 (fr) 2001-03-08
CN1371563A (zh) 2002-09-25
AU6311800A (en) 2001-03-26
EE200200106A (et) 2003-04-15
PL353795A1 (en) 2003-12-01
EA003745B1 (ru) 2003-08-28

Similar Documents

Publication Publication Date Title
US8296577B2 (en) Cryptographic bus architecture for the prevention of differential power analysis
Sung-Ming et al. A countermeasure against one physical cryptanalysis may benefit another attack
US8422671B2 (en) Methods of encryption and decryption using operand ordering and encryption systems using the same
EP1234404B1 (en) Generation of a mathematically constrained key using a one-way function
Guilley et al. Defeating any secret cryptography with SCARE attacks
EP2154604A1 (en) Countermeasure securing exponentiation based cryptography
US20060153372A1 (en) Smart card and method protecting secret key
Shah et al. An efficient audio encryption scheme based on finite fields
US7123717B1 (en) Countermeasure method in an electronic component which uses an RSA-type public key cryptographic algorithm
EP3188000A1 (en) System and method for hiding a cryptographic secret using expansion
Singh et al. Comparative study of DES, 3DES, AES and RSA
US7190790B1 (en) Multiple module encryption method
Malkin et al. A cryptographic method for secure watermark detection
SK2892002A3 (en) Multiple module encryption method
Matthews Low cost attacks on smart cards: the electromagnetic sidechannel
Ahmed et al. Implementation of rc5 block cipher algorithm for image cryptosystems
Mukherjee et al. A counter measure to prevent timing-based side-channel attack on FPGA
Sulaiman et al. Extensive analysis on images encryption using hybrid elliptic curve cryptosystem and hill cipher
Piper Basic principles of cryptography
Altigani et al. Evaluating AES Performance Using NIST Recommended Block Cipher Modes of Operation
Babash Automata Under Effective Observation
Alexandru-Vasile Ransomware data recovery techniques
Rwabutaza et al. A comparative survey on cryptology-based methodologies
Shoukat et al. Effective evaluation metrics for the assessment of cryptographic algorithms and key exchange tactics
Rathod et al. Comparison of symmetric key encryption algorithms