TW200830832A - Key protection mechanism - Google Patents
Key protection mechanism Download PDFInfo
- Publication number
- TW200830832A TW200830832A TW096143280A TW96143280A TW200830832A TW 200830832 A TW200830832 A TW 200830832A TW 096143280 A TW096143280 A TW 096143280A TW 96143280 A TW96143280 A TW 96143280A TW 200830832 A TW200830832 A TW 200830832A
- Authority
- TW
- Taiwan
- Prior art keywords
- key
- secret
- masked
- result
- check code
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/065—Encryption by serially and continuously modifying data stream elements, e.g. stream cipher systems, RC4, SEAL or A5/3
- H04L9/0656—Pseudorandom key sequence combined element-for-element with data sequence, e.g. one-time-pad [OTP] or Vernam's cipher
- H04L9/0662—Pseudorandom key sequence combined element-for-element with data sequence, e.g. one-time-pad [OTP] or Vernam's cipher with particular pseudorandom sequence generator
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/002—Countermeasures against attacks on cryptographic mechanisms
- H04L9/004—Countermeasures against attacks on cryptographic mechanisms for fault attacks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/04—Masking or blinding
- H04L2209/046—Masking or blinding of operations, operands or results of the operations
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/12—Details relating to cryptographic hardware or logic circuitry
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/34—Encoding or coding, e.g. Huffman coding or error correction
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Storage Device Security (AREA)
Description
200830832 九、發明說明: 【發明所屬之技術領域】 本發明係關於可抵抗差異過失分析或過失插入攻擊以保 護秘密密鑰之完整性的密碼編譯系統。 【先前技術】 使用以秘密密鑰為基礎之演算法時,可能需要一過失插 入保護機制。此一機制係一安全的用以保護秘密密鑰以防 與密鑰操控有關之差異過失分析的方法。差異過失分析係 • 一強制產生瞬變硬體過失及所得計算錯誤(例如在一密鑰 排程演算法或上一加密輪回之執行期間)以便擷取密碼編 譯密鑰資訊之密碼編譯攻擊。此過失分析係可應用於公用 密鑰與秘密密鑰密碼編譯系統兩者,包括智慧卡上之抗篡 改裝置。例如,Eli Biham與 Adi Shamir在「Differential Fault Analysis of Secret Key Cryptosystems」(密碼學進展 • CRYPTO ‘97,LNCS 1294,第 513 至 525 頁(8?14叫6卜 Verlag,1997))中說明似〇£8密碼上之差異過失分析攻擊。 ® 目前可用保護機制係離線實施且並不適於所有應用。例 如,現有機制不會為會話密鑰(其係需要時產生而非提前 ^ 產生)提供保護。
Hagai Bar-El 等人在「The Sorcerer’s Apprentice Guide to Fault Attacks」(2004年6月30日在意大利佛羅倫薩之密 碼學過失偵測與容錯研討會上所發佈之離散技術白皮 書)(密碼學e印歸標(eprint.iacr.org)報告2004/100 ;此外, CiteSeer文章705084)中說明各種在電子密碼編譯電路上實 126307.doc 200830832 〜,亚提出許多對策 施此類過失攻擊 处y彻上 一 3取。钱寺對策在不 -複製相同過失之假設下主要涉及引入冗餘,丨中 算並比較結果。所得系統可能會較慢且較不有效,但:係 讓步為安全成本之部分。 "" 尋求更有效的用於保護秘密密鑰完整性之對策。 【發明内容】 =月係’碼編譯方法,其在於一密碼編譯應用程 式中使用-秘㈣鑰之前驗證該秘密密餘之完整性。特〜 言之,制原始未遮罩密鑰所獲得之—加密結果之_加= 檢查碼係在隨後採用—已遮罩密鑰解密該結果時用作一:
效資料驗證簽章。 W 硬體密碼編譯“中保護秘密密衫整性之方 該硬體密碼編料統會遭受過失攻擊)包含= 錄以自已知資料獲得並保存—加密結果且亦獲得並佯= 加密結果之-加總檢查碼,然後遮罩該秘密密^隨後二 在-密碼編譯應用程式中使用該已遮罩㈣時,首 該密鑰之完整性。衫言之,採用該已遮罩密输解穷% 保存加密結m較時發現該解密結果不等於有p 料,則該完整性檢查失效,將與該已遮罩密鑰有關之= 資料從該系統消除並用旗標標記一過失插入。 若該解密結果確實等於有效資料,則該已遮罩密鑰之— 整性已得以認證且可用於該密碼編譯系統中。 凡 【實施方式】 本發明之密錄保護方法可於其中運作的—範例性硬體環 126307.doc 200830832 境可包括一硬體亂數產生器(RNG)、一用於安全密鑰儲存 之隨機存取記憶體(RAM)或非揮發性記憶體(例如,快閃 EPROM)、一微處理器或微控制器及某一用以儲存一程式 之記憶體。此外,該硬體可能包括一用於計算以秘密密鑰 為基礎之演算法(DES、AES等)之硬體共處理器。此一共 處理器(若存在的話)將處理一以X0R為基礎密鑰解遮罩機 制·
Real—Key: = Masked—Key XOR Masking—Value,及同樣地
Masked—Key: = Real—Key XOR Masking_Value 〇 因此,不再強制在密鑰之真形式下操控或儲存密鑰,而 可採用其已遮罩形式。此外,該硬體可能包括一用於執行 完整性檢查之硬體循環冗餘檢查(CRC)模組。16位元模組 就足夠了,不過其他CRC大小也適合。 不過,無共處理器且無硬體CRC模組,本發明之密鑰保 護方法也會相當好地工作。 參考圖1,一種依據本發明之密鑰保護方法可方便地藉 由用種子值植入一亂數產生器(RNG)之開始而開始(如步驟 11所示)。不同種子值自亂數產生器產生不同隨機序列。 已植入種子值之亂數產生器將在隨後步驟中用於密鑰遮 罩。因此,亂數產生器之種子值植入(步驟11)可發生在密 鑰遮罩所需要之隨機位元組之產生(步驟16)之前的任何時 間。 程序之第一主要部分(步驟12至15)獲得一加密結果及對 應加總檢查碼,以便在隨後秘密密鑰之完整性檢查中使 126307.doc 200830832 用。 將一欲受保護秘密密鑰以〜 鑰从純文字載入至(步驟12)—密鑰 暫存器中。該讀可視^碼編譯演算法而具有任何合適長 度。再者,可存在多個密輪,例如在三元刪中,其在用' ^加技與解密之連續輪回集中使用兩個或三個獨立密输。 密碼編譯演算法可包括一宓 、 ^在鑰產生常式,在該密鑰產生常
式中使用剛剛載入至寧輪I + π I 戟主山鑰暫存态中之秘密密鑰(或多個秘
岔袷鑰)產生一用於演算法之不同輪回的輪回子密鑰序 列。所有此等變化為本發明之密鑰保護所涵蓋。 接下來使用密碼編譯演算法及該欲受保護密鑰來加密用 於在饴鑰驗證中使用之已知資料(VERIF一data)(步驟 13)。例如,藉由使用一循環冗餘檢查(crc)常式來計算加 密結果之加總檢查碼(步驟14)。例如,藉由儲存於一安全 圯k體中將該加密結果及其對應加總檢查碼保存為一用於 該加雄結果之驗證簽章。然後完全消除密鑰暫存器(步驟 15) 〇 接下來使用先前已植入種子值之亂數產生器產生(步驟 16) 用於一密錄遮罩操作之隨機位元組。使用(例如)密錄位 元與隨機位元組之一或多者的一逐位元X〇R,採用隨機位 元組來遮罩原始秘密密鑰(或多個原始秘密密鑰)(步驟 17) :
Masked—Key: = Real」Cey XOR Masking-Value 〇 遮罩所需要的隨機位元組之數目將取決於密鑰大小及欲遮 罩密鑰數。使用多個密鑰時,可使用相同或不同隨機位元 126307.doc 200830832 組來遮罩不同密鑰。一旦遮罩,便將已遮罩密鑰(或多個 已遮罩密鑰)儲存於一安全非揮發性記憶體(例如EEPR〇M) 之一規定位置處。 將已遮罩密鑰(或多個已遮罩密鑰)從該規定記憶體位置 載入至(步驟18)—密鑰暫存器(或多個暫存器)中。接著使 用已遮罩密鑰(或多個已遮罩密鑰)來解密先前加密結果(步 驟19),該解密自原始加密以一相反方向使用相同密碼編 譯演算法。(應注意,在加密期間使用多個密鑰之情況 下,例如在三元DES中,通常必須以相反順序使用該等密 錄以便正確解密)。若考量一加密函式Encrypt (Data,Key, Mask)及一對應解密函式 Decrypt (Data, Key,Mask),且若 採用 Encrypt (VALID …DATA,Real一Key,0)作為先前加密 結果(步驟19),則步驟20中之解密應為Decrypt(Encrypt (VALID—DATA,Real—Key,0)),Masked—Key,Masking—Value) =VALID—DATA(若 Real Key=Masked一Key XOR Masking—Value) o 將使用已遮罩密鑰之解密結果與有效資料 (VALID一DATA)作比較(步驟20)。已遮罩密鑰應對應於加 密VALID一DATA時所產生之驗證簽章(加總檢查碼)。若解 密結果不等於VALID一DATA,則已遮罩密鑰未通過完整性 檢查,並用旗標標記一過失插入(步驟21)。不過,若解密 結果等於VALID—D ΑΤΑ ’則已遮罩密錄通過完整性檢查, 且可加以使用。一旦完成完整性檢查,便將用於解密及完 整性檢查之所有硬體暫存器消除(步驟22)。 【圖式簡單說明】 126307.doc -10- 200830832 圖1係依據本發明之一密鑰保護方法之一範例性具體實 施例的流程圖。
126307.doc -11-
Claims (1)
- 200830832 十、申請專利範圍: l 一種在硬體密碼編譯系統令保護秘密密鎗完整性 受過失攻擊之方法,該方法包含: 方化 自已知資料及一欲受保護秘密密鑰獲得一加 對應加總檢查碼; 、、D果及 遮罩該秘密密鑰以獲得一已遮罩密鑰; 將該已遮罩密鑰載入至一密餘暫存器中; 在於該硬體密碼編譯系統中使用一已遮罩密餘之前的 任何訏間’ f先藉由採用該已遮罩密鑰解密該加密結果 以獲侍一解密結果並將該解密結果與有效資料作比較來 檢查該已遮罩密鑰之完整性;及 若該解密結果不等於有效資料,則將與該已遮罩密輪 有關之所有資料消除並用旗標標記一過失插入。 2·如請求項丨之方法,其中獲得一加密結果及對應加總檢 查碼包含: 將該欲受保護秘密密鑰以純文字載入至一密鑰暫存器 中; 將已知資料呈現給一加密演算法並使用該秘密密鑰加 密該已知資料以獲得該加密結果; 在該加密結果上執行一加總檢查碼計算以獲得該對應 加總檢查碼;及 將該加检結果及加總檢查碼保存於一安全記憶體中。 3.如請求項2之方法,其中該加總檢查碼計算係一循環冗 餘檢查(CRC)常式。 126307.doc 200830832 4 · 如請求項1之t^ 去,其中遮罩該秘密密鑰包含使用亂數 產生益硬體產生隨嫉^ — 座生奴機位7〇組亚使用一遮罩常式將該等隨 機位元組應用於該秘密密鑰。 5. 如請求項4之方法,彡中該遮罩常式㈣等隨機位元組 與該秘狯猪輪的一逐位元x〇R運算。 6. 如請二項4之方法,其中採用一已知種子值植入該亂數 產生Θ硬體之後產生該等隨機位元組,不同種子值產生 不同隨機位元組序列。 7. -種在硬體密碼編譯系統中保護秘密密鑰完整性以防遭 受過失攻擊之方法,該方法包含: 將一欲受保護秘密密鑰以純文字載入至一密鑰暫存器 中; —將已知貧料呈現給—加密演算法並使用該秘密密錄加 密該已知資料以獲得一加密結果; 在該加密結果上執行一加總檢查碼計算以獲得一對應 加總檢查碼;及 “ 保存該加密結果及加總檢查碼,並將該秘密密鑰從該 密鑰暫存器清除; 、使用亂數產生器硬體產生隨機位元組並使用一遮罩常 式將該專酼機位元組應用於該秘密密錄以獲得一已遮罩 密鑰; ^ 將該已遮罩密鑰載入至一密鑰暫存器中; 採用該已遮罩密鑰解密該已保存加密結果以獲得一解 密結果; 126307.doc 200830832 將該解密結果與有效資料作比較;及 若該解密結果不等於有效資料,則將與該已遮罩密鑰 有關之所有資料消除並用旗標標記一過失插入,不過若 該解岔結果等於有效資料,則認證該已遮罩密鑰之完整 性以便在該密碼編譯系統中使用。 8 · 如請求頊7 3^ 士、〇» u 、 万法,其中該加總檢查碼計算係一循環冗 餘檢查(CRC)常式。 9 ·如請求項7 > 士 與該秘密/二^該料常式係該等隨機位元組 山輸的一逐位元XOR運算。 10·如請求項7 、 、 万法,其中採用一已知種早估括X斗/ 產生器硬騁♦ ^ 禋子值植入該亂數 後產生該等隨機位元組,不η德工处+ 不同隨機你-, 不冋種子值產生 位兀組序列。 土126307.doc
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US11/615,225 US7822207B2 (en) | 2006-12-22 | 2006-12-22 | Key protection mechanism |
Publications (2)
Publication Number | Publication Date |
---|---|
TW200830832A true TW200830832A (en) | 2008-07-16 |
TWI434565B TWI434565B (zh) | 2014-04-11 |
Family
ID=39542851
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
TW096143280A TWI434565B (zh) | 2006-12-22 | 2007-11-15 | 密鑰保護機制 |
Country Status (5)
Country | Link |
---|---|
US (1) | US7822207B2 (zh) |
CN (1) | CN101569131B (zh) |
DE (1) | DE112007003061T5 (zh) |
TW (1) | TWI434565B (zh) |
WO (1) | WO2008079524A2 (zh) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
TWI781544B (zh) * | 2020-03-31 | 2022-10-21 | 台灣積體電路製造股份有限公司 | 積體電路裝置以及產生用於積體電路裝置的安全密鑰的方法及系統 |
US11528135B2 (en) | 2020-03-31 | 2022-12-13 | Taiwan Semiconductor Manufacturing Company, Ltd. | Integrated circuit (IC) signatures with random number generator and one-time programmable device |
US11962693B2 (en) | 2020-03-31 | 2024-04-16 | Taiwan Semiconductor Manufacturing Company, Ltd. | Integrated circuit (IC) signatures with random number generator and one-time programmable device |
Families Citing this family (24)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
FR2904901B1 (fr) * | 2006-08-09 | 2008-10-03 | Sagem Defense Securite | Procede de verification de l'integrite d'une clef de chiffrement obtenue par combinaison de parties de clef |
US7822207B2 (en) | 2006-12-22 | 2010-10-26 | Atmel Rousset S.A.S. | Key protection mechanism |
FR2931326A1 (fr) * | 2008-05-16 | 2009-11-20 | St Microelectronics Rousset | Verification d'integrite d'une cle de chiffrement |
FR2952256B1 (fr) * | 2009-11-04 | 2011-12-16 | St Microelectronics Rousset | Protection d'une cle de chiffrement contre des attaques unidirectionnelles |
CN101977180B (zh) * | 2010-06-08 | 2013-06-19 | 南京大学 | 一种基于漏洞攻击的安全协议验证方法 |
US8644500B2 (en) * | 2010-08-20 | 2014-02-04 | Apple Inc. | Apparatus and method for block cipher process for insecure environments |
CN102542319B (zh) * | 2010-12-10 | 2016-06-29 | 上海华虹集成电路有限责任公司 | Psam卡中密钥保护方法 |
DE102010055237A1 (de) | 2010-12-20 | 2012-06-21 | Giesecke & Devrient Gmbh | Verfahren zum geschützten Ausführen einer kryptographischen Berechnung |
US11228566B1 (en) | 2011-03-08 | 2022-01-18 | Ciphercloud, Inc. | System and method to anonymize data transmitted to a destination computing device |
US9432342B1 (en) * | 2011-03-08 | 2016-08-30 | Ciphercloud, Inc. | System and method to anonymize data transmitted to a destination computing device |
US8699703B2 (en) * | 2011-10-19 | 2014-04-15 | Apple Inc. | System and method for pseudo-random polymorphic tree construction |
CN102404108B (zh) * | 2011-10-25 | 2014-07-09 | 宁波大学 | 一种针对aes-128算法的新型故障攻击方法 |
EP2602952A1 (en) * | 2011-12-07 | 2013-06-12 | Gemalto SA | Cryptographic method for protecting a key hardware register against fault attacks |
EP2629447A1 (en) * | 2012-02-17 | 2013-08-21 | Gemalto SA | Method and device for protecting an electronic device against fault attack(s) |
DE102012011730A1 (de) * | 2012-06-13 | 2013-12-19 | Giesecke & Devrient Gmbh | Gegen Safe Error Angriffe geschützte kryptographische Berechnung |
EP2947640B1 (en) * | 2013-01-18 | 2017-08-02 | Mitsubishi Electric Corporation | Data decryption device, attribute-based encryption system, random number element removing device, data decryption method, and data decryption programm. |
US9703937B2 (en) * | 2013-04-10 | 2017-07-11 | Dell Products, L.P. | Method to prevent operating system digital product key activation failures |
EP2858005A1 (en) * | 2013-10-03 | 2015-04-08 | Gemalto SA | Integrity check of a non-readable instruction register |
US10205710B2 (en) * | 2015-01-08 | 2019-02-12 | Intertrust Technologies Corporation | Cryptographic systems and methods |
US9929858B2 (en) * | 2015-09-21 | 2018-03-27 | Nxp B.V. | Method and system for detecting fault attacks |
US11362824B2 (en) * | 2018-05-25 | 2022-06-14 | Intertrust Technologies Corporation | Content management systems and methods using proxy reencryption |
CN112115076B (zh) * | 2019-06-20 | 2024-07-19 | 慧荣科技股份有限公司 | 使用者数据的加解密装置及方法 |
US11507699B2 (en) * | 2019-09-27 | 2022-11-22 | Intel Corporation | Processor with private pipeline |
US11379580B1 (en) * | 2020-03-16 | 2022-07-05 | Xilinx, Inc. | Mixed storage of data fields |
Family Cites Families (31)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4965825A (en) * | 1981-11-03 | 1990-10-23 | The Personalized Mass Media Corporation | Signal processing apparatus and methods |
US5631960A (en) * | 1995-08-31 | 1997-05-20 | National Semiconductor Corporation | Autotest of encryption algorithms in embedded secure encryption devices |
US5761306A (en) * | 1996-02-22 | 1998-06-02 | Visa International Service Association | Key replacement in a public key cryptosystem |
US5937066A (en) * | 1996-10-02 | 1999-08-10 | International Business Machines Corporation | Two-phase cryptographic key recovery system |
US6092229A (en) * | 1996-10-09 | 2000-07-18 | Lsi Logic Corporation | Single chip systems using general purpose processors |
US6282290B1 (en) * | 1997-03-28 | 2001-08-28 | Mykotronx, Inc. | High speed modular exponentiator |
BR9809272A (pt) * | 1997-05-09 | 2000-06-27 | Connotech Experts Conseils Inc | Estabelecimento de chave secreta inicial incluindo instalações para verificação de identidade |
US5991415A (en) * | 1997-05-12 | 1999-11-23 | Yeda Research And Development Co. Ltd. At The Weizmann Institute Of Science | Method and apparatus for protecting public key schemes from timing and fault attacks |
US6965673B1 (en) * | 1997-09-19 | 2005-11-15 | Telcordia Technologies, Inc. | Method of using transient faults to verify the security of a cryptosystem |
US6055316A (en) * | 1997-12-26 | 2000-04-25 | Sun Microsystems, Inc. | System and method for deriving an appropriate initialization vector for secure communications |
US6304658B1 (en) * | 1998-01-02 | 2001-10-16 | Cryptography Research, Inc. | Leak-resistant cryptographic method and apparatus |
ATE548819T1 (de) * | 1998-06-03 | 2012-03-15 | Cryptography Res Inc | Symmetrisches kryptographisches rechenverfahren und vorrichtung zur verlustminimierung bei chipkarten und anderen verschlüsselungssystemen |
US6289455B1 (en) * | 1999-09-02 | 2001-09-11 | Crypotography Research, Inc. | Method and apparatus for preventing piracy of digital content |
WO2001056221A2 (en) * | 2000-01-31 | 2001-08-02 | Vdg Inc. | Block encryption method and schemes for data confidentiality and integrity protection |
US7051199B1 (en) * | 2000-06-19 | 2006-05-23 | Xerox Corporation | System, method and article of manufacture for providing cryptographic services utilizing a network |
US6990468B1 (en) * | 2000-06-19 | 2006-01-24 | Xerox Corporation | System, method and article of manufacture for cryptoserver-based auction |
US20030223579A1 (en) * | 2000-07-13 | 2003-12-04 | Eran Kanter | Secure and linear public-key cryptosystem based on parity-check error-correcting |
US6941284B2 (en) * | 2000-11-30 | 2005-09-06 | Pitney Bowes Inc. | Method for dynamically using cryptographic keys in a postage meter |
FR2820577B1 (fr) * | 2001-02-08 | 2003-06-13 | St Microelectronics Sa | Procede securise de calcul cryptographique a cle secrete et composant mettant en oeuvre un tel procede |
JP4188571B2 (ja) * | 2001-03-30 | 2008-11-26 | 株式会社日立製作所 | 情報処理装置の演算方法および耐タンパ演算攪乱実装方式 |
US7000115B2 (en) * | 2001-06-19 | 2006-02-14 | International Business Machines Corporation | Method and apparatus for uniquely and authoritatively identifying tangible objects |
US20030023850A1 (en) * | 2001-07-26 | 2003-01-30 | International Business Machines Corporation | Verifying messaging sessions by digital signatures of participants |
WO2003030447A2 (en) * | 2001-09-27 | 2003-04-10 | Matsushita Electric Industrial Co., Ltd. | An encryption device, a decrypting device, a secret key generation device,a copyright protection system and a cipher communication device |
DE50204119D1 (de) * | 2001-10-17 | 2005-10-06 | Infineon Technologies Ag | Verfahren und vorrichtung zum absichern einer berechnung in einem kryptographischen algorithmus |
US7596531B2 (en) * | 2002-06-05 | 2009-09-29 | Sun Microsystems, Inc. | Method and apparatus for protecting against side channel attacks against personal identification numbers |
EP1540880B1 (de) * | 2002-09-11 | 2006-03-08 | Giesecke & Devrient GmbH | Geschützte kryptographische berechnung |
US7715551B2 (en) * | 2004-04-29 | 2010-05-11 | Stmicroelectronics Asia Pacific Pte. Ltd. | Apparatus and method for consistency checking public key cryptography computations |
US8065532B2 (en) * | 2004-06-08 | 2011-11-22 | Hrl Laboratories, Llc | Cryptographic architecture with random instruction masking to thwart differential power analysis |
US20050289311A1 (en) * | 2004-06-29 | 2005-12-29 | David Durham | System and method for secure inter-platform and intra-platform communications |
US7680273B2 (en) * | 2004-12-08 | 2010-03-16 | Schweitzer Engineering Laboratories, Inc. | System and method for optimizing error detection to detect unauthorized modification of transmitted data |
US7822207B2 (en) | 2006-12-22 | 2010-10-26 | Atmel Rousset S.A.S. | Key protection mechanism |
-
2006
- 2006-12-22 US US11/615,225 patent/US7822207B2/en not_active Expired - Fee Related
-
2007
- 2007-11-02 DE DE112007003061T patent/DE112007003061T5/de active Pending
- 2007-11-02 WO PCT/US2007/083426 patent/WO2008079524A2/en active Application Filing
- 2007-11-02 CN CN2007800476637A patent/CN101569131B/zh active Active
- 2007-11-15 TW TW096143280A patent/TWI434565B/zh not_active IP Right Cessation
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
TWI781544B (zh) * | 2020-03-31 | 2022-10-21 | 台灣積體電路製造股份有限公司 | 積體電路裝置以及產生用於積體電路裝置的安全密鑰的方法及系統 |
US11528135B2 (en) | 2020-03-31 | 2022-12-13 | Taiwan Semiconductor Manufacturing Company, Ltd. | Integrated circuit (IC) signatures with random number generator and one-time programmable device |
US11962693B2 (en) | 2020-03-31 | 2024-04-16 | Taiwan Semiconductor Manufacturing Company, Ltd. | Integrated circuit (IC) signatures with random number generator and one-time programmable device |
Also Published As
Publication number | Publication date |
---|---|
TWI434565B (zh) | 2014-04-11 |
US7822207B2 (en) | 2010-10-26 |
WO2008079524A3 (en) | 2008-08-14 |
WO2008079524A2 (en) | 2008-07-03 |
US20080152144A1 (en) | 2008-06-26 |
CN101569131B (zh) | 2012-12-12 |
CN101569131A (zh) | 2009-10-28 |
DE112007003061T5 (de) | 2009-10-29 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
TW200830832A (en) | Key protection mechanism | |
Bruinderink et al. | Differential fault attacks on deterministic lattice signatures | |
EP2965254B1 (en) | Systems and methods for maintaining integrity and secrecy in untrusted computing platforms | |
US11184164B2 (en) | Secure crypto system attributes | |
US9537657B1 (en) | Multipart authenticated encryption | |
JP6366595B2 (ja) | 耐グリッチ性暗号離散対数ベースの署名のための方法及びシステム | |
US11418321B2 (en) | Block cryptographic method for encrypting/decrypting messages and cryptographic devices for implementing this method | |
US20100303229A1 (en) | Modified counter mode encryption | |
WO2018104412A1 (en) | Method of rsa signature or decryption protected using a homomorphic encryption | |
EP2831800B1 (en) | Method for protecting data | |
JP2000206876A (ja) | 2つの情報処理装置の間で保護された形で情報を処理するための方法およびシステム | |
Dobraunig et al. | Fault attacks on nonce-based authenticated encryption: Application to keyak and ketje | |
TWI517653B (zh) | 電子裝置及密碼材料供應之方法 | |
JP2010517448A (ja) | セキュアファイル暗号化 | |
JP2010517449A (ja) | 信頼できない受信者における秘密の保護 | |
US20170249460A1 (en) | Provably secure virus detection | |
US12052348B2 (en) | Computation device using shared shares | |
US20230254160A1 (en) | A calculation method and device for elliptic curve digital signature to resist memory disclosure attacks | |
Seuschek et al. | A cautionary note: Side-channel leakage implications of deterministic signature schemes | |
WO2006046484A1 (ja) | 認証方法 | |
CN112332973B (zh) | 一种细粒度的物联网设备控制流保护方法 | |
WO2006062166A1 (ja) | 電子データ検証装置 | |
WO2023212838A1 (en) | Fast signature generation and verification | |
Rahman | Towards integrity protection of software for e-health data | |
Fischlin et al. | Verifiable Verification in Cryptographic Protocols |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
MM4A | Annulment or lapse of patent due to non-payment of fees |