TW200830832A - Key protection mechanism - Google Patents

Key protection mechanism Download PDF

Info

Publication number
TW200830832A
TW200830832A TW096143280A TW96143280A TW200830832A TW 200830832 A TW200830832 A TW 200830832A TW 096143280 A TW096143280 A TW 096143280A TW 96143280 A TW96143280 A TW 96143280A TW 200830832 A TW200830832 A TW 200830832A
Authority
TW
Taiwan
Prior art keywords
key
secret
masked
result
check code
Prior art date
Application number
TW096143280A
Other languages
English (en)
Other versions
TWI434565B (zh
Inventor
Michel Douguet
Vincent Dupaquis
Original Assignee
Atmel Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Atmel Corp filed Critical Atmel Corp
Publication of TW200830832A publication Critical patent/TW200830832A/zh
Application granted granted Critical
Publication of TWI434565B publication Critical patent/TWI434565B/zh

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/065Encryption by serially and continuously modifying data stream elements, e.g. stream cipher systems, RC4, SEAL or A5/3
    • H04L9/0656Pseudorandom key sequence combined element-for-element with data sequence, e.g. one-time-pad [OTP] or Vernam's cipher
    • H04L9/0662Pseudorandom key sequence combined element-for-element with data sequence, e.g. one-time-pad [OTP] or Vernam's cipher with particular pseudorandom sequence generator
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/002Countermeasures against attacks on cryptographic mechanisms
    • H04L9/004Countermeasures against attacks on cryptographic mechanisms for fault attacks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/04Masking or blinding
    • H04L2209/046Masking or blinding of operations, operands or results of the operations
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/12Details relating to cryptographic hardware or logic circuitry
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/34Encoding or coding, e.g. Huffman coding or error correction

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Storage Device Security (AREA)

Description

200830832 九、發明說明: 【發明所屬之技術領域】 本發明係關於可抵抗差異過失分析或過失插入攻擊以保 護秘密密鑰之完整性的密碼編譯系統。 【先前技術】 使用以秘密密鑰為基礎之演算法時,可能需要一過失插 入保護機制。此一機制係一安全的用以保護秘密密鑰以防 與密鑰操控有關之差異過失分析的方法。差異過失分析係 • 一強制產生瞬變硬體過失及所得計算錯誤(例如在一密鑰 排程演算法或上一加密輪回之執行期間)以便擷取密碼編 譯密鑰資訊之密碼編譯攻擊。此過失分析係可應用於公用 密鑰與秘密密鑰密碼編譯系統兩者,包括智慧卡上之抗篡 改裝置。例如,Eli Biham與 Adi Shamir在「Differential Fault Analysis of Secret Key Cryptosystems」(密碼學進展 • CRYPTO ‘97,LNCS 1294,第 513 至 525 頁(8?14叫6卜 Verlag,1997))中說明似〇£8密碼上之差異過失分析攻擊。 ® 目前可用保護機制係離線實施且並不適於所有應用。例 如,現有機制不會為會話密鑰(其係需要時產生而非提前 ^ 產生)提供保護。
Hagai Bar-El 等人在「The Sorcerer’s Apprentice Guide to Fault Attacks」(2004年6月30日在意大利佛羅倫薩之密 碼學過失偵測與容錯研討會上所發佈之離散技術白皮 書)(密碼學e印歸標(eprint.iacr.org)報告2004/100 ;此外, CiteSeer文章705084)中說明各種在電子密碼編譯電路上實 126307.doc 200830832 〜,亚提出許多對策 施此類過失攻擊 处y彻上 一 3取。钱寺對策在不 -複製相同過失之假設下主要涉及引入冗餘,丨中 算並比較結果。所得系統可能會較慢且較不有效,但:係 讓步為安全成本之部分。 "" 尋求更有效的用於保護秘密密鑰完整性之對策。 【發明内容】 =月係’碼編譯方法,其在於一密碼編譯應用程 式中使用-秘㈣鑰之前驗證該秘密密餘之完整性。特〜 言之,制原始未遮罩密鑰所獲得之—加密結果之_加= 檢查碼係在隨後採用—已遮罩密鑰解密該結果時用作一:
效資料驗證簽章。 W 硬體密碼編譯“中保護秘密密衫整性之方 該硬體密碼編料統會遭受過失攻擊)包含= 錄以自已知資料獲得並保存—加密結果且亦獲得並佯= 加密結果之-加總檢查碼,然後遮罩該秘密密^隨後二 在-密碼編譯應用程式中使用該已遮罩㈣時,首 該密鑰之完整性。衫言之,採用該已遮罩密输解穷% 保存加密結m較時發現該解密結果不等於有p 料,則該完整性檢查失效,將與該已遮罩密鑰有關之= 資料從該系統消除並用旗標標記一過失插入。 若該解密結果確實等於有效資料,則該已遮罩密鑰之— 整性已得以認證且可用於該密碼編譯系統中。 凡 【實施方式】 本發明之密錄保護方法可於其中運作的—範例性硬體環 126307.doc 200830832 境可包括一硬體亂數產生器(RNG)、一用於安全密鑰儲存 之隨機存取記憶體(RAM)或非揮發性記憶體(例如,快閃 EPROM)、一微處理器或微控制器及某一用以儲存一程式 之記憶體。此外,該硬體可能包括一用於計算以秘密密鑰 為基礎之演算法(DES、AES等)之硬體共處理器。此一共 處理器(若存在的話)將處理一以X0R為基礎密鑰解遮罩機 制·
Real—Key: = Masked—Key XOR Masking—Value,及同樣地
Masked—Key: = Real—Key XOR Masking_Value 〇 因此,不再強制在密鑰之真形式下操控或儲存密鑰,而 可採用其已遮罩形式。此外,該硬體可能包括一用於執行 完整性檢查之硬體循環冗餘檢查(CRC)模組。16位元模組 就足夠了,不過其他CRC大小也適合。 不過,無共處理器且無硬體CRC模組,本發明之密鑰保 護方法也會相當好地工作。 參考圖1,一種依據本發明之密鑰保護方法可方便地藉 由用種子值植入一亂數產生器(RNG)之開始而開始(如步驟 11所示)。不同種子值自亂數產生器產生不同隨機序列。 已植入種子值之亂數產生器將在隨後步驟中用於密鑰遮 罩。因此,亂數產生器之種子值植入(步驟11)可發生在密 鑰遮罩所需要之隨機位元組之產生(步驟16)之前的任何時 間。 程序之第一主要部分(步驟12至15)獲得一加密結果及對 應加總檢查碼,以便在隨後秘密密鑰之完整性檢查中使 126307.doc 200830832 用。 將一欲受保護秘密密鑰以〜 鑰从純文字載入至(步驟12)—密鑰 暫存器中。該讀可視^碼編譯演算法而具有任何合適長 度。再者,可存在多個密輪,例如在三元刪中,其在用' ^加技與解密之連續輪回集中使用兩個或三個獨立密输。 密碼編譯演算法可包括一宓 、 ^在鑰產生常式,在該密鑰產生常
式中使用剛剛載入至寧輪I + π I 戟主山鑰暫存态中之秘密密鑰(或多個秘
岔袷鑰)產生一用於演算法之不同輪回的輪回子密鑰序 列。所有此等變化為本發明之密鑰保護所涵蓋。 接下來使用密碼編譯演算法及該欲受保護密鑰來加密用 於在饴鑰驗證中使用之已知資料(VERIF一data)(步驟 13)。例如,藉由使用一循環冗餘檢查(crc)常式來計算加 密結果之加總檢查碼(步驟14)。例如,藉由儲存於一安全 圯k體中將該加密結果及其對應加總檢查碼保存為一用於 該加雄結果之驗證簽章。然後完全消除密鑰暫存器(步驟 15) 〇 接下來使用先前已植入種子值之亂數產生器產生(步驟 16) 用於一密錄遮罩操作之隨機位元組。使用(例如)密錄位 元與隨機位元組之一或多者的一逐位元X〇R,採用隨機位 元組來遮罩原始秘密密鑰(或多個原始秘密密鑰)(步驟 17) :
Masked—Key: = Real」Cey XOR Masking-Value 〇 遮罩所需要的隨機位元組之數目將取決於密鑰大小及欲遮 罩密鑰數。使用多個密鑰時,可使用相同或不同隨機位元 126307.doc 200830832 組來遮罩不同密鑰。一旦遮罩,便將已遮罩密鑰(或多個 已遮罩密鑰)儲存於一安全非揮發性記憶體(例如EEPR〇M) 之一規定位置處。 將已遮罩密鑰(或多個已遮罩密鑰)從該規定記憶體位置 載入至(步驟18)—密鑰暫存器(或多個暫存器)中。接著使 用已遮罩密鑰(或多個已遮罩密鑰)來解密先前加密結果(步 驟19),該解密自原始加密以一相反方向使用相同密碼編 譯演算法。(應注意,在加密期間使用多個密鑰之情況 下,例如在三元DES中,通常必須以相反順序使用該等密 錄以便正確解密)。若考量一加密函式Encrypt (Data,Key, Mask)及一對應解密函式 Decrypt (Data, Key,Mask),且若 採用 Encrypt (VALID …DATA,Real一Key,0)作為先前加密 結果(步驟19),則步驟20中之解密應為Decrypt(Encrypt (VALID—DATA,Real—Key,0)),Masked—Key,Masking—Value) =VALID—DATA(若 Real Key=Masked一Key XOR Masking—Value) o 將使用已遮罩密鑰之解密結果與有效資料 (VALID一DATA)作比較(步驟20)。已遮罩密鑰應對應於加 密VALID一DATA時所產生之驗證簽章(加總檢查碼)。若解 密結果不等於VALID一DATA,則已遮罩密鑰未通過完整性 檢查,並用旗標標記一過失插入(步驟21)。不過,若解密 結果等於VALID—D ΑΤΑ ’則已遮罩密錄通過完整性檢查, 且可加以使用。一旦完成完整性檢查,便將用於解密及完 整性檢查之所有硬體暫存器消除(步驟22)。 【圖式簡單說明】 126307.doc -10- 200830832 圖1係依據本發明之一密鑰保護方法之一範例性具體實 施例的流程圖。
126307.doc -11-

Claims (1)

  1. 200830832 十、申請專利範圍: l 一種在硬體密碼編譯系統令保護秘密密鎗完整性 受過失攻擊之方法,該方法包含: 方化 自已知資料及一欲受保護秘密密鑰獲得一加 對應加總檢查碼; 、、D果及 遮罩該秘密密鑰以獲得一已遮罩密鑰; 將該已遮罩密鑰載入至一密餘暫存器中; 在於該硬體密碼編譯系統中使用一已遮罩密餘之前的 任何訏間’ f先藉由採用該已遮罩密鑰解密該加密結果 以獲侍一解密結果並將該解密結果與有效資料作比較來 檢查該已遮罩密鑰之完整性;及 若該解密結果不等於有效資料,則將與該已遮罩密輪 有關之所有資料消除並用旗標標記一過失插入。 2·如請求項丨之方法,其中獲得一加密結果及對應加總檢 查碼包含: 將該欲受保護秘密密鑰以純文字載入至一密鑰暫存器 中; 將已知資料呈現給一加密演算法並使用該秘密密鑰加 密該已知資料以獲得該加密結果; 在該加密結果上執行一加總檢查碼計算以獲得該對應 加總檢查碼;及 將該加检結果及加總檢查碼保存於一安全記憶體中。 3.如請求項2之方法,其中該加總檢查碼計算係一循環冗 餘檢查(CRC)常式。 126307.doc 200830832 4 · 如請求項1之t^ 去,其中遮罩該秘密密鑰包含使用亂數 產生益硬體產生隨嫉^ — 座生奴機位7〇組亚使用一遮罩常式將該等隨 機位元組應用於該秘密密鑰。 5. 如請求項4之方法,彡中該遮罩常式㈣等隨機位元組 與該秘狯猪輪的一逐位元x〇R運算。 6. 如請二項4之方法,其中採用一已知種子值植入該亂數 產生Θ硬體之後產生該等隨機位元組,不同種子值產生 不同隨機位元組序列。 7. -種在硬體密碼編譯系統中保護秘密密鑰完整性以防遭 受過失攻擊之方法,該方法包含: 將一欲受保護秘密密鑰以純文字載入至一密鑰暫存器 中; —將已知貧料呈現給—加密演算法並使用該秘密密錄加 密該已知資料以獲得一加密結果; 在該加密結果上執行一加總檢查碼計算以獲得一對應 加總檢查碼;及 “ 保存該加密結果及加總檢查碼,並將該秘密密鑰從該 密鑰暫存器清除; 、使用亂數產生器硬體產生隨機位元組並使用一遮罩常 式將該專酼機位元組應用於該秘密密錄以獲得一已遮罩 密鑰; ^ 將該已遮罩密鑰載入至一密鑰暫存器中; 採用該已遮罩密鑰解密該已保存加密結果以獲得一解 密結果; 126307.doc 200830832 將該解密結果與有效資料作比較;及 若該解密結果不等於有效資料,則將與該已遮罩密鑰 有關之所有資料消除並用旗標標記一過失插入,不過若 該解岔結果等於有效資料,則認證該已遮罩密鑰之完整 性以便在該密碼編譯系統中使用。 8 · 如請求頊7 3^ 士、〇» u 、 万法,其中該加總檢查碼計算係一循環冗 餘檢查(CRC)常式。 9 ·如請求項7 > 士 與該秘密/二^該料常式係該等隨機位元組 山輸的一逐位元XOR運算。 10·如請求項7 、 、 万法,其中採用一已知種早估括X斗/ 產生器硬騁♦ ^ 禋子值植入該亂數 後產生該等隨機位元組,不η德工处+ 不同隨機你-, 不冋種子值產生 位兀組序列。 土
    126307.doc
TW096143280A 2006-12-22 2007-11-15 密鑰保護機制 TWI434565B (zh)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
US11/615,225 US7822207B2 (en) 2006-12-22 2006-12-22 Key protection mechanism

Publications (2)

Publication Number Publication Date
TW200830832A true TW200830832A (en) 2008-07-16
TWI434565B TWI434565B (zh) 2014-04-11

Family

ID=39542851

Family Applications (1)

Application Number Title Priority Date Filing Date
TW096143280A TWI434565B (zh) 2006-12-22 2007-11-15 密鑰保護機制

Country Status (5)

Country Link
US (1) US7822207B2 (zh)
CN (1) CN101569131B (zh)
DE (1) DE112007003061T5 (zh)
TW (1) TWI434565B (zh)
WO (1) WO2008079524A2 (zh)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI781544B (zh) * 2020-03-31 2022-10-21 台灣積體電路製造股份有限公司 積體電路裝置以及產生用於積體電路裝置的安全密鑰的方法及系統
US11528135B2 (en) 2020-03-31 2022-12-13 Taiwan Semiconductor Manufacturing Company, Ltd. Integrated circuit (IC) signatures with random number generator and one-time programmable device
US11962693B2 (en) 2020-03-31 2024-04-16 Taiwan Semiconductor Manufacturing Company, Ltd. Integrated circuit (IC) signatures with random number generator and one-time programmable device

Families Citing this family (24)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
FR2904901B1 (fr) * 2006-08-09 2008-10-03 Sagem Defense Securite Procede de verification de l'integrite d'une clef de chiffrement obtenue par combinaison de parties de clef
US7822207B2 (en) 2006-12-22 2010-10-26 Atmel Rousset S.A.S. Key protection mechanism
FR2931326A1 (fr) * 2008-05-16 2009-11-20 St Microelectronics Rousset Verification d'integrite d'une cle de chiffrement
FR2952256B1 (fr) * 2009-11-04 2011-12-16 St Microelectronics Rousset Protection d'une cle de chiffrement contre des attaques unidirectionnelles
CN101977180B (zh) * 2010-06-08 2013-06-19 南京大学 一种基于漏洞攻击的安全协议验证方法
US8644500B2 (en) * 2010-08-20 2014-02-04 Apple Inc. Apparatus and method for block cipher process for insecure environments
CN102542319B (zh) * 2010-12-10 2016-06-29 上海华虹集成电路有限责任公司 Psam卡中密钥保护方法
DE102010055237A1 (de) 2010-12-20 2012-06-21 Giesecke & Devrient Gmbh Verfahren zum geschützten Ausführen einer kryptographischen Berechnung
US11228566B1 (en) 2011-03-08 2022-01-18 Ciphercloud, Inc. System and method to anonymize data transmitted to a destination computing device
US9432342B1 (en) * 2011-03-08 2016-08-30 Ciphercloud, Inc. System and method to anonymize data transmitted to a destination computing device
US8699703B2 (en) * 2011-10-19 2014-04-15 Apple Inc. System and method for pseudo-random polymorphic tree construction
CN102404108B (zh) * 2011-10-25 2014-07-09 宁波大学 一种针对aes-128算法的新型故障攻击方法
EP2602952A1 (en) * 2011-12-07 2013-06-12 Gemalto SA Cryptographic method for protecting a key hardware register against fault attacks
EP2629447A1 (en) * 2012-02-17 2013-08-21 Gemalto SA Method and device for protecting an electronic device against fault attack(s)
DE102012011730A1 (de) * 2012-06-13 2013-12-19 Giesecke & Devrient Gmbh Gegen Safe Error Angriffe geschützte kryptographische Berechnung
EP2947640B1 (en) * 2013-01-18 2017-08-02 Mitsubishi Electric Corporation Data decryption device, attribute-based encryption system, random number element removing device, data decryption method, and data decryption programm.
US9703937B2 (en) * 2013-04-10 2017-07-11 Dell Products, L.P. Method to prevent operating system digital product key activation failures
EP2858005A1 (en) * 2013-10-03 2015-04-08 Gemalto SA Integrity check of a non-readable instruction register
US10205710B2 (en) * 2015-01-08 2019-02-12 Intertrust Technologies Corporation Cryptographic systems and methods
US9929858B2 (en) * 2015-09-21 2018-03-27 Nxp B.V. Method and system for detecting fault attacks
US11362824B2 (en) * 2018-05-25 2022-06-14 Intertrust Technologies Corporation Content management systems and methods using proxy reencryption
CN112115076B (zh) * 2019-06-20 2024-07-19 慧荣科技股份有限公司 使用者数据的加解密装置及方法
US11507699B2 (en) * 2019-09-27 2022-11-22 Intel Corporation Processor with private pipeline
US11379580B1 (en) * 2020-03-16 2022-07-05 Xilinx, Inc. Mixed storage of data fields

Family Cites Families (31)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4965825A (en) * 1981-11-03 1990-10-23 The Personalized Mass Media Corporation Signal processing apparatus and methods
US5631960A (en) * 1995-08-31 1997-05-20 National Semiconductor Corporation Autotest of encryption algorithms in embedded secure encryption devices
US5761306A (en) * 1996-02-22 1998-06-02 Visa International Service Association Key replacement in a public key cryptosystem
US5937066A (en) * 1996-10-02 1999-08-10 International Business Machines Corporation Two-phase cryptographic key recovery system
US6092229A (en) * 1996-10-09 2000-07-18 Lsi Logic Corporation Single chip systems using general purpose processors
US6282290B1 (en) * 1997-03-28 2001-08-28 Mykotronx, Inc. High speed modular exponentiator
BR9809272A (pt) * 1997-05-09 2000-06-27 Connotech Experts Conseils Inc Estabelecimento de chave secreta inicial incluindo instalações para verificação de identidade
US5991415A (en) * 1997-05-12 1999-11-23 Yeda Research And Development Co. Ltd. At The Weizmann Institute Of Science Method and apparatus for protecting public key schemes from timing and fault attacks
US6965673B1 (en) * 1997-09-19 2005-11-15 Telcordia Technologies, Inc. Method of using transient faults to verify the security of a cryptosystem
US6055316A (en) * 1997-12-26 2000-04-25 Sun Microsystems, Inc. System and method for deriving an appropriate initialization vector for secure communications
US6304658B1 (en) * 1998-01-02 2001-10-16 Cryptography Research, Inc. Leak-resistant cryptographic method and apparatus
ATE548819T1 (de) * 1998-06-03 2012-03-15 Cryptography Res Inc Symmetrisches kryptographisches rechenverfahren und vorrichtung zur verlustminimierung bei chipkarten und anderen verschlüsselungssystemen
US6289455B1 (en) * 1999-09-02 2001-09-11 Crypotography Research, Inc. Method and apparatus for preventing piracy of digital content
WO2001056221A2 (en) * 2000-01-31 2001-08-02 Vdg Inc. Block encryption method and schemes for data confidentiality and integrity protection
US7051199B1 (en) * 2000-06-19 2006-05-23 Xerox Corporation System, method and article of manufacture for providing cryptographic services utilizing a network
US6990468B1 (en) * 2000-06-19 2006-01-24 Xerox Corporation System, method and article of manufacture for cryptoserver-based auction
US20030223579A1 (en) * 2000-07-13 2003-12-04 Eran Kanter Secure and linear public-key cryptosystem based on parity-check error-correcting
US6941284B2 (en) * 2000-11-30 2005-09-06 Pitney Bowes Inc. Method for dynamically using cryptographic keys in a postage meter
FR2820577B1 (fr) * 2001-02-08 2003-06-13 St Microelectronics Sa Procede securise de calcul cryptographique a cle secrete et composant mettant en oeuvre un tel procede
JP4188571B2 (ja) * 2001-03-30 2008-11-26 株式会社日立製作所 情報処理装置の演算方法および耐タンパ演算攪乱実装方式
US7000115B2 (en) * 2001-06-19 2006-02-14 International Business Machines Corporation Method and apparatus for uniquely and authoritatively identifying tangible objects
US20030023850A1 (en) * 2001-07-26 2003-01-30 International Business Machines Corporation Verifying messaging sessions by digital signatures of participants
WO2003030447A2 (en) * 2001-09-27 2003-04-10 Matsushita Electric Industrial Co., Ltd. An encryption device, a decrypting device, a secret key generation device,a copyright protection system and a cipher communication device
DE50204119D1 (de) * 2001-10-17 2005-10-06 Infineon Technologies Ag Verfahren und vorrichtung zum absichern einer berechnung in einem kryptographischen algorithmus
US7596531B2 (en) * 2002-06-05 2009-09-29 Sun Microsystems, Inc. Method and apparatus for protecting against side channel attacks against personal identification numbers
EP1540880B1 (de) * 2002-09-11 2006-03-08 Giesecke & Devrient GmbH Geschützte kryptographische berechnung
US7715551B2 (en) * 2004-04-29 2010-05-11 Stmicroelectronics Asia Pacific Pte. Ltd. Apparatus and method for consistency checking public key cryptography computations
US8065532B2 (en) * 2004-06-08 2011-11-22 Hrl Laboratories, Llc Cryptographic architecture with random instruction masking to thwart differential power analysis
US20050289311A1 (en) * 2004-06-29 2005-12-29 David Durham System and method for secure inter-platform and intra-platform communications
US7680273B2 (en) * 2004-12-08 2010-03-16 Schweitzer Engineering Laboratories, Inc. System and method for optimizing error detection to detect unauthorized modification of transmitted data
US7822207B2 (en) 2006-12-22 2010-10-26 Atmel Rousset S.A.S. Key protection mechanism

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI781544B (zh) * 2020-03-31 2022-10-21 台灣積體電路製造股份有限公司 積體電路裝置以及產生用於積體電路裝置的安全密鑰的方法及系統
US11528135B2 (en) 2020-03-31 2022-12-13 Taiwan Semiconductor Manufacturing Company, Ltd. Integrated circuit (IC) signatures with random number generator and one-time programmable device
US11962693B2 (en) 2020-03-31 2024-04-16 Taiwan Semiconductor Manufacturing Company, Ltd. Integrated circuit (IC) signatures with random number generator and one-time programmable device

Also Published As

Publication number Publication date
TWI434565B (zh) 2014-04-11
US7822207B2 (en) 2010-10-26
WO2008079524A3 (en) 2008-08-14
WO2008079524A2 (en) 2008-07-03
US20080152144A1 (en) 2008-06-26
CN101569131B (zh) 2012-12-12
CN101569131A (zh) 2009-10-28
DE112007003061T5 (de) 2009-10-29

Similar Documents

Publication Publication Date Title
TW200830832A (en) Key protection mechanism
Bruinderink et al. Differential fault attacks on deterministic lattice signatures
EP2965254B1 (en) Systems and methods for maintaining integrity and secrecy in untrusted computing platforms
US11184164B2 (en) Secure crypto system attributes
US9537657B1 (en) Multipart authenticated encryption
JP6366595B2 (ja) 耐グリッチ性暗号離散対数ベースの署名のための方法及びシステム
US11418321B2 (en) Block cryptographic method for encrypting/decrypting messages and cryptographic devices for implementing this method
US20100303229A1 (en) Modified counter mode encryption
WO2018104412A1 (en) Method of rsa signature or decryption protected using a homomorphic encryption
EP2831800B1 (en) Method for protecting data
JP2000206876A (ja) 2つの情報処理装置の間で保護された形で情報を処理するための方法およびシステム
Dobraunig et al. Fault attacks on nonce-based authenticated encryption: Application to keyak and ketje
TWI517653B (zh) 電子裝置及密碼材料供應之方法
JP2010517448A (ja) セキュアファイル暗号化
JP2010517449A (ja) 信頼できない受信者における秘密の保護
US20170249460A1 (en) Provably secure virus detection
US12052348B2 (en) Computation device using shared shares
US20230254160A1 (en) A calculation method and device for elliptic curve digital signature to resist memory disclosure attacks
Seuschek et al. A cautionary note: Side-channel leakage implications of deterministic signature schemes
WO2006046484A1 (ja) 認証方法
CN112332973B (zh) 一种细粒度的物联网设备控制流保护方法
WO2006062166A1 (ja) 電子データ検証装置
WO2023212838A1 (en) Fast signature generation and verification
Rahman Towards integrity protection of software for e-health data
Fischlin et al. Verifiable Verification in Cryptographic Protocols

Legal Events

Date Code Title Description
MM4A Annulment or lapse of patent due to non-payment of fees