WO2001024439A1 - Dispositif, programme ou systeme de traitement d'informations secretes - Google Patents
Dispositif, programme ou systeme de traitement d'informations secretes Download PDFInfo
- Publication number
- WO2001024439A1 WO2001024439A1 PCT/JP1999/005353 JP9905353W WO0124439A1 WO 2001024439 A1 WO2001024439 A1 WO 2001024439A1 JP 9905353 W JP9905353 W JP 9905353W WO 0124439 A1 WO0124439 A1 WO 0124439A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- information
- processing
- secret information
- secret
- program
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F15/00—Digital computers in general; Data processing equipment in general
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/72—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in cryptographic circuits
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/75—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information by inhibiting the analysis of circuitry or operation
- G06F21/755—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information by inhibiting the analysis of circuitry or operation with measures against power attack
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/77—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/002—Countermeasures against attacks on cryptographic mechanisms
- H04L9/003—Countermeasures against attacks on cryptographic mechanisms for power analysis, e.g. differential power analysis [DPA] or simple power analysis [SPA]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/002—Countermeasures against attacks on cryptographic mechanisms
- H04L9/005—Countermeasures against attacks on cryptographic mechanisms for timing attacks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
- H04L9/3066—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
- H04L9/3252—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures using DSA or related signature schemes, e.g. elliptic based signatures, ElGamal or Schnorr schemes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2207/00—Indexing scheme relating to methods or arrangements for processing data by operating upon the order or content of the data handled
- G06F2207/72—Indexing scheme relating to groups G06F7/72 - G06F7/729
- G06F2207/7219—Countermeasures against side channel or fault attacks
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2211/00—Indexing scheme relating to details of data-processing equipment not covered by groups G06F3/00 - G06F13/00
- G06F2211/007—Encryption, En-/decode, En-/decipher, En-/decypher, Scramble, (De-)compress
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2107—File encryption
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F7/00—Methods or arrangements for processing data by operating upon the order or content of the data handled
- G06F7/60—Methods or arrangements for performing computations using a digital non-denominational number representation, i.e. number representation without radix; Computing devices using combinations of denominational and non-denominational quantity representations, e.g. using difunction pulse trains, STEELE computers, phase computers
- G06F7/72—Methods or arrangements for performing computations using a digital non-denominational number representation, i.e. number representation without radix; Computing devices using combinations of denominational and non-denominational quantity representations, e.g. using difunction pulse trains, STEELE computers, phase computers using residue arithmetic
- G06F7/724—Finite field arithmetic
- G06F7/725—Finite field arithmetic over elliptic curves
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/12—Details relating to cryptographic hardware or logic circuitry
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/56—Financial cryptography, e.g. electronic payment or e-cash
Definitions
- the present invention provides a secret information processing device comprising an arithmetic processing circuit, a storage circuit, and a signal line connecting the secretory information and a data to be processed.
- a secret information processing method configured to obtain the same processing result as the processing result processed based on the processing method, wherein the secret information generation information is different from the secret information, and the secret information generation information is different from the secret information generation information.
- a secret information generation information processing means for outputting the same processing result using the data to be processed.
- the secret information generation information processing means of the present invention comprises: The present invention is characterized in that processing is performed without causing information to appear in the arithmetic processing circuit, the storage circuit, or the signal line.
- the storage circuit of the present invention is characterized in that the secret information generation information is configured as a plurality of pieces of secret information partial information having a plurality of combinations thereof, and is stored in the storage circuit. is there.
- the confidential information itself is transmitted when it is held in the internal storage means or between the storage means and the arithmetic means via a signal line (internal bus) inside the device.
- a signal line internal bus
- the processing means in the arithmetic means it does not appear in any case. Therefore, it becomes difficult to obtain the secret information itself.
- the desired result can be obtained by the secret information generation information processing means used in combination with the secret information generation information, obtaining the information alone does not mean that the secret information is obtained.
- the secret information generation information processing means even if an attacker trying to obtain secret information fraudulently knows the secret information generation information processing means, the number of attempts required by the attacker increases when there are multiple types of data that can be taken as secret information generation information. Therefore, it is more difficult to obtain confidential information.
- the information to be kept secret stored in the storage device by a certain expression method is determined each time an operation using the information is performed, at a predetermined time, or randomly. At a different time, convert it to another expression and rewrite the original expression with the new converted expression
- the storage circuit of the present invention further includes a conversion unit for converting the secret information generation information into another secret information generation information, wherein the other secret information generation information is stored in the secret information generation information processing unit. It is characterized in that it is information for outputting the same processing result as the above processing result.
- the present invention is a secret information processing system for transmitting and receiving a processing result using the secret information by using the secret information processing device described above.
- ECES Elliptic Curve Encryption Scheme
- the program storage unit 1005 contains a representation conversion program 1010 and an elliptic curve A decryption program 1011 and a common key decryption program 1012 are stored, and are read and executed by the arithmetic processing unit 1002, respectively.
- the common key decoding process by the common key decoding program 1012 is performed in the IC card 1001, but this process is performed by an external device capable of exchanging information with the IC card 1001. This may be performed by a device such as a PC that can exchange information through an IC card 1001 and an IC reader / writer.
- the input to the IC card 1001 is the decryption point R1013, and the output from the IC card 1001 is the decryption common key that is the output of the elliptic curve II decryption program.
- the encrypted message m can be decrypted. Since the encrypted message m can be decrypted without the secret key d appearing in the data storage unit 1004, the bus 1003, and the arithmetic processing unit 1002, the TA (Timing Attack) and the DPA (Differential Power Analysis), SPAC Simple Power Analysis), etc., makes it difficult to estimate the secret key value.
- the child run the representation conversion program 1010 via the secret key partial data d 1007 and the secret key partial data d the value of B 1008 is switched-out 3 ⁇ 4 to another value, the bus 1003 from the de Isseki storage unit 1004 Starring ⁇
- the data flowing to the processing unit 1002, the time when the elliptic curve ⁇ decoding program 1011 is executed by the arithmetic processing unit 1002, the intensity of the generated electromagnetic wave, the current consumption, etc. are different. This makes it more difficult to estimate the value of the secret key by TA (Timing Attack), DPA (Differential Power Analysis), SPA (Simple Power Analysis), and so on.
- Step 2005 Write d., 'And d B ' where the secret key portion information d A 1007 and secret key portion information d B 1008 were written in the data storage portion 1004, respectively.
- the information to be kept secret is given.
- the fact that one bit of the value is leaked means that the information about the information to be kept secret is lost.
- the information to be kept confidential rather than the information itself, is to be kept by a certain expression, even if the information to be kept secret d
- Information that should be kept secret even if the value of d A , which is half of the set of d A and d B , which is the data actually stored in the data storage unit 1004 is completely leaked. d As for things, no information has been leaked.
- the information to be kept secret is re-stored in a different manner at an appropriate time, so that even if an attacker later learns the value of at another time, d A at a different time is used. Since no relation can be found again between d and B , no information about d is leaked.
- Step 4002 Decryption common key c and decrypted message! Enter 111 0 14.
- the decryption common key c is the decryption common key xQ output in step 3011 of the elliptic curve ⁇ signal decryption program 1011.
- Step 4004 The exclusive OR ( ⁇ XOR ⁇ ) of the encrypted message ml O and the mask sequence M is calculated, and the result is obtained as a decrypted message 1015. Output to outside of IC card 1001
- ECES Elliptic Curve Encryption Scheme
- the elliptic curve ⁇ decoding program 101 1 may be modified as follows.
- the table data calculation program 5001 receives the decoding point R1013 given from outside the IC card 1001 as input, calculates the table data used in the table reference type elliptic curve decoding program 5002, and converts the result to data.
- This is a program that writes to the table 5003 area in the storage unit 1004.
- This program data representing the secret key d in the data storage unit 1004, namely the secret key partial data d A 1007 and the secret key partial data d B 1008 which definitive present embodiment, in order to perform a process that is independent. Therefore, this program
- Step 6002 Read the decoding point R1013 from outside the IC card 1001.
- Step 6003 Calculate the points 3R, 2R, R, R, -2R, -3R on the elliptic curve.
- Step 7005 If
- is even, i
- is odd, i
- ECES Elliptic Curve Encryption Scheme
- Step 9009 ] ⁇ If ⁇ 11 (binary notation), go to step 9005
- a plurality of data representing the same point for example, T [10] [00] and T [ll] [01] are different. Since the same data T [i] [j] is stored in a different representation depending on the timing of referring to it, it includes operations that refer to table data 5003 The processing is different, even if the input is the same each time. Therefore, the processing time, the intensity of the generated electromagnetic waves, and the current consumption during processing are not constant. This means that the time required for the operation using the secret key and the table data 5003 and the execution of the table reference type elliptic curve encryption / decryption program 5002, the intensity of the generated electromagnetic waves, and the current consumption are not constant. Therefore, attacks such as TAdiming Attack and Differential Power Analysis (DPA) make it difficult to estimate the secret key value.
- DPA Differential Power Analysis
- Step 10002 Read the secret key information d_rep from the data storage unit 1004.
- Step 10003 Generate random numbers K and L (here, let K ⁇ L ⁇
- I d_rep I is the bit of d_rep G)
- Step 13002 Read the decoding point R1013 from outside the IC card 1001.
- Step 13003 Read dm A and dm B from the data storage unit 1004.
- Step 13004: Calculate Q dm A R
- the digital signature 14003 can be generated without the secret key d appearing in the data storage unit 1004, the bus 1003, and the arithmetic processing unit 1002, so that TACTiming Attack), DPA (Differential Power Analysis), SPA (Simple
- the expression conversion program 1010 is used as in the first embodiment. That is, by executing the representation conversion program 1010, the value of the secret key partial data d A 1007 and the secret key partial data d B 1008 is rewritten to a different value, the arithmetic processing from the data storage unit 1004 via the bus 1003
- the data flowing to the section 1002, the time when the ECDSA signature generation program 14001 is executed by the arithmetic processing section 1002, the intensity of the generated electromagnetic waves, the current consumption, and the like also differ. This makes it more difficult to estimate the value of the secret key by TA (Timing Attack), DPAC Differential Power Analysis (SPA), SPA (Simple Power Analysis), or the like.
- FIG. 11 shows a front view of the ECDSA signature generation program 14001 in FIG.
- the ECDSA signature generation is performed by changing the set of the secret key partial information d A 1007 and the secret key partial information d B 1008, which are expressions of the secret key d, by the expression conversion program 1010.
- the homomorphic mapping is a mapping from group to group, and is a mapping that keeps the operation.
- FIG. 12 is a system configuration diagram in the present embodiment.
- a network 16001 is connected to a computer 16002 of a cardholder that is a general consumer, a computer 16003 of a dealer that is a dealer, and a certification authority 16004.
- a certificate authority is an organization that issues certificates that guarantee the validity of public keys.
- the public key 16015 is stored in the memory 16006 of the computer 16002 of the card holder, and the information related to the private key paired with the public key 16015 is stored in the memory of the signature IC card 16010 owned by the force holder.
- This information is stored by the card issuer, for example, a credit company, in the form of an IC card on which information and programs related to the private key have been written in advance, and on an FD or CD ROM containing public key information.
- the medium is set by being sent.
- the public key information may be sent via a transmission medium such as a wired or wireless network.
- the key generation function may be built into the IC card sent from the card issuer, and the key generation function may be set by executing the key generation function.
- a key generation program executable by the card issuer on the computer of the card holder is provided on an FD or CD-ROM. It may be set to the transmitted IC force by being transmitted by a recording medium such as or the like or a transmission medium such as a wired wireless communication, and being executed by the force holder. In the case of a method using an IC card with a key generation function, this method is the most desirable from a security point of view because the information about the private key does not leak outside the IC card.
- the card holder computer 16002 creates a purchase request message 16017 and stores it in the memory 16006.
- the purchase request message 16017 is sent to the signature IC card 16010 through the IC card reader / writer 16009, and a digital signature 16020 is generated in accordance with the method according to the present invention, which is also stored in the memory 16006.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- Computer Hardware Design (AREA)
- General Physics & Mathematics (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Mathematical Physics (AREA)
- General Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Algebra (AREA)
- Mathematical Analysis (AREA)
- Mathematical Optimization (AREA)
- Pure & Applied Mathematics (AREA)
- Computing Systems (AREA)
- Storage Device Security (AREA)
Description
Claims
Priority Applications (8)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR10-2000-7009164A KR100373669B1 (ko) | 1999-09-29 | 1999-09-29 | 비밀 정보의 처리 장치, 비밀 정보의 처리 프로그램을 기록한 기록 매체 및 처리 시스템 |
US09/622,371 US6873706B1 (en) | 1999-09-29 | 1999-09-29 | Processing apparatus, program, or system of secret information |
JP2001527499A JP4671571B2 (ja) | 1999-09-29 | 1999-09-29 | 秘密情報の処理装置および秘密情報の処理プログラムを格納するメモリ |
EP99973813A EP1217783B9 (en) | 1999-09-29 | 1999-09-29 | Device, program or system for processing secret information |
DE69940372T DE69940372D1 (de) | 1999-09-29 | 1999-09-29 | Vorrichtung, programm oder system zur verarbeitung geheimer informationen |
PCT/JP1999/005353 WO2001024439A1 (fr) | 1999-09-29 | 1999-09-29 | Dispositif, programme ou systeme de traitement d'informations secretes |
AU59992/99A AU762650B2 (en) | 1999-09-29 | 1999-09-29 | Device, program or system for processing secret information |
AU2003252789A AU2003252789B2 (en) | 1999-09-29 | 2003-10-03 | Processing apparatus, program, or system of secret information |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/JP1999/005353 WO2001024439A1 (fr) | 1999-09-29 | 1999-09-29 | Dispositif, programme ou systeme de traitement d'informations secretes |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2001024439A1 true WO2001024439A1 (fr) | 2001-04-05 |
Family
ID=14236839
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/JP1999/005353 WO2001024439A1 (fr) | 1999-09-29 | 1999-09-29 | Dispositif, programme ou systeme de traitement d'informations secretes |
Country Status (7)
Country | Link |
---|---|
US (1) | US6873706B1 (ja) |
EP (1) | EP1217783B9 (ja) |
JP (1) | JP4671571B2 (ja) |
KR (1) | KR100373669B1 (ja) |
AU (1) | AU762650B2 (ja) |
DE (1) | DE69940372D1 (ja) |
WO (1) | WO2001024439A1 (ja) |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2003518872A (ja) * | 1999-12-28 | 2003-06-10 | ギーゼッケ ウント デフリエント ゲーエムベーハー | 鍵の細分化によってアクセスを防止する携帯可能なデータ記憶媒体 |
WO2005008955A1 (ja) * | 2003-07-22 | 2005-01-27 | Fujitsu Limited | 個人鍵を用いた耐タンパ暗号処理 |
WO2007074836A1 (ja) * | 2005-12-28 | 2007-07-05 | Matsushita Electric Industrial Co., Ltd. | 署名生成装置、署名生成方法及び署名生成プログラム |
JP2008233941A (ja) * | 2005-04-28 | 2008-10-02 | Matsushita Electric Ind Co Ltd | 暗号処理装置および暗号処理方法 |
JP2010034682A (ja) * | 2008-07-25 | 2010-02-12 | Dainippon Printing Co Ltd | 暗号処理装置 |
JP2013524263A (ja) * | 2010-03-31 | 2013-06-17 | イルデト カナダ コーポレーション | ホワイトボックス攻撃から暗号化資産を保護するためのシステムと方法 |
CN103679008A (zh) * | 2012-09-03 | 2014-03-26 | 江苏东大集成电路系统工程技术有限公司 | 一种高效的安全芯片功耗攻击测试方法 |
JP2016012931A (ja) * | 2015-08-28 | 2016-01-21 | ルネサスエレクトロニクス株式会社 | 半導体装置 |
Families Citing this family (54)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7092523B2 (en) * | 1999-01-11 | 2006-08-15 | Certicom Corp. | Method and apparatus for minimizing differential power attacks on processors |
US7599491B2 (en) * | 1999-01-11 | 2009-10-06 | Certicom Corp. | Method for strengthening the implementation of ECDSA against power analysis |
EP1217783B9 (en) | 1999-09-29 | 2009-07-15 | Hitachi, Ltd. | Device, program or system for processing secret information |
ATE366443T1 (de) * | 2000-05-22 | 2007-07-15 | Infineon Technologies Ag | Sicherheits-datenverarbeitungseinheit sowie dazugehöriges verfahren |
US7308096B2 (en) * | 2000-05-30 | 2007-12-11 | Hitachi, Ltd. | Elliptic scalar multiplication system |
US9323955B2 (en) * | 2000-12-21 | 2016-04-26 | Gemalto Sa | Method for protecting a logic or mathematical operator installed in an electronic module with a microprocessor as well as the associated embedded electronic module and the system |
FR2820914A1 (fr) * | 2001-02-15 | 2002-08-16 | Bull Cp8 | Procede de securisation d'un ensemble electronique mettant en oeuvre en algorithme cryptographique utilisant des operations booleennes et des operations arithmetiques, et systeme embarque correspondant |
JP4596686B2 (ja) * | 2001-06-13 | 2010-12-08 | 富士通株式会社 | Dpaに対して安全な暗号化 |
DE10148415C2 (de) * | 2001-09-29 | 2003-07-31 | Univ Braunschweig Tech | Verfahren und Vorrichtung zum Verschlüsseln und Entschlüsseln von Daten |
JP4045777B2 (ja) * | 2001-10-30 | 2008-02-13 | 株式会社日立製作所 | 情報処理装置 |
CN1640051B (zh) * | 2002-03-07 | 2011-05-18 | 艾斯奥托公司 | 使具有秘密密钥的电子密码装置安全的方法 |
US7549059B2 (en) * | 2002-06-26 | 2009-06-16 | Arm Limited | Transferring data values via a data bus or storing data values using a selectable representation |
JP3881942B2 (ja) * | 2002-09-04 | 2007-02-14 | 松下電器産業株式会社 | 暗号化部を有する半導体装置 |
KR100451570B1 (ko) * | 2002-10-29 | 2004-10-08 | (주)미래스멕스 | 에스피에이에 견디는 타원 곡선 암호화 알고리즘을구현하는 방법 및 장치 |
KR100453230B1 (ko) * | 2002-11-08 | 2004-10-15 | 한국전자통신연구원 | 초타원곡선 암호화 프로세싱 장치 |
DE10253285B4 (de) * | 2002-11-15 | 2018-11-15 | Giesecke+Devrient Mobile Security Gmbh | Verschleierung eines geheimen Wertes |
US7587051B2 (en) | 2003-01-13 | 2009-09-08 | Denis Bisson | System and method for securing information, including a system and method for setting up a correspondent pairing |
DE10308092A1 (de) * | 2003-02-24 | 2004-09-02 | Schenck Process Gmbh | Verfahren und Vorrichtung zur digitalen Sicherung von Meßwerten |
DE502004006338D1 (de) * | 2003-09-30 | 2008-04-10 | Siemens Ag | Einräumung eines zugriffs auf ein computerbasiertes objekt |
US7711957B2 (en) * | 2003-09-30 | 2010-05-04 | Siemens Aktiengesellschaft | Granting access to a computer-based object |
JP4428036B2 (ja) * | 2003-12-02 | 2010-03-10 | ソニー株式会社 | 情報処理装置および方法、プログラム、並びに、情報処理システムおよび方法 |
FR2873523B1 (fr) * | 2004-07-22 | 2007-08-10 | Sagem | Procede et dispositif d'execution d'un calcul cryptographique |
JPWO2006030496A1 (ja) * | 2004-09-15 | 2008-05-08 | 三菱電機株式会社 | 楕円曲線暗号演算装置、楕円曲線を用いた演算装置の演算方法および楕円曲線上の点のスカラー倍演算をコンピュータに実行させるプログラム |
KR20060081847A (ko) * | 2005-01-10 | 2006-07-13 | 삼성전자주식회사 | 비밀키를 보호하는 스마트 카드 및 그것의 방법 |
CA2592875C (en) | 2005-01-18 | 2016-09-06 | Certicom Corp. | Accelerated verification of digital signatures and public keys |
US8467535B2 (en) * | 2005-01-18 | 2013-06-18 | Certicom Corp. | Accelerated verification of digital signatures and public keys |
WO2006077651A1 (ja) * | 2005-01-24 | 2006-07-27 | Fujitsu Limited | 電力解析攻撃に対する耐タンパ性を持った暗号化処理装置 |
US7610628B2 (en) * | 2005-03-01 | 2009-10-27 | Infineon Technologies Ag | Apparatus and method for calculating a representation of a result operand |
KR101194837B1 (ko) * | 2005-07-12 | 2012-10-25 | 삼성전자주식회사 | 멱지수를 숨기는 dpa 대책의 고속 계산을 위한 암호화장치 및 방법 |
WO2007045258A1 (en) | 2005-10-18 | 2007-04-26 | Telecom Italia S.P.A. | A method for scalar multiplication in elliptic curve groups over prime fields for side-channel attack resistant cryptosystems |
ATE466329T1 (de) | 2005-10-28 | 2010-05-15 | Telecom Italia Spa | Verfahren zur skalarmultiplikation in gruppen elliptischer kurven über binäre polynomische körper für nebenkanalattacken-beständige kryptosysteme |
WO2007088796A1 (en) * | 2006-01-31 | 2007-08-09 | Semiconductor Energy Laboratory Co., Ltd. | Semiconductor device |
US8997255B2 (en) | 2006-07-31 | 2015-03-31 | Inside Secure | Verifying data integrity in a data storage device |
US8301890B2 (en) * | 2006-08-10 | 2012-10-30 | Inside Secure | Software execution randomization |
US7613907B2 (en) * | 2006-08-11 | 2009-11-03 | Atmel Corporation | Embedded software camouflage against code reverse engineering |
US8352752B2 (en) | 2006-09-01 | 2013-01-08 | Inside Secure | Detecting radiation-based attacks |
US7554865B2 (en) * | 2006-09-21 | 2009-06-30 | Atmel Corporation | Randomizing current consumption in memory devices |
US7860244B2 (en) * | 2006-12-18 | 2010-12-28 | Sap Ag | Secure computation of private values |
US8559625B2 (en) * | 2007-08-07 | 2013-10-15 | Inside Secure | Elliptic curve point transformations |
US7991162B2 (en) * | 2007-09-14 | 2011-08-02 | University Of Ottawa | Accelerating scalar multiplication on elliptic curve cryptosystems over prime fields |
US8233615B2 (en) * | 2008-01-15 | 2012-07-31 | Inside Secure | Modular reduction using a special form of the modulus |
US8619977B2 (en) * | 2008-01-15 | 2013-12-31 | Inside Secure | Representation change of a point on an elliptic curve |
FR2926652B1 (fr) * | 2008-01-23 | 2010-06-18 | Inside Contactless | Procede et dispositifs de contre-mesure pour cryptographie asymetrique a schema de signature |
US8139765B2 (en) * | 2008-12-29 | 2012-03-20 | King Fahd University Of Petroleum & Minerals | Elliptical polynomial-based message authentication code |
US8964988B2 (en) * | 2010-07-23 | 2015-02-24 | Nippon Telegraph And Telephone Corporation | Secret sharing system, sharing apparatus, share management apparatus, acquisition apparatus, secret sharing method, program and recording medium |
US8705730B2 (en) * | 2010-12-23 | 2014-04-22 | Morega Systems Inc. | Elliptic curve cryptography with fragmented key processing and methods for use therewith |
CN102110206B (zh) * | 2010-12-27 | 2013-01-16 | 北京握奇数据系统有限公司 | 防御攻击的方法和具有攻击防御功能的装置 |
US8624624B1 (en) | 2011-08-26 | 2014-01-07 | Lockheed Martin Corporation | Power isolation during sensitive operations |
US8525545B1 (en) | 2011-08-26 | 2013-09-03 | Lockheed Martin Corporation | Power isolation during sensitive operations |
US8745376B2 (en) | 2011-10-14 | 2014-06-03 | Certicom Corp. | Verifying implicit certificates and digital signatures |
US8334705B1 (en) | 2011-10-27 | 2012-12-18 | Certicom Corp. | Analog circuitry to conceal activity of logic circuitry |
US8635467B2 (en) | 2011-10-27 | 2014-01-21 | Certicom Corp. | Integrated circuit with logic circuitry and multiple concealing circuits |
CN104811445B (zh) * | 2015-04-20 | 2018-03-27 | 深圳市文鼎创数据科技有限公司 | 一种时间攻击安全性评估的方法及系统 |
KR20200046481A (ko) * | 2018-10-24 | 2020-05-07 | 삼성전자주식회사 | 난수 생성기, 이를 포함하는 암호화 장치 및 이의 동작 방법 |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPH0376447A (ja) * | 1989-08-18 | 1991-04-02 | Sharp Corp | 秘話装置 |
JPH10282881A (ja) * | 1997-04-04 | 1998-10-23 | Nippon Telegr & Teleph Corp <Ntt> | 秘密鍵分散管理方法 |
JPH11316542A (ja) * | 1998-03-05 | 1999-11-16 | Matsushita Electric Ind Co Ltd | 楕円曲線変換装置、利用装置及び利用システム |
Family Cites Families (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5825880A (en) * | 1994-01-13 | 1998-10-20 | Sudia; Frank W. | Multi-step digital signature method and system |
US5768389A (en) * | 1995-06-21 | 1998-06-16 | Nippon Telegraph And Telephone Corporation | Method and system for generation and management of secret key of public key cryptosystem |
US5937066A (en) * | 1996-10-02 | 1999-08-10 | International Business Machines Corporation | Two-phase cryptographic key recovery system |
WO1998036520A1 (en) | 1997-02-13 | 1998-08-20 | Secure Transaction Solutions, Llc | Cryptographic key split combiner |
US7212632B2 (en) * | 1998-02-13 | 2007-05-01 | Tecsec, Inc. | Cryptographic key split combiner |
US6411715B1 (en) * | 1997-11-10 | 2002-06-25 | Rsa Security, Inc. | Methods and apparatus for verifying the cryptographic security of a selected private and public key pair without knowing the private key |
EP0936776B1 (en) * | 1998-02-13 | 2004-05-19 | Hitachi, Ltd. | A network system using a threshold secret sharing method |
EP1217783B9 (en) | 1999-09-29 | 2009-07-15 | Hitachi, Ltd. | Device, program or system for processing secret information |
-
1999
- 1999-09-29 EP EP99973813A patent/EP1217783B9/en not_active Expired - Lifetime
- 1999-09-29 WO PCT/JP1999/005353 patent/WO2001024439A1/ja active IP Right Grant
- 1999-09-29 JP JP2001527499A patent/JP4671571B2/ja not_active Expired - Fee Related
- 1999-09-29 DE DE69940372T patent/DE69940372D1/de not_active Expired - Lifetime
- 1999-09-29 AU AU59992/99A patent/AU762650B2/en not_active Ceased
- 1999-09-29 US US09/622,371 patent/US6873706B1/en not_active Expired - Fee Related
- 1999-09-29 KR KR10-2000-7009164A patent/KR100373669B1/ko not_active IP Right Cessation
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPH0376447A (ja) * | 1989-08-18 | 1991-04-02 | Sharp Corp | 秘話装置 |
JPH10282881A (ja) * | 1997-04-04 | 1998-10-23 | Nippon Telegr & Teleph Corp <Ntt> | 秘密鍵分散管理方法 |
JPH11316542A (ja) * | 1998-03-05 | 1999-11-16 | Matsushita Electric Ind Co Ltd | 楕円曲線変換装置、利用装置及び利用システム |
Non-Patent Citations (4)
Title |
---|
BRUCE SCHNEIER: "applied cryptography, 3.7 secret sharing", 1996, JOHN WILEY & SONS, XP002945863 * |
KAJI,Y.ET AL.: "Password Jizen Sengen ni yoru Kojin Ninshouhou; Jiki Card wo mochiita Anzenna Kojin Ninshouhou", TECHNICAL RESEARCH REPORT OF THE INSTITUTE OF ELECTRONICS, INFORMATION AND COMMUNICATION ENGINEERS (ISEC95-39-44), vol. 95, no. 423, 15 December 1995 (1995-12-15), pages 21 - 28, XP002945865 * |
KAZOU TAKARAGI ET AL.: "Sosetsu Shou Tokushuu 'Card', Card Shakai to Seculity Gijutsu", NIPPON INSTASU GAKKAISHI, vol. 29, no. 3, 31 May 1992 (1992-05-31), pages 288 - 295, XP002945864 * |
See also references of EP1217783A4 * |
Cited By (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2003518872A (ja) * | 1999-12-28 | 2003-06-10 | ギーゼッケ ウント デフリエント ゲーエムベーハー | 鍵の細分化によってアクセスを防止する携帯可能なデータ記憶媒体 |
JP4841785B2 (ja) * | 1999-12-28 | 2011-12-21 | ギーゼッケ ウント デフリエント ゲーエムベーハー | 鍵の細分化によってアクセスを防止する携帯可能なデータ記憶媒体 |
JP4632950B2 (ja) * | 2003-07-22 | 2011-02-16 | 富士通株式会社 | 個人鍵を用いた耐タンパ暗号処理 |
WO2005008955A1 (ja) * | 2003-07-22 | 2005-01-27 | Fujitsu Limited | 個人鍵を用いた耐タンパ暗号処理 |
JPWO2005008955A1 (ja) * | 2003-07-22 | 2006-09-07 | 富士通株式会社 | 個人鍵を用いた耐タンパ暗号処理 |
US8184805B2 (en) | 2005-04-28 | 2012-05-22 | Panasonic Corporation | Program converter, encrypting device, and encrypting method |
US7724897B2 (en) | 2005-04-28 | 2010-05-25 | Panasonic Corporation | Program converter, encrypting device, and encrypting method |
JP2008233941A (ja) * | 2005-04-28 | 2008-10-02 | Matsushita Electric Ind Co Ltd | 暗号処理装置および暗号処理方法 |
WO2007074836A1 (ja) * | 2005-12-28 | 2007-07-05 | Matsushita Electric Industrial Co., Ltd. | 署名生成装置、署名生成方法及び署名生成プログラム |
US8280039B2 (en) | 2005-12-28 | 2012-10-02 | Panasonic Corporation | Signature generating device, signature generating method and signature generating program |
JP2010034682A (ja) * | 2008-07-25 | 2010-02-12 | Dainippon Printing Co Ltd | 暗号処理装置 |
JP2013524263A (ja) * | 2010-03-31 | 2013-06-17 | イルデト カナダ コーポレーション | ホワイトボックス攻撃から暗号化資産を保護するためのシステムと方法 |
US9009481B2 (en) | 2010-03-31 | 2015-04-14 | Irdeto Canada Corporation | System and method for protecting cryptographic assets from a white-box attack |
CN103679008A (zh) * | 2012-09-03 | 2014-03-26 | 江苏东大集成电路系统工程技术有限公司 | 一种高效的安全芯片功耗攻击测试方法 |
JP2016012931A (ja) * | 2015-08-28 | 2016-01-21 | ルネサスエレクトロニクス株式会社 | 半導体装置 |
Also Published As
Publication number | Publication date |
---|---|
KR100373669B1 (ko) | 2003-02-26 |
AU762650B2 (en) | 2003-07-03 |
DE69940372D1 (de) | 2009-03-19 |
JP4671571B2 (ja) | 2011-04-20 |
EP1217783A4 (en) | 2004-05-12 |
US6873706B1 (en) | 2005-03-29 |
EP1217783B9 (en) | 2009-07-15 |
KR20020025630A (ko) | 2002-04-04 |
EP1217783B1 (en) | 2009-01-28 |
AU5999299A (en) | 2001-04-30 |
EP1217783A1 (en) | 2002-06-26 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2001024439A1 (fr) | Dispositif, programme ou systeme de traitement d'informations secretes | |
US7308096B2 (en) | Elliptic scalar multiplication system | |
US7940927B2 (en) | Information security device and elliptic curve operating device | |
US7961874B2 (en) | XZ-elliptic curve cryptography with secret key embedding | |
US7764785B2 (en) | Method for communicating securely over an insecure communication channel | |
US20080063193A1 (en) | Crypto-communication method, recipient-side device, key management center-side device and program | |
CN110663215B (zh) | 在白盒场景中的椭圆曲线点乘设备和方法 | |
JP2008252299A (ja) | 暗号処理システム及び暗号処理方法 | |
US20050157872A1 (en) | RSA public key generation apparatus, RSA decryption apparatus, and RSA signature apparatus | |
US20100322422A1 (en) | Method for elliptic curve scalar multiplication using parameterized projective coordinates | |
EP1296224B1 (en) | Elliptic scalar multiplication system | |
JP2004304800A (ja) | データ処理装置におけるサイドチャネル攻撃防止 | |
US11336425B1 (en) | Cryptographic machines characterized by a Finite Lab-Transform (FLT) | |
JP2003255831A (ja) | 楕円曲線スカラー倍計算方法及び装置 | |
US7146006B1 (en) | Method for improving a random number generator to make it more resistant against attacks by current measuring | |
US20210352054A1 (en) | Methods and devices for generating a symmetric session key for encrypted communication | |
JP3878853B2 (ja) | 公開鍵暗号アルゴリズムを用いる電子構成品におけるモジュラべき乗演算アルゴリズム | |
US20050220298A1 (en) | Cryptographic method for distributing load among several entities and devices therefor | |
KR100564599B1 (ko) | 역원 계산 회로, 역원계산 방법 및 상기 역원계산 방법을실행시키기 위한 프로그램을 기록한 컴퓨터로 읽을 수있는 기록매체 | |
KR100953715B1 (ko) | Crt-rsa 모듈라 지수승 알고리즘을 이용한 디지털서명 방법, 그 장치 및 이를 기록한 컴퓨터 판독가능 저장매체 | |
US7760884B2 (en) | Cryptographic method and devices for facilitating calculations during transactions | |
AU2003252789B2 (en) | Processing apparatus, program, or system of secret information | |
Ghadi | Improving the Robustness of RSA Encryption Through Input-Based Key Generation. | |
WO2004070681A2 (ja) | 楕円曲線スカラー倍計算方法および装置 | |
Mohanta et al. | and Vishnu Narayan Mishra |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
WWE | Wipo information: entry into national phase |
Ref document number: 1999973813 Country of ref document: EP |
|
WWE | Wipo information: entry into national phase |
Ref document number: 59992/99 Country of ref document: AU |
|
WWE | Wipo information: entry into national phase |
Ref document number: 1020007009164 Country of ref document: KR |
|
WWE | Wipo information: entry into national phase |
Ref document number: 09622371 Country of ref document: US |
|
AK | Designated states |
Kind code of ref document: A1 Designated state(s): AU CA CN JP KR SG US |
|
AL | Designated countries for regional patents |
Kind code of ref document: A1 Designated state(s): AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE |
|
DFPE | Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101) | ||
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
ENP | Entry into the national phase |
Ref country code: JP Ref document number: 2001 527499 Kind code of ref document: A Format of ref document f/p: F |
|
WWP | Wipo information: published in national office |
Ref document number: 1020007009164 Country of ref document: KR |
|
WWP | Wipo information: published in national office |
Ref document number: 1999973813 Country of ref document: EP |
|
WWG | Wipo information: grant in national office |
Ref document number: 1020007009164 Country of ref document: KR |
|
WWG | Wipo information: grant in national office |
Ref document number: 59992/99 Country of ref document: AU |