WO2004070497A3 - Modulare exponentiation mit randomisierten exponenten - Google Patents
Modulare exponentiation mit randomisierten exponenten Download PDFInfo
- Publication number
- WO2004070497A3 WO2004070497A3 PCT/EP2004/000522 EP2004000522W WO2004070497A3 WO 2004070497 A3 WO2004070497 A3 WO 2004070497A3 EP 2004000522 W EP2004000522 W EP 2004000522W WO 2004070497 A3 WO2004070497 A3 WO 2004070497A3
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- randomization
- order
- modular exponentiation
- exponent
- auxiliary number
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/065—Encryption by serially and continuously modifying data stream elements, e.g. stream cipher systems, RC4, SEAL or A5/3
- H04L9/0656—Pseudorandom key sequence combined element-for-element with data sequence, e.g. one-time-pad [OTP] or Vernam's cipher
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F7/00—Methods or arrangements for processing data by operating upon the order or content of the data handled
- G06F7/60—Methods or arrangements for performing computations using a digital non-denominational number representation, i.e. number representation without radix; Computing devices using combinations of denominational and non-denominational quantity representations, e.g. using difunction pulse trains, STEELE computers, phase computers
- G06F7/72—Methods or arrangements for performing computations using a digital non-denominational number representation, i.e. number representation without radix; Computing devices using combinations of denominational and non-denominational quantity representations, e.g. using difunction pulse trains, STEELE computers, phase computers using residue arithmetic
- G06F7/723—Modular exponentiation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/002—Countermeasures against attacks on cryptographic mechanisms
- H04L9/003—Countermeasures against attacks on cryptographic mechanisms for power analysis, e.g. differential power analysis [DPA] or simple power analysis [SPA]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/14—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2207/00—Indexing scheme relating to methods or arrangements for processing data by operating upon the order or content of the data handled
- G06F2207/72—Indexing scheme relating to groups G06F7/72 - G06F7/729
- G06F2207/7219—Countermeasures against side channel or fault attacks
- G06F2207/7223—Randomisation as countermeasure against side channel attacks
- G06F2207/7257—Random modification not requiring correction
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/08—Randomization, e.g. dummy operations or using noise
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Computing Systems (AREA)
- Mathematical Optimization (AREA)
- Pure & Applied Mathematics (AREA)
- Mathematical Analysis (AREA)
- Computational Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- Mathematical Physics (AREA)
- Storage Device Security (AREA)
- Signal Processing For Digital Recording And Reproducing (AREA)
Abstract
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EP04704224A EP1590731A2 (de) | 2003-02-04 | 2004-01-22 | Modulare exponentiation mit randomisierten exponenten |
US11/195,350 US7908641B2 (en) | 2003-02-04 | 2005-08-01 | Modular exponentiation with randomized exponent |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
DE10304451A DE10304451B3 (de) | 2003-02-04 | 2003-02-04 | Modulare Exponentiation mit randomisiertem Exponenten |
DE10304451.5 | 2003-02-04 |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US11/195,350 Continuation US7908641B2 (en) | 2003-02-04 | 2005-08-01 | Modular exponentiation with randomized exponent |
Publications (2)
Publication Number | Publication Date |
---|---|
WO2004070497A2 WO2004070497A2 (de) | 2004-08-19 |
WO2004070497A3 true WO2004070497A3 (de) | 2005-01-06 |
Family
ID=32797314
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/EP2004/000522 WO2004070497A2 (de) | 2003-02-04 | 2004-01-22 | Modulare exponentiation mit randomisierten exponenten |
Country Status (5)
Country | Link |
---|---|
US (1) | US7908641B2 (de) |
EP (1) | EP1590731A2 (de) |
KR (1) | KR100731387B1 (de) |
DE (1) | DE10304451B3 (de) |
WO (1) | WO2004070497A2 (de) |
Families Citing this family (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP1939838A1 (de) * | 2005-10-19 | 2008-07-02 | Matsushita Electric Industrial Co., Ltd. | Informations-sicherheitseinrichtung, informations-sicherheitsverfahren, computerprogramm, computerlesbares aufzeichnungsmedium und integrierte schaltung |
EP1840732A1 (de) * | 2006-03-31 | 2007-10-03 | Axalto SA | Schutz vor Seitenkanalangriffen |
US8670557B2 (en) * | 2007-09-10 | 2014-03-11 | Spansion Llc | Cryptographic system with modular randomization of exponentiation |
KR100953716B1 (ko) * | 2008-02-28 | 2010-04-19 | 고려대학교 산학협력단 | Crt-rsa 기반의 비트 연산을 이용한 디지털 서명방법, 그 장치 및 이를 기록한 기록 매체 |
EP2669789A3 (de) * | 2008-05-07 | 2014-06-25 | Irdeto Corporate B.V. | Verschattung von Exponenten |
KR101334040B1 (ko) * | 2010-01-20 | 2013-11-28 | 한국전자통신연구원 | 대칭키 암호화 시스템의 마스킹 연산 방법 및 장치 |
DE102010039273B4 (de) * | 2010-08-12 | 2014-12-04 | Infineon Technologies Ag | Kryptographie-Prozessor, Chipkarte und Verfahren zur Berechnung eines Ergebnisses einer Exponentiation |
KR101344402B1 (ko) * | 2010-08-12 | 2013-12-26 | 한국전자통신연구원 | Rsa 서명 방법 및 장치 |
FR3010210B1 (fr) * | 2013-08-29 | 2017-01-13 | Stmicroelectronics Rousset | Protection d'un calcul contre des attaques par canaux caches |
WO2015088525A1 (en) * | 2013-12-12 | 2015-06-18 | Empire Technology Development, Llc | Randomization of processor subunit timing to enhance security |
US9444623B2 (en) * | 2013-12-20 | 2016-09-13 | Cryptography Research, Inc. | Modular exponentiation optimization for cryptographic systems |
KR101604009B1 (ko) | 2014-05-12 | 2016-03-17 | 주식회사 키페어 | 공인인증을 위한 보안 토큰 및 그 구동 방법 |
US10181944B2 (en) | 2015-06-16 | 2019-01-15 | The Athena Group, Inc. | Minimizing information leakage during modular exponentiation and elliptic curve point multiplication |
US10367637B2 (en) * | 2016-07-22 | 2019-07-30 | Qualcomm Incorporated | Modular exponentiation with transparent side channel attack countermeasures |
US11902420B2 (en) * | 2021-11-23 | 2024-02-13 | Theon Technology Llc | Partial cryptographic key transport using one-time pad encryption |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5991415A (en) * | 1997-05-12 | 1999-11-23 | Yeda Research And Development Co. Ltd. At The Weizmann Institute Of Science | Method and apparatus for protecting public key schemes from timing and fault attacks |
DE19828936A1 (de) * | 1998-05-29 | 1999-12-02 | Siemens Ag | Verfahren und Vorrichtung zum Verarbeiten von Daten |
DE10042234A1 (de) * | 2000-08-28 | 2002-03-14 | Infineon Technologies Ag | Verfahren und Vorrichtung zum Durchführen einer modularen Exponentiation in einem kryptographischen Prozessor |
EP1239365A2 (de) * | 2001-03-06 | 2002-09-11 | Hitachi, Ltd. | Betrugssicheres Verarbeitungsverfahren |
Family Cites Families (21)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4611307A (en) * | 1964-06-26 | 1986-09-09 | Hewlett-Packard Company | Function analyzing |
US4499551A (en) * | 1982-09-27 | 1985-02-12 | At&T Bell Laboratories | Rapid generation of discrete random variates from general distributions |
US5046094A (en) * | 1989-02-02 | 1991-09-03 | Kabushiki Kaisha Toshiba | Server-aided computation method and distributed information processing unit |
US5208490A (en) | 1991-04-12 | 1993-05-04 | Hewlett-Packard Company | Functionally complete family of self-timed dynamic logic circuits |
US5369708A (en) * | 1992-03-31 | 1994-11-29 | Kabushiki Kaisha Toshiba | Fast server-aided computation system and method for modular exponentiation without revealing client's secret to auxiliary device |
WO1997039410A1 (en) * | 1996-04-02 | 1997-10-23 | The Regents Of The University Of California | Data embedding |
US6282290B1 (en) * | 1997-03-28 | 2001-08-28 | Mykotronx, Inc. | High speed modular exponentiator |
EP1050133B2 (de) * | 1998-01-02 | 2009-05-27 | Cryptography Research Inc. | Leckresistentes kryptographisches verfahren und vorrichtung |
US6957341B2 (en) * | 1998-05-14 | 2005-10-18 | Purdue Research Foundation | Method and system for secure computational outsourcing and disguise |
FR2780177B1 (fr) * | 1998-06-17 | 2001-10-05 | Schlumberger Ind Sa | Systeme de protection d'un logiciel |
EP1096443B1 (de) * | 1998-07-02 | 2008-07-16 | Sharp Kabushiki Kaisha | Verwaltungssystem elektronischer erzeugnisse, in dem folgende geräte über kommunikationsleitungen miteinander verbunden sind: gerät zum verwalten von urheberrechten, verkaufsgerät für elektronische erzeugnisse, einrichtung zum anzeigen elektronischer bücher und gerät zum verwalten von schlüsselinformationen |
RU2153191C2 (ru) * | 1998-09-29 | 2000-07-20 | Закрытое акционерное общество "Алкорсофт" | Способ изготовления вслепую цифровой rsa-подписи и устройство для его реализации (варианты) |
US6298135B1 (en) * | 1999-04-29 | 2001-10-02 | Motorola, Inc. | Method of preventing power analysis attacks on microelectronic assemblies |
US6928163B1 (en) * | 1999-07-20 | 2005-08-09 | International Business Machines Corporation | Methods, systems and computer program products for generating user-dependent RSA values without storing seeds |
US6886098B1 (en) * | 1999-08-13 | 2005-04-26 | Microsoft Corporation | Systems and methods for compression of key sets having multiple keys |
JP2001117823A (ja) * | 1999-10-15 | 2001-04-27 | Fuji Xerox Co Ltd | アクセス資格認証機能付きデータ記憶装置 |
FR2800478B1 (fr) * | 1999-10-28 | 2001-11-30 | Bull Cp8 | Procede de securisation d'un ensemble electronique de cryptographie a base d'exponentiation modulaire contre les attaques par analyse physique |
US6914983B2 (en) * | 2000-12-19 | 2005-07-05 | International Business Machines Corporation | Method for checking modular multiplication |
DE10143728B4 (de) * | 2001-09-06 | 2004-09-02 | Infineon Technologies Ag | Vorrichtung und Verfahren zum Berechnen eines Ergebnisses einer modularen Exponentiation |
JP3896047B2 (ja) * | 2002-07-26 | 2007-03-22 | 株式会社豊田中央研究所 | モータ駆動制御装置 |
EP1467512B1 (de) * | 2003-04-07 | 2008-07-23 | STMicroelectronics S.r.l. | Verschlüsselungsverfahren unter Verwendung von chaotischen Abbildungen und digitale Unterschriftsverfahren |
-
2003
- 2003-02-04 DE DE10304451A patent/DE10304451B3/de not_active Expired - Fee Related
-
2004
- 2004-01-22 WO PCT/EP2004/000522 patent/WO2004070497A2/de active Search and Examination
- 2004-01-22 KR KR1020057014395A patent/KR100731387B1/ko active IP Right Grant
- 2004-01-22 EP EP04704224A patent/EP1590731A2/de not_active Ceased
-
2005
- 2005-08-01 US US11/195,350 patent/US7908641B2/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5991415A (en) * | 1997-05-12 | 1999-11-23 | Yeda Research And Development Co. Ltd. At The Weizmann Institute Of Science | Method and apparatus for protecting public key schemes from timing and fault attacks |
DE19828936A1 (de) * | 1998-05-29 | 1999-12-02 | Siemens Ag | Verfahren und Vorrichtung zum Verarbeiten von Daten |
DE10042234A1 (de) * | 2000-08-28 | 2002-03-14 | Infineon Technologies Ag | Verfahren und Vorrichtung zum Durchführen einer modularen Exponentiation in einem kryptographischen Prozessor |
EP1239365A2 (de) * | 2001-03-06 | 2002-09-11 | Hitachi, Ltd. | Betrugssicheres Verarbeitungsverfahren |
Also Published As
Publication number | Publication date |
---|---|
US7908641B2 (en) | 2011-03-15 |
KR100731387B1 (ko) | 2007-06-21 |
KR20050106416A (ko) | 2005-11-09 |
DE10304451B3 (de) | 2004-09-02 |
EP1590731A2 (de) | 2005-11-02 |
US20070064930A1 (en) | 2007-03-22 |
WO2004070497A2 (de) | 2004-08-19 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2004070497A3 (de) | Modulare exponentiation mit randomisierten exponenten | |
AU2005330565B2 (en) | Computationally asymmetric cryptographic systems | |
WO2003015370A3 (en) | Data certification method and apparatus | |
MY165770A (en) | Use of isogenies for design of cryptosystems | |
WO2004008676A3 (en) | Network attached encryption | |
DK1365537T3 (da) | Indretninger og fremgangsmåder til certificering af digitale underskrifter | |
WO2000074297A3 (en) | Method and apparatus for secure distribution of public/private key pairs | |
WO2002022223A3 (en) | Transaction signature | |
WO2002013445A3 (en) | Linking public key of device to information during manufacture | |
WO2006044717A3 (en) | One time password | |
NO970084L (no) | Fremgangsmåte for sikker bruk av digitale signaturer i et kommersielt kryptografisystem | |
WO2005114900A3 (en) | Digital signatures including identity-based aggregate signatures | |
WO2007089266A3 (en) | Administration of data encryption in enterprise computer systems | |
CN109039640A (zh) | 一种基于rsa密码算法的加解密硬件系统及方法 | |
WO2000035142A8 (en) | Cryptosystems with elliptic curves chosen by users | |
AU2001264029A1 (en) | Countermeasure method in an electronic component using a public key encryption algorithm on elliptic curve | |
WO2003023605A3 (de) | Vorrichtung und verfahren zum berechnen eines ergebnisses einer modularen exponentiation | |
TW200520508A (en) | Authentication system | |
US7123717B1 (en) | Countermeasure method in an electronic component which uses an RSA-type public key cryptographic algorithm | |
WO2007020564A3 (en) | Circuit arrangement and method for rsa key generation | |
WO2001055838A3 (fr) | Algorithme d'exponentation modulaire dans un composant electronique mettant en oeuvre un algorithme de chiffrement a cle publique | |
Lin et al. | Comments on the Yang–Chang–Hwang anonymous conference key distribution system | |
EP0998074A3 (de) | Verfahren zur digitalen Unterschrift und Verfahren und Vorrichtung zur Verwaltung einer Geheiminformation | |
WO1998047260A3 (en) | Publicly verifiable key recovery | |
Shieh et al. | An Efficient Authentication Scheme with Revocation Capability |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AK | Designated states |
Kind code of ref document: A2 Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BW BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE EG ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NA NI NO NZ OM PG PH PL PT RO RU SC SD SE SG SK SL SY TJ TM TN TR TT TZ UA UG US UZ VC VN YU ZA ZM ZW |
|
AL | Designated countries for regional patents |
Kind code of ref document: A2 Designated state(s): BW GH GM KE LS MW MZ SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IT LU MC NL PT RO SE SI SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
WWE | Wipo information: entry into national phase |
Ref document number: 2004704224 Country of ref document: EP |
|
WWE | Wipo information: entry into national phase |
Ref document number: 11195350 Country of ref document: US |
|
WWE | Wipo information: entry into national phase |
Ref document number: 1020057014395 Country of ref document: KR |
|
WWP | Wipo information: published in national office |
Ref document number: 2004704224 Country of ref document: EP |
|
WWP | Wipo information: published in national office |
Ref document number: 1020057014395 Country of ref document: KR |
|
DPEN | Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed from 20040101) | ||
WWP | Wipo information: published in national office |
Ref document number: 11195350 Country of ref document: US |