WO2007116262A1 - Protection against side channel attacks - Google Patents
Protection against side channel attacks Download PDFInfo
- Publication number
- WO2007116262A1 WO2007116262A1 PCT/IB2007/000728 IB2007000728W WO2007116262A1 WO 2007116262 A1 WO2007116262 A1 WO 2007116262A1 IB 2007000728 W IB2007000728 W IB 2007000728W WO 2007116262 A1 WO2007116262 A1 WO 2007116262A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- masked
- cryptographic
- output
- msk
- var
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Ceased
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F7/00—Methods or arrangements for processing data by operating upon the order or content of the data handled
- G06F7/60—Methods or arrangements for performing computations using a digital non-denominational number representation, i.e. number representation without radix; Computing devices using combinations of denominational and non-denominational quantity representations, e.g. using difunction pulse trains, STEELE computers, phase computers
- G06F7/72—Methods or arrangements for performing computations using a digital non-denominational number representation, i.e. number representation without radix; Computing devices using combinations of denominational and non-denominational quantity representations, e.g. using difunction pulse trains, STEELE computers, phase computers using residue arithmetic
- G06F7/723—Modular exponentiation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/002—Countermeasures against attacks on cryptographic mechanisms
- H04L9/003—Countermeasures against attacks on cryptographic mechanisms for power analysis, e.g. differential power analysis [DPA] or simple power analysis [SPA]
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2207/00—Indexing scheme relating to methods or arrangements for processing data by operating upon the order or content of the data handled
- G06F2207/72—Indexing scheme relating to groups G06F7/72 - G06F7/729
- G06F2207/7219—Countermeasures against side channel or fault attacks
- G06F2207/7223—Randomisation as countermeasure against side channel attacks
- G06F2207/7233—Masking, e.g. (A**e)+r mod n
- G06F2207/7238—Operand masking, i.e. message blinding, e.g. (A+r)**e mod n; k.(P+R)
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/04—Masking or blinding
Definitions
- the invention relates to methods for protecting cryptographic devices against side channel attacks, and to cryptographic devices embedding such methods.
- cryptographic devices are devices implementing cryptographic mechanisms.
- Examples of cryptographic devices include smart cards, USB keys, dongles, Personal Digital Assistants (a.k.a PDAs), mobile phones, personal computers (a.k.a PCs), etc.
- Such cryptographic devices are used in particular for securing a user's electronic transactions.
- the expression "electronic transaction" is to be taken in its broadest meaning. I.E. it is not limited to financial transaction but also contain any Internet transaction, any transaction occurring through a telecommunication network etc.
- Securing electronic transactions may comprise the cryptographic mechanisms of digitally signing electronic documents, decrypting electronic documents, negotiating session keys with a third party and/or authenticating a user.
- the above four cryptographic mechanisms are well known in the art. They are not limitative (other cryptographic mechanisms exist), and not mandatory (for example a cryptographic device does not necessarily embed a digital signature mechanism).
- Cryptographic mechanisms have an input and an output.
- an encryption mechanism may have an input consisting of a plaintext and an output consisting of a ciphertext.
- an input consisting of a plaintext
- an output consisting of a ciphertext.
- side channel attacks rely on the fact that a cryptographic device has input and output means other than the legitimate input and output means.
- use of illegitimate input means may comprise altering cryptographic operations by heating the cryptographic device, by modifying its clock (e.g.
- illegitimate output means may comprise analyzing the power consumption of the cryptographic device (e.g. an electronic component requires more electric power to perform a complex operation such as "square and multiply” than it does for a simple operation such as "square only"), analyzing the electromagnetic field created by the cryptographic device, analyzing the sounds emitted by the cryptographic device, etc.
- Well-known side channel attacks include Simple Power Analysis (SPA), Differential Power Analysis (DPA) or Differential Fault Analysis (DFA).
- Cryptographic mechanisms consist of mechanisms involving at least a secret D which is supposed to be stored securely in a cryptographic device. D should not be leaked outside the cryptographic device through any attack.
- D can be represented in the form of an n-bit number (do, d-i, ... d n -i)2, where dj is a bit (for each integer i between 0 and n-1).
- the exponent D will be denoted ⁇ d 0 , d-i, ... d n- i ⁇ 2 instead of (do, d-i, ...
- a monoid (M, 1) is defined as an algebraic set, the set being closed under an associative binary operation 1, the set having an identity element. Contrary to a group, in a monoid every element does not necessarily have an inverse.
- the operation 1 can also be represented with other symbols. For example, the operation 1 can be represented as an additive operation (symbol +), as a multiplicative operation (symbol *), etc. This representation is purely formal and does not affect the properties of the monoid.
- monoids will be represented with the multiplicative operation *, and will be denoted ⁇ M, * ⁇ instead of (M, *) in order not to introduce any ambiguity with the reference signs placed in the claims between parentheses as per the European Patent Convention.
- Monoids are widespread in cryptography. The most widespread monoids in the field of cryptography are large monoids having many invertible elements, e.g. 2 80 invertible elements. For example, with the RSA algorithm, almost all elements are invertible (the exceptions being in particular the multiples of p and q).
- M * denotes the set containing all invertible elements of the set M of the monoid ⁇ M, * ⁇ .
- X 2 is called a squaring operation and stands for X*X.
- X n stands for X*X*... * X where X appears n times.
- Y*Z is called a multiplication operation.
- the invention improves the resistance of above-mentioned particularly sensitive cryptographic mechanisms to side channel attacks. Examples of such mechanisms include elliptic curve point multiplications, and modular exponentiations used when performing an RSA operation or a Diffie Hellman key establishment.
- the invention also limits the amount of processing required for securing the cryptographic mechanisms. It does so by introducing a particular type of masking mechanism (also known as blinding mechanism).
- Figure 2 represents a cryptographic mechanism with a first level of protection against side channel attacks, known in the art as the "balanced modular exponentiation algorithm”.
- Figure 3 represents a cryptographic mechanism with a second level of protection against side channel attacks, known in the art as "Joye & Al. modular exponentiation algorithm”.
- Figure 4 represents a possible masking mechanism for modular exponentiation.
- Figure 5 represents a preferred cryptographic mechanism according to the invention, offering a higher level of protection against side channel attacks.
- Figure 6 and Figure 7 represent variants of the mechanism of Figure 5.
- Figure 1 describes an example of cryptographic mechanism consisting of a modular exponentiation. This sort of modular exponentiations is implemented in particular with RSA and Diffie Hellman algorithms.
- step 2 for each bit dj of the exponent D, a modular squaring is performed (sub-step 2.i). When dj is equal to 1 , a modular multiplication is performed (sub-step 2. N). D is usually derived from a random number. In general, the hamming weight of D is approximately n/2. Therefore, in general the method of Figure 1 involves n modular squaring operations and around n/2 modular multiplications.
- this type of cryptographic mechanisms is extremely sensitive even to the simplest side channel attacks such as SPA. Indeed, the power consumption is not the same during the execution of the multiplication operation and of the squaring operation. Therefore, one can put a probe on the cryptographic device implementing the cryptographic mechanism, measure the power consumption, and distinguish the multiplication and the squaring in the power trace, thereby identifying the value of all bits dj. The exponent D is then recovered by the attacker.
- Figure 2 describes an example of cryptographic mechanism comprising a first level of protection against side channel attacks, known in the art as the "balanced modular exponentiation algorithm"
- This method is similar to the one of Figure 1 , except that when dj is equal to 0, a third step iii is added, in which a dummy multiplication is executed. Thanks to this third step, the power consumption is very close whether the bit is equal to 0 or to 1.
- this method remains very sensitive to another side channel attack known as the SE attack (safe error attack). Indeed, if the cryptographic mechanism is disrupted during a dummy multiplication, the multiplication fails, but the final result remains unaffected since the dummy multiplication is not used for the final result. Therefore an attacker can find out the dummy bits, which are bits equal to 0 in this example, and infer that all other bits are equal to 1 , which results in the secret value of D being recovered.
- SE attack safety error attack
- Figure 3 describes an example of known cryptographic mechanism comprising a second level of protection against side channel attacks, known in the art as "Joye & Al. modular exponentiation algorithm", and disclosed at CHES 2002 by Joye and Yen. It is based on the Montgomery Ladder algorithm.
- the cryptographic mechanism of Figure 3 aims at overcoming the limitation of the cryptographic mechanism of Figure 2. To this end, there is no more dummy operation. Instead, The result of all multiplications is used in the final result (except in the last round). Therefore disturbing the mechanism always leads to an erroneous output.
- the masking may consist in multiplying the input element with a random number, thereby rendering the prediction step of the DPA attacks impossible.
- the technique shown on Figure 4 requires approximately 4*n operations, which makes it twice slower than previous techniques.
- the technique shown on Figure 4 also performs the modular exponentiation twice. A first time for the masked input, and another time for the mask used for the masking. Due to this double modular exponentiation, the secret exponent D is used twice, which potentially weakens the mechanism.
- a cryptographic mechanism involves a secret D which can be represented as an n-bit number ⁇ d 0 , di, ... d n- i ⁇ 2-
- the cryptographic mechanism is arranged to calculate an output element OUT equal to X D , X being an element of a monoid ⁇ M, * ⁇ .
- the mechanism comprises a first variable VAR 0 and a second variable VARi.
- the cryptographic mechanism comprises n steps
- Each step SQi is executed after the step MULj for any i between 0 and n-1
- each step MULM is executed after step MULj for any i between 1 and n-1.
- the mechanism is characterized in that it comprises the steps of: a. generating a random element MSKJNPUT, b.
- step d occurs at any time between step a and step e, and wherein the steps a, b, c, e are consecutive.
- the computation of the output mask can take place together with the computation of the masked output element.
- this computation can also take place serially (either after, as shown on step 4 of the figure, or before). It is also possible to perform this computation in parallel, for example inside two different threads, as depicted on Figure 7 (CF. steps 3a and 3b).
- the DPA attack is no longer applicable, as the attacker does not know the mask and does not have the possibility to make assumptions regarding the intermediate results.
- the element X can be an input element supplied to the cryptographic mechanism by another mechanism, or can be generated inside the cryptographic mechanism.
- the current time may be determined securely inside the mechanism and then digitally signed inside the mechanism.
- the output element OUT can be communicated by the cryptographic mechanism to another mechanism, can be kept internally in the cryptographic mechanism, or can be post-processed in the cryptographic mechanism and sent to another mechanism in the post-processed form.
- the cryptographic mechanism according to the invention is such that the random element MSKJNPUT belongs to M * (the set of invertible elements of M, as seen above).
- MSKJNPUT is equal to a value R, we denote by R "1 the inverse of R for the operation * of the monoid ⁇ M, * ⁇ .
- R the inverse of R for the operation * of the monoid ⁇ M, * ⁇ .
- This is advantageous in particular for mechanisms associated with a function g such that the computation of the function g may be executed by involving the steps R_SQj. More specifically, in a preferred mechanism according to the invention,
- the masked element MASKED_X is equal to X*R and the output element OUT is equal to MASKED_OUT*MSK 0 , MSK n being equal to R "1 , the initial value of the first variable VAR 0 being set to the value R of the random element, the initial value of the second variable VARi being set to the value of the masked element MASKED_X, each step MULj consisting in calculating VAR 1 -(ZVARdI and storing the result in VAR-i-di, each step SQi consisting in calculating VARd * VARdi and storing the result in VAR d ⁇ .
- Figure 5 describes an example of such preferred embodiment of the invention comprising:
- a first step in which a random number is generated This can be done for example by a hardware random number generator embedded in a cryptographic device implementing the cryptographic mechanism. Indeed, the random number is preferably as unpredictable as possible, which is best achieved with hardware means as known in the art;
- the cryptographic mechanism uses the element X and the secret D as inputs.
- the secret D is stored securely and therefore does not need to be passed to the cryptographic mechanism each time the cryptographic mechanism is invoked.
- the element X is generally passed to the cryptographic mechanism as an input parameter, but may also be determined by the cryptographic mechanism itself (e.g. as seen above with time stamps based on a clock available in the cryptographic mechanism, etc.).
- the invention also concerns a cryptographic device storing a secret D and implementing a cryptographic mechanism as described above.
- the invention concerns more particularly cryptographic devices of the smart card type.
- the invention is particularly advantageous for embedded systems such as smart cards as it has very few additional requirements compared to state of the art cryptographic mechanisms. It is well suited to the RSA algorithm. Indeed, it does not require any additional information on the key material compared to traditional cryptographic mechanisms. In particular, it does not require the public exponent of the RSA key pair to be available to the cryptographic mechanism.
- the complexity of the preferred embodiment of Figure 5 involves approximately 2*n square operations and n multiplications, i.e. around 3*n CPU intensive operations, which is only 50% more than the closest method (Montgomery ladder of Figure 3), and does not require much more RAM (50% at most).
- This situation corresponds to a weak output mask, since it is equivalent to not having an output mask (the masked output and the output are equal).
- This weakness is hard to exploit, and is very unlikely to happen.
- the probability of a random element leading to a weak mask is very low. For example, it is estimated that for RSA 2048, the probability of picking a weak random element is at most equal to 1.9*10 '7 .
- the probability depends on the value of the RSA key, and in practice it is often much lower than the above value.
- the probability can be made arbitrarily small by picking several invertible random elements and multiplying them together (only if all elements are weak will the product of the elements be weak).
Landscapes
- Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Pure & Applied Mathematics (AREA)
- Computational Mathematics (AREA)
- Mathematical Analysis (AREA)
- Mathematical Optimization (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Computing Systems (AREA)
- Mathematical Physics (AREA)
- General Engineering & Computer Science (AREA)
- Storage Device Security (AREA)
Priority Applications (3)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US12/282,210 US8402287B2 (en) | 2006-03-31 | 2007-03-23 | Protection against side channel attacks |
| EP07734060A EP2002331A1 (en) | 2006-03-31 | 2007-03-23 | Protection against side channel attacks |
| JP2009502237A JP5412274B2 (ja) | 2006-03-31 | 2007-03-23 | サイドチャネル攻撃からの保護 |
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| EP06300320A EP1840732A1 (en) | 2006-03-31 | 2006-03-31 | Protection against side channel attacks |
| EP06300320.6 | 2006-03-31 |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| WO2007116262A1 true WO2007116262A1 (en) | 2007-10-18 |
Family
ID=36688104
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| PCT/IB2007/000728 Ceased WO2007116262A1 (en) | 2006-03-31 | 2007-03-23 | Protection against side channel attacks |
Country Status (4)
| Country | Link |
|---|---|
| US (1) | US8402287B2 (enExample) |
| EP (2) | EP1840732A1 (enExample) |
| JP (1) | JP5412274B2 (enExample) |
| WO (1) | WO2007116262A1 (enExample) |
Families Citing this family (38)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| FR2895609A1 (fr) * | 2005-12-26 | 2007-06-29 | Gemplus Sa | Procede cryptographique comprenant une exponentiation modulaire securisee contre les attaques a canaux caches, cryptoprocesseur pour la mise en oeuvre du procede et carte a puce associee |
| US8091139B2 (en) * | 2007-11-01 | 2012-01-03 | Discretix Technologies Ltd. | System and method for masking arbitrary Boolean functions |
| FR2926652B1 (fr) * | 2008-01-23 | 2010-06-18 | Inside Contactless | Procede et dispositifs de contre-mesure pour cryptographie asymetrique a schema de signature |
| FR2972064B1 (fr) * | 2011-02-25 | 2013-03-15 | Inside Secure | Procede de cryptographie comprenant une operation d'exponentiation |
| EP2523096A1 (en) * | 2011-05-11 | 2012-11-14 | Thomson Licensing | Modular exponentiation and device resistant against side-channel attacks |
| FR2977952A1 (fr) * | 2011-07-13 | 2013-01-18 | St Microelectronics Rousset | Protection d'un calcul d'exponentiation modulaire par multiplication par une quantite aleatoire |
| FR2977953A1 (fr) * | 2011-07-13 | 2013-01-18 | St Microelectronics Rousset | Protection d'un calcul d'exponentiation modulaire par addition d'une quantite aleatoire |
| US8799343B2 (en) | 2011-09-22 | 2014-08-05 | Intel Corporation | Modular exponentiation with partitioned and scattered storage of Montgomery Multiplication results |
| WO2013172913A2 (en) | 2012-03-07 | 2013-11-21 | The Trustees Of Columbia University In The City Of New York | Systems and methods to counter side channels attacks |
| US8459545B1 (en) * | 2012-03-29 | 2013-06-11 | Cisco Technology, Inc. | Image-based point-of-sale mobile settlement system |
| US8972715B2 (en) * | 2012-07-13 | 2015-03-03 | Securerf Corporation | Cryptographic hash function |
| US10148285B1 (en) | 2012-07-25 | 2018-12-04 | Erich Schmitt | Abstraction and de-abstraction of a digital data stream |
| CN103138917B (zh) * | 2013-01-25 | 2016-03-09 | 国家密码管理局商用密码检测中心 | 以s盒输入为基础的汉明距离模型进行sm4密码算法侧信道能量分析方法 |
| CN103166752B (zh) * | 2013-01-25 | 2016-04-27 | 国家密码管理局商用密码检测中心 | 选择轮函数为攻击对象进行sm4密码算法侧信道能量分析的应用 |
| US9959429B2 (en) | 2013-03-15 | 2018-05-01 | Cryptography Research, Inc. | Asymmetrically masked multiplication |
| FR3010210B1 (fr) * | 2013-08-29 | 2017-01-13 | Stmicroelectronics Rousset | Protection d'un calcul contre des attaques par canaux caches |
| CN103546277B (zh) * | 2013-09-25 | 2016-08-31 | 北京握奇数据系统有限公司 | 一种智能卡sm4算法的dpa攻击与密钥还原方法及系统 |
| EP2884387B1 (en) * | 2013-12-13 | 2016-09-14 | Thomson Licensing | Efficient modular addition resistant to side-channel attacks |
| US10795858B1 (en) | 2014-02-18 | 2020-10-06 | Erich Schmitt | Universal abstraction and de-abstraction of a digital data stream |
| US9871651B2 (en) * | 2014-06-16 | 2018-01-16 | Cisco Technology, Inc. | Differential power analysis countermeasures |
| US9590805B1 (en) * | 2014-12-23 | 2017-03-07 | EMC IP Holding Company LLC | Ladder-based cryptographic techniques using pre-computed points |
| CN104753665B (zh) * | 2015-03-19 | 2018-04-06 | 成都信息工程学院 | 一种针对sm4密码轮函数输出的侧信道能量攻击方法 |
| CN104753668B (zh) * | 2015-03-19 | 2018-04-13 | 成都信息工程学院 | 一种针对sm4密码线性变换输出的侧信道能量攻击方法 |
| US10063569B2 (en) * | 2015-03-24 | 2018-08-28 | Intel Corporation | Custom protection against side channel attacks |
| EP3217307B1 (en) * | 2016-02-22 | 2018-11-07 | Eshard | Method of testing the resistance of a circuit to a side channel analysis of second order or more |
| FR3055436A1 (fr) | 2016-08-23 | 2018-03-02 | Stmicroelectronics (Rousset) Sas | Protection d'un calcul modulaire |
| FR3055437A1 (fr) | 2016-08-23 | 2018-03-02 | Stmicroelectronics (Rousset) Sas | Protection d'un calcul d'exponentiation modulaire |
| US10153035B2 (en) * | 2016-10-07 | 2018-12-11 | Taiwan Semiconductor Manufacturing Co., Ltd. | SRAM-based authentication circuit |
| DE102017002153A1 (de) * | 2017-03-06 | 2018-09-06 | Giesecke+Devrient Mobile Security Gmbh | Übergang von einer booleschen Maskierung zu einer arithmetischen Maskierung |
| FR3069671A1 (fr) * | 2017-07-25 | 2019-02-01 | Stmicroelectronics (Rousset) Sas | Protection d'un calcul iteratif contre des attaques horizontales |
| WO2019079048A1 (en) | 2017-10-18 | 2019-04-25 | Cryptography Research, Inc. | PROTECTION OF A MODULAR INVERSION OPERATION AGAINST EXTERNAL SURVEILLANCE ATTACKS |
| EP3579493A1 (fr) * | 2018-06-08 | 2019-12-11 | STMicroelectronics (Rousset) SAS | Protection d'un calcul itératif |
| EP3579492A1 (fr) | 2018-06-08 | 2019-12-11 | STMicroelectronics (Rousset) SAS | Protection d'un calcul itératif |
| KR102653018B1 (ko) | 2019-01-16 | 2024-03-29 | 삼성전자주식회사 | 랜덤 넘버를 이용하여 나머지 연산을 수행하는 보안 프로세서 및 이의 동작 방법 |
| FR3094522B1 (fr) | 2019-03-29 | 2021-11-19 | St Microelectronics Rousset | Protection d’un calcul itératif |
| CN111062064B (zh) * | 2019-12-24 | 2021-11-02 | 飞天诚信科技股份有限公司 | 一种加密u盘系统的实现方法及系统 |
| US12483429B2 (en) * | 2021-06-01 | 2025-11-25 | Attopsemi Technology Co., Ltd | Physically unclonable function produced using OTP memory |
| FR3134909B1 (fr) * | 2022-04-25 | 2024-06-21 | Commissariat Energie Atomique | Protection contre les attaques par canal auxiliaire a l’aide d’un masquage carre |
Citations (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| WO2004070497A2 (de) * | 2003-02-04 | 2004-08-19 | Infineon Technologies Ag | Modulare exponentiation mit randomisierten exponenten |
| US20040267859A1 (en) * | 2001-10-17 | 2004-12-30 | Infineon Technologies Ag | Method and device for calculating a result of an exponentiation |
| US20050084098A1 (en) * | 2003-09-18 | 2005-04-21 | Brickell Ernie F. | Method of obscuring cryptographic computations |
Family Cites Families (14)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CA2252078C (en) * | 1998-10-28 | 2009-02-17 | Certicom Corp. | Power signature attack resistant cryptographic system |
| JP4317607B2 (ja) * | 1998-12-14 | 2009-08-19 | 株式会社日立製作所 | 情報処理装置、耐タンパ処理装置 |
| JP2000305453A (ja) * | 1999-04-21 | 2000-11-02 | Nec Corp | 暗号化装置,復号装置,および暗号化・復号装置 |
| JP2002247025A (ja) * | 2001-02-22 | 2002-08-30 | Hitachi Ltd | 情報処理装置 |
| JP4596686B2 (ja) * | 2001-06-13 | 2010-12-08 | 富士通株式会社 | Dpaに対して安全な暗号化 |
| JP2003216026A (ja) * | 2002-01-18 | 2003-07-30 | Sony Corp | 楕円曲線暗号処理方法および楕円曲線暗号処理装置、並びにコンピュータ・プログラム |
| JP2003241659A (ja) * | 2002-02-22 | 2003-08-29 | Hitachi Ltd | 情報処理方法 |
| JP2004163687A (ja) * | 2002-11-13 | 2004-06-10 | Fujitsu Ltd | 楕円曲線暗号装置、楕円曲線暗号プログラム |
| JP4789468B2 (ja) * | 2002-12-18 | 2011-10-12 | 富士通株式会社 | 秘密鍵を用いた耐タンパ楕円曲線暗号処理 |
| AU2003304629A1 (en) * | 2003-07-22 | 2005-02-04 | Fujitsu Limited | Tamper-resistant encryption using individual key |
| EP1653428B1 (en) * | 2003-08-06 | 2012-08-15 | Fujitsu Limited | Elliptic curve encrypting device, elliptic curve encrypting method, elliptic curve encrypting program and computer-readable recording medium recording that program |
| JP4271077B2 (ja) * | 2004-04-30 | 2009-06-03 | 株式会社東芝 | マスク論理回路及び暗号装置 |
| US20070150530A1 (en) * | 2005-12-13 | 2007-06-28 | Intel Corporation | Resisting cache timing based attacks |
| KR100874909B1 (ko) * | 2006-01-14 | 2008-12-19 | 삼성전자주식회사 | Dfa에 대항하는 몽고메리 전력 래더 알고리즘을 사용하는 암호화 방법 |
-
2006
- 2006-03-31 EP EP06300320A patent/EP1840732A1/en not_active Withdrawn
-
2007
- 2007-03-23 US US12/282,210 patent/US8402287B2/en not_active Expired - Fee Related
- 2007-03-23 EP EP07734060A patent/EP2002331A1/en not_active Withdrawn
- 2007-03-23 WO PCT/IB2007/000728 patent/WO2007116262A1/en not_active Ceased
- 2007-03-23 JP JP2009502237A patent/JP5412274B2/ja not_active Expired - Fee Related
Patent Citations (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20040267859A1 (en) * | 2001-10-17 | 2004-12-30 | Infineon Technologies Ag | Method and device for calculating a result of an exponentiation |
| WO2004070497A2 (de) * | 2003-02-04 | 2004-08-19 | Infineon Technologies Ag | Modulare exponentiation mit randomisierten exponenten |
| US20050084098A1 (en) * | 2003-09-18 | 2005-04-21 | Brickell Ernie F. | Method of obscuring cryptographic computations |
Non-Patent Citations (3)
| Title |
|---|
| JOYE M ET AL: "THE MONTGOMERY POWERING LADDER", CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS. INTERNATIONAL WORKSHOP, 13 August 2002 (2002-08-13), pages 291 - 302, XP001160513 * |
| SUNG-MING YEN ET AL: "Improvement on Ha-Moon Randomized Exponentiation Algorithm", SPRINGER VERLAG BERLIN HEIDELBERG 2005, 2005, pages 154 - 167, XP019010693 * |
| TRICHINA E ET AL: "IMPLEMENTATION OF ELLIPTIC CURVE CRYPTOGRAPHY WITH BUILT-IN COUNTER MEASURES AGAINST SIDE CHANNEL ATTACKS", CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS. INTERNATIONAL WORKSHOP, 13 August 2002 (2002-08-13), pages 98 - 113, XP001160524 * |
Also Published As
| Publication number | Publication date |
|---|---|
| JP2009537025A (ja) | 2009-10-22 |
| EP2002331A1 (en) | 2008-12-17 |
| EP1840732A1 (en) | 2007-10-03 |
| JP5412274B2 (ja) | 2014-02-12 |
| US8402287B2 (en) | 2013-03-19 |
| US20090092245A1 (en) | 2009-04-09 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US8402287B2 (en) | Protection against side channel attacks | |
| Yen et al. | Power analysis by exploiting chosen message and internal collisions–vulnerability of checking mechanism for RSA-decryption | |
| CN107040362B (zh) | 模乘设备和方法 | |
| Amiel et al. | Power analysis for secret recovering and reverse engineering of public key algorithms | |
| EP2332040B1 (en) | Countermeasure securing exponentiation based cryptography | |
| EP2005291A2 (en) | Decryption method | |
| WO2017191288A1 (en) | Countermeasure to safe-error fault injection attacks on cryptographic exponentiation algorithms | |
| JP4668931B2 (ja) | 電力解析攻撃に対する耐タンパ性を持った暗号化処理装置 | |
| KR20100113130A (ko) | 비대칭 암호화를 위한 대응조치 방법 및 디바이스 | |
| JP2010164904A (ja) | 楕円曲線演算処理装置、楕円曲線演算処理プログラム及び方法 | |
| JP2004304800A (ja) | データ処理装置におけるサイドチャネル攻撃防止 | |
| EP3503459B1 (en) | Device and method for protecting execution of a cryptographic operation | |
| CN110048840B (zh) | 一种基于rsa算法的信息处理方法、系统及相关组件 | |
| Kim et al. | Message blinding method requiring no multiplicative inversion for RSA | |
| Ha et al. | Power Analysis Attacks on the Right-to-Left Square-Always Exponentiation Algorithm. | |
| Herbst et al. | Using templates to attack masked montgomery ladder implementations of modular exponentiation | |
| Park et al. | An improved side channel attack using event information of subtraction | |
| KR100772550B1 (ko) | 전력분석공격에 안전한 메시지 블라인딩 방법 | |
| He | Highly secure cryptographic computations against side-channel attacks | |
| Walter et al. | Data dependent power use in multipliers | |
| Monfared et al. | Secure and efficient exponentiation architectures using Gaussian normal basis | |
| Navarro-Torrero et al. | A Side-Channel Protected and High-Performance Hardware Implementation for EdDSA25519 | |
| Fournaris et al. | Efficient crt rsa with sca countermeasures | |
| Kim et al. | A New Exponentiation Algorithm Resistant to Combined Side Channel Attack. | |
| Devi et al. | A Review on Different Types of Attacks on RSA and ECC |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| 121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 07734060 Country of ref document: EP Kind code of ref document: A1 |
|
| WWE | Wipo information: entry into national phase |
Ref document number: 2007734060 Country of ref document: EP |
|
| WWE | Wipo information: entry into national phase |
Ref document number: 12282210 Country of ref document: US |
|
| WWE | Wipo information: entry into national phase |
Ref document number: 2009502237 Country of ref document: JP |
|
| NENP | Non-entry into the national phase |
Ref country code: DE |