ZA200202798B - Method for making data processing resistant to extraction of data by analysis of unintended side-channel signals. - Google Patents
Method for making data processing resistant to extraction of data by analysis of unintended side-channel signals.Info
- Publication number
- ZA200202798B ZA200202798B ZA200202798A ZA200202798A ZA200202798B ZA 200202798 B ZA200202798 B ZA 200202798B ZA 200202798 A ZA200202798 A ZA 200202798A ZA 200202798 A ZA200202798 A ZA 200202798A ZA 200202798 B ZA200202798 B ZA 200202798B
- Authority
- ZA
- South Africa
- Prior art keywords
- extraction
- analysis
- channel signals
- data
- data processing
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F7/00—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
- G07F7/08—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
- G07F7/10—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data
- G07F7/1008—Active credit-cards provided with means to personalise their use, e.g. with PIN-introduction/comparison system
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/75—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information by inhibiting the analysis of circuitry or operation
- G06F21/755—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information by inhibiting the analysis of circuitry or operation with measures against power attack
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/34—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
- G06Q20/341—Active cards, i.e. cards including their own processing means, e.g. including an IC or chip
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F7/00—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
- G07F7/08—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
- G07F7/0806—Details of the card
- G07F7/0813—Specific details related to card security
- G07F7/082—Features insuring the integrity of the data on or in the card
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F7/00—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
- G07F7/08—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
- G07F7/0806—Details of the card
- G07F7/0833—Card having specific functional components
- G07F7/084—Additional components relating to data transfer and storing, e.g. error detection, self-diagnosis
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F7/00—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
- G07F7/08—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
- G07F7/10—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data
- G07F7/1025—Identification of user by a PIN code
- G07F7/1083—Counting of PIN attempts
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/002—Countermeasures against attacks on cryptographic mechanisms
- H04L9/003—Countermeasures against attacks on cryptographic mechanisms for power analysis, e.g. differential power analysis [DPA] or simple power analysis [SPA]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0618—Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
- H04L9/0625—Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation with splitting of the data block into left and right halves, e.g. Feistel based algorithms, DES, FEAL, IDEA or KASUMI
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2207/00—Indexing scheme relating to methods or arrangements for processing data by operating upon the order or content of the data handled
- G06F2207/72—Indexing scheme relating to groups G06F7/72 - G06F7/729
- G06F2207/7219—Countermeasures against side channel or fault attacks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/16—Obfuscation or hiding, e.g. involving white box
Landscapes
- Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- Computer Security & Cryptography (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Computer Hardware Design (AREA)
- Signal Processing (AREA)
- Business, Economics & Management (AREA)
- Software Systems (AREA)
- General Engineering & Computer Science (AREA)
- Mathematical Physics (AREA)
- Microelectronics & Electronic Packaging (AREA)
- Accounting & Taxation (AREA)
- Strategic Management (AREA)
- General Business, Economics & Management (AREA)
- Storage Device Security (AREA)
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US16104799P | 1999-10-25 | 1999-10-25 |
Publications (1)
Publication Number | Publication Date |
---|---|
ZA200202798B true ZA200202798B (en) | 2003-09-23 |
Family
ID=22579586
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
ZA200202798A ZA200202798B (en) | 1999-10-25 | 2002-04-10 | Method for making data processing resistant to extraction of data by analysis of unintended side-channel signals. |
Country Status (8)
Country | Link |
---|---|
EP (1) | EP1226681A2 (en) |
JP (1) | JP2003513490A (en) |
CN (1) | CN1413398A (en) |
AU (1) | AU773982B2 (en) |
CA (1) | CA2388971A1 (en) |
EA (1) | EA003874B1 (en) |
WO (1) | WO2001031422A2 (en) |
ZA (1) | ZA200202798B (en) |
Families Citing this family (21)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7142670B2 (en) * | 2001-08-14 | 2006-11-28 | International Business Machines Corporation | Space-efficient, side-channel attack resistant table lookups |
WO2003075506A1 (en) * | 2002-03-07 | 2003-09-12 | Axalto Sa | Method for making safe an electronic cryptography assembly with a secret key |
FR2842376B1 (en) * | 2002-07-10 | 2004-09-24 | Somfy | SELECTIVE COMMUNICATION BETWEEN OBJECTS |
EP1457858A1 (en) * | 2003-03-14 | 2004-09-15 | SCHLUMBERGER Systèmes | Method for securing an electronic system comprising a cryptoprocessor |
DE10341096A1 (en) * | 2003-09-05 | 2005-03-31 | Giesecke & Devrient Gmbh | Transition between masked representations of a value in cryptographic calculations |
WO2005057927A1 (en) * | 2003-11-13 | 2005-06-23 | Magiq Technologies, Inc | Qkd with classical bit encryption |
KR101061906B1 (en) * | 2004-02-19 | 2011-09-02 | 삼성전자주식회사 | Basic Computing Device and Method Safe for Power Analysis Attack |
EP1596278A1 (en) * | 2004-05-11 | 2005-11-16 | Axalto SA | Method to protect a cryptographic unit through homographic masking |
FR2873523B1 (en) * | 2004-07-22 | 2007-08-10 | Sagem | METHOD AND DEVICE FOR PERFORMING A CRYPTOGRAPHIC CALCULATION |
DE102004043243A1 (en) * | 2004-09-07 | 2006-03-23 | Comvenient Gmbh & Co. Kg | Method for protecting keys |
EP1646174A1 (en) * | 2004-10-07 | 2006-04-12 | Axalto SA | Method and apparatus for generating cryptographic sets of instructions automatically and code generation |
JP5026275B2 (en) * | 2004-10-28 | 2012-09-12 | イルデト・コーポレート・ビー・ヴイ | Method and system for obfuscating cryptographic functions |
JP2008181225A (en) * | 2007-01-23 | 2008-08-07 | Toshiba Corp | Ic card |
US9710623B2 (en) | 2008-03-05 | 2017-07-18 | Irdeto B.V. | Cryptographic system |
EP2525298B1 (en) * | 2011-05-17 | 2016-07-13 | Nxp B.V. | Authentication method |
EP2620890A1 (en) * | 2012-01-25 | 2013-07-31 | Gemalto SA | Method for detecting a fault injected in hardware registers of an electronic device |
DE102012018924A1 (en) | 2012-09-25 | 2014-03-27 | Giesecke & Devrient Gmbh | Side channel protected masking |
US9009495B2 (en) | 2013-06-28 | 2015-04-14 | Envieta, LLC | High speed cryptographic combining system, and method for programmable logic devices |
JP6264935B2 (en) * | 2014-02-24 | 2018-01-24 | 大日本印刷株式会社 | Authentication method for information processing apparatus |
CN104104587B (en) * | 2014-04-18 | 2017-12-26 | 天津大学 | A kind of rear uniformity analysis method of certified mail protocols |
CN105757878B (en) * | 2016-02-19 | 2018-07-27 | 广东美的暖通设备有限公司 | The encoding and decoding method, apparatus and air conditioner of communication data |
-
2000
- 2000-10-19 CA CA002388971A patent/CA2388971A1/en not_active Abandoned
- 2000-10-19 JP JP2001533494A patent/JP2003513490A/en active Pending
- 2000-10-19 WO PCT/ZA2000/000192 patent/WO2001031422A2/en active Search and Examination
- 2000-10-19 EP EP00986837A patent/EP1226681A2/en not_active Withdrawn
- 2000-10-19 CN CN00817503A patent/CN1413398A/en active Pending
- 2000-10-19 EA EA200200468A patent/EA003874B1/en not_active IP Right Cessation
- 2000-10-19 AU AU23014/01A patent/AU773982B2/en not_active Ceased
-
2002
- 2002-04-10 ZA ZA200202798A patent/ZA200202798B/en unknown
Also Published As
Publication number | Publication date |
---|---|
AU2301401A (en) | 2001-05-08 |
EP1226681A2 (en) | 2002-07-31 |
WO2001031422A3 (en) | 2001-12-13 |
JP2003513490A (en) | 2003-04-08 |
EA200200468A1 (en) | 2002-10-31 |
WO2001031422A2 (en) | 2001-05-03 |
EA003874B1 (en) | 2003-10-30 |
WO2001031422B1 (en) | 2002-01-10 |
AU773982B2 (en) | 2004-06-10 |
CN1413398A (en) | 2003-04-23 |
CA2388971A1 (en) | 2001-05-03 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
ZA200202798B (en) | Method for making data processing resistant to extraction of data by analysis of unintended side-channel signals. | |
MXPA02006145A (en) | Method for isolation of rna from formalinfixed paraffinembedded tissue specimens. | |
AU2001247883A1 (en) | Seismic data processing method | |
HK1046742A1 (en) | Data processing method | |
AU4482800A (en) | Fast extraction of counts from sparse data | |
PT1316620E (en) | Process for pre-hydrolysis of biomass | |
AUPQ045699A0 (en) | An improved method for heap leaching of chalcopyrite | |
ZA200001377B (en) | Method for refining (meth) acrylic acid. | |
AU2002232919A1 (en) | Method for treating fibrotic diseases or other indications | |
AU2001264141A1 (en) | Method of extracting a signal | |
AU2001253838A1 (en) | Apparatus, system, and method for extracting an optical clock signal from an optical data signal | |
ZA997012B (en) | Process for processing sucrose into glucose. | |
AU2003292178A1 (en) | A method of entering of data into a data processing system | |
HK1043345B (en) | A method for entering letters of an alphabet using a computer | |
AU2002215480A1 (en) | System and method for designing, synthesizing and analyzing computer generated mechanisms | |
MXPA03008286A (en) | Method for processing content data. | |
AU2001262152A1 (en) | Method for extracting nucleic acids | |
AU2001273392A1 (en) | Method of detecting an increased susceptibility to breast cancer | |
AU2001288531A1 (en) | System and method of extracting data from vending machines | |
NO331142B1 (en) | Process for refining a solid precious metal-containing concentrate. | |
AU2001266212A1 (en) | Method for dna extraction | |
EG25192A (en) | Method of extracting iron-oxides. | |
WO2002062980A8 (en) | Process for the extraction of beta-amylase | |
ZA200100359B (en) | Process for the removal of dissolved oxygen from phenol. | |
PL325594A1 (en) | Method of obtaining an extract from valnut /junglans regia l./ cores |