[go: up one dir, main page]

CN101569131A - 密钥保护机制 - Google Patents

密钥保护机制 Download PDF

Info

Publication number
CN101569131A
CN101569131A CNA2007800476637A CN200780047663A CN101569131A CN 101569131 A CN101569131 A CN 101569131A CN A2007800476637 A CNA2007800476637 A CN A2007800476637A CN 200780047663 A CN200780047663 A CN 200780047663A CN 101569131 A CN101569131 A CN 101569131A
Authority
CN
China
Prior art keywords
key
masked
result
encryption
masking
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CNA2007800476637A
Other languages
English (en)
Other versions
CN101569131B (zh
Inventor
米歇尔·杜盖
文森特·杜帕丘斯
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Rumbas
Original Assignee
Atmel Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Atmel Corp filed Critical Atmel Corp
Publication of CN101569131A publication Critical patent/CN101569131A/zh
Application granted granted Critical
Publication of CN101569131B publication Critical patent/CN101569131B/zh
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/065Encryption by serially and continuously modifying data stream elements, e.g. stream cipher systems, RC4, SEAL or A5/3
    • H04L9/0656Pseudorandom key sequence combined element-for-element with data sequence, e.g. one-time-pad [OTP] or Vernam's cipher
    • H04L9/0662Pseudorandom key sequence combined element-for-element with data sequence, e.g. one-time-pad [OTP] or Vernam's cipher with particular pseudorandom sequence generator
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/002Countermeasures against attacks on cryptographic mechanisms
    • H04L9/004Countermeasures against attacks on cryptographic mechanisms for fault attacks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/04Masking or blinding
    • H04L2209/046Masking or blinding of operations, operands or results of the operations
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/12Details relating to cryptographic hardware or logic circuitry
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/34Encoding or coding, e.g. Huffman coding or error correction

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Storage Device Security (AREA)

Abstract

本发明揭示一种保护硬件密码系统中的私密密钥完整性的方法,所述方法包含:首先使用所述私密密钥获得已知数据的加密结果(13)及对应的检验和(14);保存所述结果;接着掩蔽所述私密密钥(16、17);及存储所述经掩蔽的密钥(18)。当将要在密码应用中使用所述经掩蔽的密钥时,所述方法通过使用所述经掩蔽的密钥对先前的加密结果进行解密(19)来检验密钥在故障攻击下的完整性。如果根据比较(20),解密结果等于有效数据(通过),则所述密钥在所述密码系统中的使用可继续。否则(未通过),从所述系统中抹去与所述经掩蔽的密钥相关的所有数据并用旗标来表示故障注入(21)。

Description

密钥保护机制
技术领域
本发明涉及可抵抗差分故障分析或故障注入攻击以保护私密密钥的完整性的密码系统。
背景技术
当使用基于私密密钥的算法时,可需要一种故障注入保护机制。这一机制是一种用以保护私密密钥免遭与密钥操纵相关的差分故障分析的安全方式。差分故障分析是一种为提取密码密钥信息而强加瞬间硬件故障及所导致的计算错误(例如在密钥调度算法或最后加密循环的执行期间)的密码攻击。此故障分析可适用于公共密钥及私密密钥密码系统两者,其中包含智能卡上的防窜改装置。例如,伊莱比哈姆(Eli Biham)及艾迪沙米尔(Adi Shamir)在Advances in Cryptology(密码术提高)-CRYPTO′97,LNCS 1294,pp.513-525(斯普林格出版社(Springer-Verlag),1997)的“DifferentialFault Analysis of Secret Key Cryptosystems(私密密钥密码系统的差分故障分析)”中描述了对DES类密码的差分故障分析攻击。
当前可用的保护机制是离线实施的,且不适于所有应用。例如,现有机制不会向按需要产生而非提前产生的会话密钥提供保护。
哈该巴尔(Hagai Bar-El)等人在2004年6月30日的意大利佛罗伦萨(FlorenceItaly)密码术故障检测与容差研讨会上发布的Discretix Technologies White Paper(迪斯克莱提斯科技白皮书)“The Sorcerer′s Apprentice Guide to Fault Attacks(故障攻击巫师之徒指南)”(密码术数字印刷档案(eprint.iacr.org)报告2004/100;同样,引文检索引擎(CiteSeer)论文705084)中描述了对电子密码电路实施此类故障攻击的各种方法且建议了若干对策。所述对策主要包括在假定不可重复相同故障的情况下引入冗余,其中重新计算操作且比较结果。承认所得的系统较慢且不太有效,但仍视其为安全成本的部分。
因此需寻求用于保护私密密钥完整性的更有效对策。
发明内容
本发明是一种在密码应用中使用私密密钥之前验证所述私密密钥的完整性的密码方法。特定来说,在随后以经掩蔽的密钥对使用原始未掩蔽的密钥而获得的加密结果进行解密时,将所述结果的检验和用作有效数据的验证签名。
保护硬件密码系统(否则其会遭受故障攻击)中私密密钥完整性的方法包括:使用所述私密密钥来获得及保存来自已知数据的加密结果以及所述加密结果的检验和,且接着掩蔽所述私密密钥。当随后在密码应用中使用经掩蔽的密钥时,首先检验所述密钥的完整性。特定来说,使用所述经掩蔽的密钥将所保存的加密结果解密。如果在比较时发现所述解密结果不等于有效数据,则未通过完整性检验,从系统中抹去与经掩蔽的密钥相关的所有数据且用旗标来表示故障注入。如果解密结果确实等于有效数据,则所述经掩蔽的密钥的完整性已得以证实且可用于密码系统中。
附图说明
图1是根据本发明的密钥保护方法的例示性实施例的流程图。
具体实施方式
本发明的密钥保护方法可操作的例示性硬件环境可包含:硬件随机数产生器(RNG)、用于受保护密钥存储的随机存取存储器(RAM)或非易失性存储器(例如快闪EPROM)、微处理器或微控制器及用以存储程序的某一存储器。另外,所述硬件还有可能包含用于计算基于私密密钥的算法(DES、AES等)的硬件协处理器。这一协处理器(如果存在)将处置基于“异或”的密钥去掩蔽机制:
Real_Key:=Masked_Key XOR Masking_Value,且同样的
Masked_Key:=Real_Key XOR Masking_Value.
因此,将不再强制性地以其真实形式操纵或存储密钥,而是以其经掩蔽形式来操纵或存储。另外,所述硬件还可能包含用于执行完整性检验的硬件循环冗余检验(CRC)模块。16位的模块将是足够的,但其它大小的CRC也是合适的。然而,本发明的密钥保护方法在没有协处理器且没有硬件CRC模块的情况下效果相当好。
参照图1,根据本发明的密钥保护方法可通过如步骤11中所示播种随机数产生器(RNG)的开始来方便地开始。不同的种子从所述RNG中产生不同的随机序列。所播种的RNG将在随后步骤中用于密钥掩蔽。因此,所述RNG的播种(步骤11)可在产生进行密钥掩蔽所需的随机字节(步骤16)之前的任何时时间处发生。
所述程序的第一主要部分(步骤12到15)获得供用于对私密密钥的后续完整性检验中的加密结果及对应的检验和。
将待受保护的私密密钥以明文形式加载(步骤12)到密钥寄存器中。所述密钥可具有任何合适的长度,这取决于密码算法。同样,可存在一个以上密钥,例如存在于在用于加密与解密的连续循环组中使用两个或三个独立密钥的三DES中。加密算法可包含其中使用刚刚加载到(一或多个)密钥寄存器中的(一或多个)私密密钥来产生用于不同算法循环的循环子密钥序列的密钥产生例程。所有这些变化均预期用于本发明的密钥保护。
接下来,使用所述密码算法及待受保护的密钥来将供用于密钥验证(VERIF_DATA)的已知数据加密(步骤13)。通过(例如)使用循环冗余检验(CRC)例程来计算加密结果的检验和(步骤14)。通过(例如)将加密结果及对应的检验和存储在安全存储器中来将所述加密结果及检验和保持为加密结果的验证签名。接着将所述密钥寄存器抹空(步骤15)。
接下来,使用先前播种的RNG来产生(步骤16)用于密钥掩蔽操作的随机字节。使用(例如)具有所述随机字节中的一者或一者以上的密钥位的逐位“异或”来以随机字节掩蔽(一或多个)原始私密密钥(步骤17):
Masked_Key:=Real_Key XOR Masking_Value.
进行掩蔽所需要的随机字节的数目将取决于密钥大小,以及待掩蔽的密钥的数目。当使用多个密钥时,可将相同或不同的随机字节用于掩蔽不同密钥。一经掩蔽,(一或多个)经掩蔽的密钥即被存储在安全非易失性存储器(例如EEPROM)的规定位置中。
将(一或多个)经掩蔽的密钥从所述规定的存储器位置加载(步骤18)到(一或多个)密钥寄存器中。接着,通过在与原始加密相反的方向上使用相同的密码算法,使用(一或多个)经掩蔽的密钥来将先前的加密结果解密(步骤19)。(注意,当加密期间使用了多个密钥时,例如在三DES中,则通常必须以相反的次序使用所述密钥以实现正确解密。)如果考虑到加密函数Encrypt(Data,Key,Mask)及对应的解密函数Decrypt(Data,Key,Mask),且如果将Encrypt(VALID...DATA,Real_Key,0)作为先前的加密结果(步骤19),则如果Real_Key=Masked_Key XOR Masking_Value,那么步骤20中的解密应为Decrypt(Encrypt(VALID_DATA,Real_Key,0)),Masked_Key,Masking_Value)=VALID_DATA。
将使用经掩蔽的密钥的解密结果与有效数据(VALID_DATA)进行比较(步骤20)。所述经掩蔽的密钥应对应于在对有效_数据进行加密时所产生的验证签名(检验和)。如果解密结果不等于VALID_DATA,则经掩蔽的密钥未通过完整性检验,且用旗标来表示故障注入(步骤21)。然而,如果解密结果等于VALID_DATA,则经掩蔽的密钥通过完整性检验且可以使用。一旦完成完整性检验,即抹拭用于解密及完整性检验的所有硬件寄存器(步骤22)。

Claims (6)

1、一种保护易遭受故障攻击的硬件密码系统中的私密密钥完整性的方法,所述方法包括:
从已知数据及待受保护的私密密钥中获得加密结果及对应的检验和;
掩蔽所述私密密钥以获得经掩蔽的密钥;
将所述经掩蔽的密钥加载到密钥寄存器中;
在将经掩蔽的密钥用于所述硬件密码系统中之前的任何时间处,首先通过用所述经掩蔽的密钥对所述加密结果进行解密以获得解密结果并将所述解密结果与有效数据进行比较来检验所述经掩蔽的密钥的所述完整性;及
如果所述解密结果不等于有效数据,则抹去与所述经掩蔽的密钥相关的所有数据且用旗标来表示故障注入。
2、如权利要求1所述的方法,其中获得加密结果及对应的检验和包括
将所述待受保护的私密密钥以明文形式加载到密钥寄存器中;
将已知数据呈现给加密算法并使用所述私密密钥对所述已知数据进行加密以获得所述加密结果;
对所述加密结果执行检验和计算以获得所述对应的检验和;及
将所述加密结果及检验和保存在安全存储器中。
3、如权利要求2所述的方法,其中所述检验和计算是循环冗余检验(CRC)例程。
4、如权利要求1所述的方法,其中掩蔽所述私密密钥包括使用随机数产生器硬件产生随机字节且使用掩蔽例程将所述随机字节应用于所述私密密钥。
5、如权利要求4所述的方法,其中所述掩蔽例程是所述随机字节及所述私密密钥的逐位“异或”运算。
6、如权利要求4所述的方法,其中在使用已知种子播种所述随机数产生器硬件之后产生所述随机字节,不同的种子产生不同的随机字节序列。
CN2007800476637A 2006-12-22 2007-11-02 密钥保护机制 Expired - Fee Related CN101569131B (zh)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
US11/615,225 US7822207B2 (en) 2006-12-22 2006-12-22 Key protection mechanism
US11/615,225 2006-12-22
PCT/US2007/083426 WO2008079524A2 (en) 2006-12-22 2007-11-02 Key protection mechanism

Publications (2)

Publication Number Publication Date
CN101569131A true CN101569131A (zh) 2009-10-28
CN101569131B CN101569131B (zh) 2012-12-12

Family

ID=39542851

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2007800476637A Expired - Fee Related CN101569131B (zh) 2006-12-22 2007-11-02 密钥保护机制

Country Status (5)

Country Link
US (1) US7822207B2 (zh)
CN (1) CN101569131B (zh)
DE (1) DE112007003061T5 (zh)
TW (1) TWI434565B (zh)
WO (1) WO2008079524A2 (zh)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102542319A (zh) * 2010-12-10 2012-07-04 上海华虹集成电路有限责任公司 Psam卡中密钥保护方法
CN103119888A (zh) * 2010-08-20 2013-05-22 苹果公司 用于不安全环境中的块密码处理的装置和方法
CN104919511A (zh) * 2013-01-18 2015-09-16 三菱电机株式会社 数据解密装置、属性基密码系统、随机数要素去除装置、随机化秘密密钥生成装置、数据解密方法和数据解密程序

Families Citing this family (24)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
FR2904901B1 (fr) * 2006-08-09 2008-10-03 Sagem Defense Securite Procede de verification de l'integrite d'une clef de chiffrement obtenue par combinaison de parties de clef
US7822207B2 (en) 2006-12-22 2010-10-26 Atmel Rousset S.A.S. Key protection mechanism
FR2931326A1 (fr) * 2008-05-16 2009-11-20 St Microelectronics Rousset Verification d'integrite d'une cle de chiffrement
FR2952256B1 (fr) * 2009-11-04 2011-12-16 St Microelectronics Rousset Protection d'une cle de chiffrement contre des attaques unidirectionnelles
CN101977180B (zh) * 2010-06-08 2013-06-19 南京大学 一种基于漏洞攻击的安全协议验证方法
DE102010055237A1 (de) 2010-12-20 2012-06-21 Giesecke & Devrient Gmbh Verfahren zum geschützten Ausführen einer kryptographischen Berechnung
US9432342B1 (en) * 2011-03-08 2016-08-30 Ciphercloud, Inc. System and method to anonymize data transmitted to a destination computing device
US11228566B1 (en) 2011-03-08 2022-01-18 Ciphercloud, Inc. System and method to anonymize data transmitted to a destination computing device
US8699703B2 (en) * 2011-10-19 2014-04-15 Apple Inc. System and method for pseudo-random polymorphic tree construction
CN102404108B (zh) * 2011-10-25 2014-07-09 宁波大学 一种针对aes-128算法的新型故障攻击方法
EP2602952A1 (en) * 2011-12-07 2013-06-12 Gemalto SA Cryptographic method for protecting a key hardware register against fault attacks
EP2629447A1 (en) * 2012-02-17 2013-08-21 Gemalto SA Method and device for protecting an electronic device against fault attack(s)
DE102012011730A1 (de) * 2012-06-13 2013-12-19 Giesecke & Devrient Gmbh Gegen Safe Error Angriffe geschützte kryptographische Berechnung
US9703937B2 (en) * 2013-04-10 2017-07-11 Dell Products, L.P. Method to prevent operating system digital product key activation failures
EP2858005A1 (en) * 2013-10-03 2015-04-08 Gemalto SA Integrity check of a non-readable instruction register
US10205710B2 (en) * 2015-01-08 2019-02-12 Intertrust Technologies Corporation Cryptographic systems and methods
US9929858B2 (en) * 2015-09-21 2018-03-27 Nxp B.V. Method and system for detecting fault attacks
US11362824B2 (en) * 2018-05-25 2022-06-14 Intertrust Technologies Corporation Content management systems and methods using proxy reencryption
TWI722496B (zh) * 2019-06-20 2021-03-21 慧榮科技股份有限公司 使用者資料的加解密方法及裝置
US11507699B2 (en) * 2019-09-27 2022-11-22 Intel Corporation Processor with private pipeline
US11379580B1 (en) * 2020-03-16 2022-07-05 Xilinx, Inc. Mixed storage of data fields
US11528135B2 (en) 2020-03-31 2022-12-13 Taiwan Semiconductor Manufacturing Company, Ltd. Integrated circuit (IC) signatures with random number generator and one-time programmable device
TWI781544B (zh) * 2020-03-31 2022-10-21 台灣積體電路製造股份有限公司 積體電路裝置以及產生用於積體電路裝置的安全密鑰的方法及系統
US11962693B2 (en) 2020-03-31 2024-04-16 Taiwan Semiconductor Manufacturing Company, Ltd. Integrated circuit (IC) signatures with random number generator and one-time programmable device

Family Cites Families (31)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4965825A (en) * 1981-11-03 1990-10-23 The Personalized Mass Media Corporation Signal processing apparatus and methods
US5631960A (en) * 1995-08-31 1997-05-20 National Semiconductor Corporation Autotest of encryption algorithms in embedded secure encryption devices
US5761306A (en) * 1996-02-22 1998-06-02 Visa International Service Association Key replacement in a public key cryptosystem
US5937066A (en) * 1996-10-02 1999-08-10 International Business Machines Corporation Two-phase cryptographic key recovery system
US6092229A (en) * 1996-10-09 2000-07-18 Lsi Logic Corporation Single chip systems using general purpose processors
US6282290B1 (en) * 1997-03-28 2001-08-28 Mykotronx, Inc. High speed modular exponentiator
AU733803B2 (en) * 1997-05-09 2001-05-24 Connotech Experts-Conseils Inc. Initial secret key establishment including facilities for verification of identity
US5991415A (en) * 1997-05-12 1999-11-23 Yeda Research And Development Co. Ltd. At The Weizmann Institute Of Science Method and apparatus for protecting public key schemes from timing and fault attacks
US6965673B1 (en) * 1997-09-19 2005-11-15 Telcordia Technologies, Inc. Method of using transient faults to verify the security of a cryptosystem
US6055316A (en) * 1997-12-26 2000-04-25 Sun Microsystems, Inc. System and method for deriving an appropriate initialization vector for secure communications
DE69840782D1 (de) * 1998-01-02 2009-06-04 Cryptography Res Inc Leckresistentes kryptographisches Verfahren und Vorrichtung
EP1088295B1 (en) * 1998-06-03 2007-08-15 Cryptography Research Inc. Balanced cryptographic computational method and apparatus for leak minimization in smartcards and other cryptosystems
US6289455B1 (en) * 1999-09-02 2001-09-11 Crypotography Research, Inc. Method and apparatus for preventing piracy of digital content
AU2001260970A1 (en) * 2000-01-31 2001-08-07 Vdg Inc. Block encryption method and schemes for data confidentiality and integrity protection
US6990468B1 (en) * 2000-06-19 2006-01-24 Xerox Corporation System, method and article of manufacture for cryptoserver-based auction
US7051199B1 (en) * 2000-06-19 2006-05-23 Xerox Corporation System, method and article of manufacture for providing cryptographic services utilizing a network
US20030223579A1 (en) * 2000-07-13 2003-12-04 Eran Kanter Secure and linear public-key cryptosystem based on parity-check error-correcting
US6941284B2 (en) * 2000-11-30 2005-09-06 Pitney Bowes Inc. Method for dynamically using cryptographic keys in a postage meter
FR2820577B1 (fr) * 2001-02-08 2003-06-13 St Microelectronics Sa Procede securise de calcul cryptographique a cle secrete et composant mettant en oeuvre un tel procede
JP4188571B2 (ja) * 2001-03-30 2008-11-26 株式会社日立製作所 情報処理装置の演算方法および耐タンパ演算攪乱実装方式
US7000115B2 (en) * 2001-06-19 2006-02-14 International Business Machines Corporation Method and apparatus for uniquely and authoritatively identifying tangible objects
US20030023850A1 (en) * 2001-07-26 2003-01-30 International Business Machines Corporation Verifying messaging sessions by digital signatures of participants
EP1430641A2 (en) * 2001-09-27 2004-06-23 Matsushita Electric Industrial Co., Ltd. An encryption device, a decrypting device, a secret key generation device,a copyright protection system and a cipher communication device
WO2003034649A2 (de) * 2001-10-17 2003-04-24 Infineon Technologies Ag Verfahren und vorrichtung zum absichern einer berechnung in einem kryptographischen algorithmus
US7596531B2 (en) * 2002-06-05 2009-09-29 Sun Microsystems, Inc. Method and apparatus for protecting against side channel attacks against personal identification numbers
AU2003271594A1 (en) * 2002-09-11 2004-04-23 Giesecke And Devrient Gmbh Protected cryptographic calculation
US7715551B2 (en) * 2004-04-29 2010-05-11 Stmicroelectronics Asia Pacific Pte. Ltd. Apparatus and method for consistency checking public key cryptography computations
US8065532B2 (en) * 2004-06-08 2011-11-22 Hrl Laboratories, Llc Cryptographic architecture with random instruction masking to thwart differential power analysis
US20050289311A1 (en) * 2004-06-29 2005-12-29 David Durham System and method for secure inter-platform and intra-platform communications
US7680273B2 (en) * 2004-12-08 2010-03-16 Schweitzer Engineering Laboratories, Inc. System and method for optimizing error detection to detect unauthorized modification of transmitted data
US7822207B2 (en) 2006-12-22 2010-10-26 Atmel Rousset S.A.S. Key protection mechanism

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103119888A (zh) * 2010-08-20 2013-05-22 苹果公司 用于不安全环境中的块密码处理的装置和方法
CN102542319A (zh) * 2010-12-10 2012-07-04 上海华虹集成电路有限责任公司 Psam卡中密钥保护方法
CN102542319B (zh) * 2010-12-10 2016-06-29 上海华虹集成电路有限责任公司 Psam卡中密钥保护方法
CN104919511A (zh) * 2013-01-18 2015-09-16 三菱电机株式会社 数据解密装置、属性基密码系统、随机数要素去除装置、随机化秘密密钥生成装置、数据解密方法和数据解密程序
CN104919511B (zh) * 2013-01-18 2017-05-17 三菱电机株式会社 数据解密装置、属性基密码系统和数据解密方法

Also Published As

Publication number Publication date
CN101569131B (zh) 2012-12-12
US20080152144A1 (en) 2008-06-26
US7822207B2 (en) 2010-10-26
WO2008079524A2 (en) 2008-07-03
WO2008079524A3 (en) 2008-08-14
TW200830832A (en) 2008-07-16
TWI434565B (zh) 2014-04-11
DE112007003061T5 (de) 2009-10-29

Similar Documents

Publication Publication Date Title
CN101569131B (zh) 密钥保护机制
US12081648B2 (en) Block cryptographic method for encrypting/decrypting messages and cryptographic devices for implementing this method
US11233659B2 (en) Method of RSA signature or decryption protected using a homomorphic encryption
JP6366595B2 (ja) 耐グリッチ性暗号離散対数ベースの署名のための方法及びシステム
US9819657B2 (en) Protection of memory interface
CN108011706B (zh) 数据处理装置和用于数据的加密处理的方法
CN105359450B (zh) 防篡改密码算法实现
Dobraunig et al. Fault attacks on nonce-based authenticated encryption: Application to keyak and ketje
EP3596876B1 (en) Elliptic curve point multiplication device and method for signing a message in a white-box context
JP2008252299A (ja) 暗号処理システム及び暗号処理方法
CN106487497B (zh) 对rijndael算法的dpa保护
US10187198B2 (en) Protection of a rijndael algorithm
CN101925875A (zh) 用于非对称加密的对策方法和设备
CN101006677A (zh) 用于实施加密运算的方法和装置
Amiel et al. Fault analysis of DPA-resistant algorithms
JP2011072040A (ja) 誤りに基づく攻撃から電子回路を保護する方法
US20210367766A1 (en) A computation device using shared shares
Rivain Securing RSA against fault analysis by double addition chain exponentiation
CN116707814A (zh) 对数据加密签名的方法、相关电子设备和相关计算机程序

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
ASS Succession or assignment of patent right

Owner name: ATMEL ROUSSEAU CO., LTD.

Free format text: FORMER OWNER: ATMEL CO., LTD.

Effective date: 20100617

C41 Transfer of patent application or patent right or utility model
COR Change of bibliographic data

Free format text: CORRECT: ADDRESS; FROM: CALIFORNIA, USA TO: ROUSSE, FRANCE

TA01 Transfer of patent application right

Effective date of registration: 20100617

Address after: French ruse

Applicant after: ATMEL ROUSSET S.A.S.

Address before: California, USA

Applicant before: Atmel Corp.

C14 Grant of patent or utility model
GR01 Patent grant
ASS Succession or assignment of patent right

Owner name: INSIDE SECURE CORPORATION

Free format text: FORMER OWNER: ATMEL ROUSSET SAS

Effective date: 20130121

C41 Transfer of patent application or patent right or utility model
TR01 Transfer of patent right

Effective date of registration: 20130121

Address after: Provence

Patentee after: INSIDE SECURE

Address before: French ruse

Patentee before: ATMEL ROUSSET S.A.S.

CP03 Change of name, title or address
CP03 Change of name, title or address

Address after: Fa Guomeileyi

Patentee after: Weimei Anshi Co.,Ltd.

Address before: Fa Guopuluowangsi

Patentee before: Inside Secure

TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20200310

Address after: California, USA

Patentee after: Rumbas

Address before: Fa Guomeileyi

Patentee before: Weimei Anshi Co.,Ltd.

CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20121212

CF01 Termination of patent right due to non-payment of annual fee