ATE460027T1 - Taktangriffresistentes kryptographisches system - Google Patents
Taktangriffresistentes kryptographisches systemInfo
- Publication number
- ATE460027T1 ATE460027T1 AT99932571T AT99932571T ATE460027T1 AT E460027 T1 ATE460027 T1 AT E460027T1 AT 99932571 T AT99932571 T AT 99932571T AT 99932571 T AT99932571 T AT 99932571T AT E460027 T1 ATE460027 T1 AT E460027T1
- Authority
- AT
- Austria
- Prior art keywords
- group
- intermediate element
- replacing
- cryptographic system
- bits
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F7/00—Methods or arrangements for processing data by operating upon the order or content of the data handled
- G06F7/60—Methods or arrangements for performing computations using a digital non-denominational number representation, i.e. number representation without radix; Computing devices using combinations of denominational and non-denominational quantity representations, e.g. using difunction pulse trains, STEELE computers, phase computers
- G06F7/72—Methods or arrangements for performing computations using a digital non-denominational number representation, i.e. number representation without radix; Computing devices using combinations of denominational and non-denominational quantity representations, e.g. using difunction pulse trains, STEELE computers, phase computers using residue arithmetic
- G06F7/724—Finite field arithmetic
- G06F7/725—Finite field arithmetic over elliptic curves
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/30—Arrangements for executing machine instructions, e.g. instruction decode
- G06F9/30003—Arrangements for executing specific machine instructions
- G06F9/3005—Arrangements for executing specific machine instructions to perform operations for flow control
- G06F9/30058—Conditional branch instructions
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/002—Countermeasures against attacks on cryptographic mechanisms
- H04L9/005—Countermeasures against attacks on cryptographic mechanisms for timing attacks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
- H04L9/3066—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2207/00—Indexing scheme relating to methods or arrangements for processing data by operating upon the order or content of the data handled
- G06F2207/72—Indexing scheme relating to groups G06F7/72 - G06F7/729
- G06F2207/7219—Countermeasures against side channel or fault attacks
- G06F2207/7261—Uniform execution, e.g. avoiding jumps, or using formulae with the same power profile
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F7/00—Methods or arrangements for processing data by operating upon the order or content of the data handled
- G06F7/38—Methods or arrangements for performing computations using exclusively denominational number representation, e.g. using binary, ternary, decimal representation
- G06F7/48—Methods or arrangements for performing computations using exclusively denominational number representation, e.g. using binary, ternary, decimal representation using non-contact-making devices, e.g. tube, solid state device; using unspecified devices
- G06F7/4824—Methods or arrangements for performing computations using exclusively denominational number representation, e.g. using binary, ternary, decimal representation using non-contact-making devices, e.g. tube, solid state device; using unspecified devices using signed-digit representation
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Mathematical Optimization (AREA)
- Computer Security & Cryptography (AREA)
- Pure & Applied Mathematics (AREA)
- Mathematical Analysis (AREA)
- General Engineering & Computer Science (AREA)
- Mathematical Physics (AREA)
- Computational Mathematics (AREA)
- Computing Systems (AREA)
- Software Systems (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Algebra (AREA)
- Complex Calculations (AREA)
- Storage Device Security (AREA)
- Radar Systems Or Details Thereof (AREA)
- Traffic Control Systems (AREA)
- Lock And Its Accessories (AREA)
- Compression, Expansion, Code Conversion, And Decoders (AREA)
- Mobile Radio Communication Systems (AREA)
- Synchronisation In Digital Transmission Systems (AREA)
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CA002243761A CA2243761C (en) | 1998-07-21 | 1998-07-21 | Timing attack resistant cryptographic system |
| PCT/CA1999/000658 WO2000005837A1 (en) | 1998-07-21 | 1999-07-21 | Timing attack resistant cryptographic system |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| ATE460027T1 true ATE460027T1 (de) | 2010-03-15 |
Family
ID=4162681
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| AT99932571T ATE460027T1 (de) | 1998-07-21 | 1999-07-21 | Taktangriffresistentes kryptographisches system |
Country Status (8)
| Country | Link |
|---|---|
| US (1) | US7020281B2 (de) |
| EP (1) | EP1097541B1 (de) |
| JP (1) | JP4699610B2 (de) |
| AT (1) | ATE460027T1 (de) |
| AU (1) | AU4891799A (de) |
| CA (1) | CA2243761C (de) |
| DE (1) | DE69942094D1 (de) |
| WO (1) | WO2000005837A1 (de) |
Families Citing this family (28)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CA2252078C (en) * | 1998-10-28 | 2009-02-17 | Certicom Corp. | Power signature attack resistant cryptographic system |
| US6948065B2 (en) * | 2000-12-27 | 2005-09-20 | Intel Corporation | Platform and method for securely transmitting an authorization secret |
| DE10122504A1 (de) * | 2001-05-10 | 2003-01-02 | Giesecke & Devrient Gmbh | Berechnung eines Vielfachen eines Gruppenelements für kryptographische Zwecke |
| US7233663B2 (en) * | 2001-10-29 | 2007-06-19 | Safenet, Inc. | Key generation performance improvement |
| FR2838210B1 (fr) * | 2002-04-03 | 2005-11-04 | Gemplus Card Int | Procede cryptographique protege contre les attaques de type a canal cache |
| DE10254658A1 (de) * | 2002-11-22 | 2004-06-03 | Philips Intellectual Property & Standards Gmbh | Mikrocontroller und zugeordnetes Verfahren zum Abarbeiten der Programmierung des Mikrocontrollers |
| US7555122B2 (en) | 2002-12-04 | 2009-06-30 | Wired Communications LLC | Method for elliptic curve point multiplication |
| US7313677B2 (en) * | 2002-12-12 | 2007-12-25 | Arm Limited | Processing activity masking in a data processing system |
| US7302056B2 (en) * | 2003-06-30 | 2007-11-27 | Lucent Technologies Inc. | Method and system for determining sequence parameters to limit cycle attacks in timed release cryptography |
| ATE472133T1 (de) * | 2006-04-06 | 2010-07-15 | Nxp Bv | Entschlüsselungsverfahren |
| KR100867989B1 (ko) * | 2006-12-06 | 2008-11-10 | 한국전자통신연구원 | 단순전력분석에 안전한 Left-to-Right방향으로 리코딩과 스칼라 곱셈을 동시에 수행하는 스칼라곱셈 방법 |
| US7991162B2 (en) * | 2007-09-14 | 2011-08-02 | University Of Ottawa | Accelerating scalar multiplication on elliptic curve cryptosystems over prime fields |
| FR2946819B1 (fr) * | 2009-06-16 | 2011-07-01 | Sagem Securite | Cryptographie sur une courbe elliptique. |
| US20170207918A1 (en) | 2009-06-16 | 2017-07-20 | Morpho | Cryptography on an elliptical curve |
| US20140314229A1 (en) | 2011-12-09 | 2014-10-23 | Morpho | Cryptography on a simplified elliptical curve |
| FR2946818B1 (fr) * | 2009-06-16 | 2011-07-01 | Sagem Securite | Cryptographie sur une courbe elliptique simplifiee. |
| CN104313027B (zh) | 2009-08-11 | 2018-11-20 | 库尔纳公司 | 通过抑制脂连蛋白(adipoq)的天然反义转录物治疗脂连蛋白(adipoq)相关疾病 |
| GB2479871A (en) * | 2010-04-26 | 2011-11-02 | David Coyne | System for preventing side channel attacks on a synchronous logic device. |
| US8334705B1 (en) | 2011-10-27 | 2012-12-18 | Certicom Corp. | Analog circuitry to conceal activity of logic circuitry |
| US8635467B2 (en) | 2011-10-27 | 2014-01-21 | Certicom Corp. | Integrated circuit with logic circuitry and multiple concealing circuits |
| US9239926B2 (en) | 2012-06-29 | 2016-01-19 | International Business Machines Corporation | Static analysis for discovery of timing attack vulnerabilities in a computer software application |
| US9900154B2 (en) * | 2013-12-23 | 2018-02-20 | Nxp B.V. | Optimized hardward architecture and method for ECC point addition using mixed affine-jacobian coordinates over short weierstrass curves |
| US9979543B2 (en) | 2013-12-23 | 2018-05-22 | Nxp B.V. | Optimized hardware architecture and method for ECC point doubling using jacobian coordinates over short weierstrass curves |
| US9929862B2 (en) | 2013-12-23 | 2018-03-27 | Nxp B.V. | Optimized hardware architecture and method for ECC point doubling using Jacobian coordinates over short Weierstrass curves |
| FR3015726B1 (fr) * | 2013-12-24 | 2016-01-08 | Morpho | Procede de traitement comparatif securise |
| KR20220010533A (ko) * | 2019-05-16 | 2022-01-25 | 엔체인 홀딩스 리미티드 | 작업 증명 블록체인 네트워크 상에서의 채굴을 위한 시스템 및 방법 |
| US12010231B2 (en) * | 2021-06-23 | 2024-06-11 | Pqsecure Technologies, Llc | Computer processing architecture and method for supporting multiple public-key cryptosystems based on exponentiation |
| CN116647318A (zh) * | 2022-02-16 | 2023-08-25 | 瑞昱半导体股份有限公司 | 防御密码系统时间攻击的方法及密码系统处理电路 |
Family Cites Families (18)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US5197024A (en) | 1989-06-14 | 1993-03-23 | Pickett Lester C | Method and apparatus for exponential/logarithmic computation |
| US5600324A (en) * | 1992-05-11 | 1997-02-04 | Rockwell International Corporation | Keyless entry system using a rolling code |
| EP0653716B1 (de) | 1993-11-02 | 1999-08-18 | Bull S.A. | Verfahren zur Prüfung eines sequentiellen endlichen Automaten |
| US5504817A (en) * | 1994-05-09 | 1996-04-02 | Yeda Research And Development Co. Ltd. At The Weizmann Institute Of Science | Method and apparatus for memory efficient variants of public key encryption and identification schemes for smart card applications |
| US5553012A (en) | 1995-03-10 | 1996-09-03 | Motorola, Inc. | Exponentiation circuit utilizing shift means and method of using same |
| US5623527A (en) | 1996-01-30 | 1997-04-22 | Hewlett-Packard Company | Method and apparatus for determining an integer power of a floating point number |
| GB9713138D0 (en) * | 1997-06-20 | 1997-08-27 | Certicom Corp | Accelerated finite field operations on an elliptic curve |
| CA2228493C (en) * | 1997-02-03 | 2005-05-03 | Nippon Telegraph And Telephone Corporation | Scheme for carrying out modular calculations based on redundant binary calculation |
| US5991415A (en) * | 1997-05-12 | 1999-11-23 | Yeda Research And Development Co. Ltd. At The Weizmann Institute Of Science | Method and apparatus for protecting public key schemes from timing and fault attacks |
| US5987131A (en) * | 1997-08-18 | 1999-11-16 | Picturetel Corporation | Cryptographic key exchange using pre-computation |
| WO1999014880A2 (en) * | 1997-09-16 | 1999-03-25 | Koninklijke Philips Electronics N.V. | A method and device for executing a decrypting mechanism through calculating a standardized modular exponentiation for thwarting timing attacks |
| JP4462511B2 (ja) * | 1997-10-10 | 2010-05-12 | サーティコム コーポレーション | エルガマル・ライクなプロトコルのためのセッション・パラメータ生成方法 |
| CA2316227C (en) * | 1998-01-02 | 2009-08-11 | Cryptography Research, Inc. | Leak-resistant cryptographic method and apparatus |
| US6041122A (en) * | 1998-02-27 | 2000-03-21 | Intel Corporation | Method and apparatus for hiding crytographic keys utilizing autocorrelation timing encoding and computation |
| EP1066558B1 (de) * | 1998-03-25 | 2003-01-29 | Certicom Corp. | Beschleunigte begrenztes-feld-operationen auf einer elliptischen kurve |
| ATE385089T1 (de) * | 1998-06-03 | 2008-02-15 | Cryptography Res Inc | Verwendung von unvorhersagbarer information zur leckminimierung von chipkarten und anderen kryptosystemen |
| WO1999067909A2 (en) * | 1998-06-03 | 1999-12-29 | Cryptography Research, Inc. | Secure modular exponentiation with leak minimization for smartcards and other cryptosystems |
| DE69935913T2 (de) * | 1998-07-02 | 2008-01-10 | Cryptography Research Inc., San Francisco | Leckresistente aktualisierung eines indexierten kryptographischen schlüssels |
-
1998
- 1998-07-21 CA CA002243761A patent/CA2243761C/en not_active Expired - Lifetime
-
1999
- 1999-07-21 JP JP2000561725A patent/JP4699610B2/ja not_active Expired - Lifetime
- 1999-07-21 AT AT99932571T patent/ATE460027T1/de not_active IP Right Cessation
- 1999-07-21 AU AU48917/99A patent/AU4891799A/en not_active Abandoned
- 1999-07-21 EP EP99932571A patent/EP1097541B1/de not_active Expired - Lifetime
- 1999-07-21 DE DE69942094T patent/DE69942094D1/de not_active Expired - Lifetime
- 1999-07-21 WO PCT/CA1999/000658 patent/WO2000005837A1/en not_active Ceased
-
2001
- 2001-01-18 US US09/761,700 patent/US7020281B2/en not_active Expired - Lifetime
Also Published As
| Publication number | Publication date |
|---|---|
| CA2243761C (en) | 2009-10-06 |
| US7020281B2 (en) | 2006-03-28 |
| JP2002521724A (ja) | 2002-07-16 |
| EP1097541B1 (de) | 2010-03-03 |
| US20010033655A1 (en) | 2001-10-25 |
| CA2243761A1 (en) | 2000-01-21 |
| WO2000005837A1 (en) | 2000-02-03 |
| EP1097541A1 (de) | 2001-05-09 |
| AU4891799A (en) | 2000-02-14 |
| JP4699610B2 (ja) | 2011-06-15 |
| DE69942094D1 (de) | 2010-04-15 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| ATE460027T1 (de) | Taktangriffresistentes kryptographisches system | |
| WO2003005288A3 (en) | Method and system for performing a pattern match search for text strings | |
| CA2252078A1 (en) | Power signature attack resistant cryptographic system | |
| JP2011103686A (ja) | 暗号化されたアクセスを使う電子的エンティティのセキュリティ化方法 | |
| DE69904621D1 (de) | Verfahren zur wiederherstellung verlorener informationspackete bei packetübertragungsprotokollen | |
| GB2360111A (en) | A method and apparatus for improved predicate prediction | |
| EP1160661A3 (de) | Verfahren zur Skalarmultiplikation auf einer elliptischen Kurve und entsprechende Vorrichtung | |
| DE502006005447D1 (de) | Verfahren zur Verschlüsselung bzw. Entschlüsselung von Datenpaketen eines Datenstroms | |
| WO2004046017A3 (fr) | Procede de division entiere securise contre les attaques a canaux caches | |
| KR100411684B1 (ko) | 이진 데이터 블록의 암호 변환 방법 | |
| WO2003083645A3 (fr) | Procede cryptographique protege contre les attaques de type a canal cache | |
| ATE287624T1 (de) | Verfahren zum optimierten übertragen von atm- zellen über verbindungsabschnitte | |
| CN116541878A (zh) | 一种基于安全两方计算s型函数的隐私保护方法 | |
| WO2000049765A3 (fr) | Procede de contre-mesure dans un composant electronique mettant en oeuvre un algorithme de cryptographie a cle secrete | |
| AU2003292338A1 (en) | Molecular identification of bacteria of genus less thanigreater thanstreptococcusless than/igreater than and related genuses | |
| EP0994424A3 (de) | Hochgeschwindige Primzahlen-Berechnung | |
| Kasselman et al. | Cryptanalysis of reduced version of HAVAL | |
| CN119293658A (zh) | 一种基于增量集成学习的恶意DoH隧道流量检测方法 | |
| RU2009114506A (ru) | Скремблер, способ обработки скремблирования и программа | |
| FI19991861A7 (fi) | Sijainti-informaation hallinta | |
| WO2014067102A1 (en) | Information coding method, system and computer-readable medium | |
| CN116318670B (zh) | 一种适用于后量子密码算法Kyber指令集架构的存储器 | |
| Sovyn et al. | Finding a Bit-Sliced Representation of 4× 4 S-Boxes based on Typical Logic Processor Instructions. | |
| RU97103756A (ru) | Способ шифрования блока данных | |
| CN120498713A (zh) | 基于base64的报文数据加密、解密方法和相关产品 |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| RER | Ceased as to paragraph 5 lit. 3 law introducing patent treaties |