ATE484794T1 - Vorrichtung und verfahren zur durchführung eines kryptographischen algorithmus - Google Patents
Vorrichtung und verfahren zur durchführung eines kryptographischen algorithmusInfo
- Publication number
- ATE484794T1 ATE484794T1 AT01976117T AT01976117T ATE484794T1 AT E484794 T1 ATE484794 T1 AT E484794T1 AT 01976117 T AT01976117 T AT 01976117T AT 01976117 T AT01976117 T AT 01976117T AT E484794 T1 ATE484794 T1 AT E484794T1
- Authority
- AT
- Austria
- Prior art keywords
- mix columns
- coprocessor
- cpu
- cryptographic algorithm
- transformation
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/30—Arrangements for executing machine instructions, e.g. instruction decode
- G06F9/30003—Arrangements for executing specific machine instructions
- G06F9/30007—Arrangements for executing specific machine instructions to perform operations on data operands
- G06F9/30029—Logical and Boolean instructions, e.g. XOR, NOT
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/30—Arrangements for executing machine instructions, e.g. instruction decode
- G06F9/30003—Arrangements for executing specific machine instructions
- G06F9/30007—Arrangements for executing specific machine instructions to perform operations on data operands
- G06F9/30032—Movement instructions, e.g. MOVE, SHIFT, ROTATE, SHUFFLE
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/30—Arrangements for executing machine instructions, e.g. instruction decode
- G06F9/38—Concurrent instruction execution, e.g. pipeline or look ahead
- G06F9/3877—Concurrent instruction execution, e.g. pipeline or look ahead using a secondary processor, e.g. coprocessor
- G06F9/3879—Concurrent instruction execution, e.g. pipeline or look ahead using a secondary processor, e.g. coprocessor for non-native instruction execution, e.g. executing a command; for Java instruction set
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/002—Countermeasures against attacks on cryptographic mechanisms
- H04L9/003—Countermeasures against attacks on cryptographic mechanisms for power analysis, e.g. differential power analysis [DPA] or simple power analysis [SPA]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/002—Countermeasures against attacks on cryptographic mechanisms
- H04L9/005—Countermeasures against attacks on cryptographic mechanisms for timing attacks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0618—Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
- H04L9/0631—Substitution permutation network [SPN], i.e. cipher composed of a number of stages or rounds each involving linear and nonlinear transformations, e.g. AES algorithms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/04—Masking or blinding
- H04L2209/046—Masking or blinding of operations, operands or results of the operations
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/12—Details relating to cryptographic hardware or logic circuitry
- H04L2209/125—Parallelization or pipelining, e.g. for accelerating processing of cryptographic operations
Landscapes
- Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Storage Device Security (AREA)
- Complex Calculations (AREA)
- Circuits Of Receivers In General (AREA)
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| PCT/EP2001/009583 WO2003019357A1 (en) | 2001-08-20 | 2001-08-20 | Apparatus and method for performing a cryptographic algorithm |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| ATE484794T1 true ATE484794T1 (de) | 2010-10-15 |
Family
ID=8164554
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| AT01976117T ATE484794T1 (de) | 2001-08-20 | 2001-08-20 | Vorrichtung und verfahren zur durchführung eines kryptographischen algorithmus |
Country Status (4)
| Country | Link |
|---|---|
| EP (1) | EP1419436B1 (de) |
| AT (1) | ATE484794T1 (de) |
| DE (1) | DE60143275D1 (de) |
| WO (1) | WO2003019357A1 (de) |
Families Citing this family (7)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| TW527783B (en) | 2001-10-04 | 2003-04-11 | Ind Tech Res Inst | Encryption/deciphering device capable of supporting advanced encryption standard |
| KR100594265B1 (ko) | 2004-03-16 | 2006-06-30 | 삼성전자주식회사 | 매스킹 방법이 적용된 데이터 암호처리장치, aes암호시스템 및 aes 암호방법. |
| US7949130B2 (en) | 2006-12-28 | 2011-05-24 | Intel Corporation | Architecture and instruction set for implementing advanced encryption standard (AES) |
| US8538015B2 (en) | 2007-03-28 | 2013-09-17 | Intel Corporation | Flexible architecture and instruction for advanced encryption standard (AES) |
| US8787565B2 (en) | 2007-08-20 | 2014-07-22 | Intel Corporation | Method and apparatus for generating an advanced encryption standard (AES) key schedule |
| US8624624B1 (en) | 2011-08-26 | 2014-01-07 | Lockheed Martin Corporation | Power isolation during sensitive operations |
| US8525545B1 (en) | 2011-08-26 | 2013-09-03 | Lockheed Martin Corporation | Power isolation during sensitive operations |
-
2001
- 2001-08-20 WO PCT/EP2001/009583 patent/WO2003019357A1/en not_active Ceased
- 2001-08-20 AT AT01976117T patent/ATE484794T1/de not_active IP Right Cessation
- 2001-08-20 EP EP01976117A patent/EP1419436B1/de not_active Expired - Lifetime
- 2001-08-20 DE DE60143275T patent/DE60143275D1/de not_active Expired - Lifetime
Also Published As
| Publication number | Publication date |
|---|---|
| EP1419436B1 (de) | 2010-10-13 |
| DE60143275D1 (de) | 2010-11-25 |
| EP1419436A1 (de) | 2004-05-19 |
| WO2003019357A1 (en) | 2003-03-06 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| EP1873671B2 (de) | Verfahren zum Schutz von IC-Karten vor Leistungsanalyse-Attacken | |
| EP2207087B1 (de) | Verfahren zum Schutz einer kryptografischen Vorrichtung gegen SPA-, DPA- und Zeitangriffe | |
| DE60313519D1 (de) | Verfahren zur Erzeugung eines Schlüssels, Inhaltsbereitstellungsverfahren, Entschlüsselungsverfahren für verschlüsselte Inhalte, Verfahren zur Erkennung von illegalen Benutzern, System zum Bereitstellen von Inhalten, Benutzersystem, Verfahren zur Ablaufverfolgung, Verschlüsselungsgerät, Entschlüsselungsgerät, und Computerprogramm | |
| DE60044168D1 (de) | Verfahren zur sicherung einer elektronischen verschlüsselungsvorrichtung mit geheimschlüssel gegen angriffe mittels physischer analyse | |
| DE602004031729D1 (de) | Gerät und verfahren für auswählbare hardware-beschleuniger in einer datengesteuerten architektur | |
| EP1469371A3 (de) | Mikroprozessorvorrichtung und Verfahren zur Durchführung kryptographischer Funktionen zur Blockchiffrierung | |
| DE60001393D1 (de) | Verfahren zur überwachung des programmablaufs | |
| ATE341134T1 (de) | Vorrichtung und verfahren zur dynamischen verschlüsselung | |
| RU2011148528A (ru) | Способ и система защиты криптографического устройства | |
| EP2637349A2 (de) | Kryptographieverarbeitungsvorrichtung | |
| ATE412949T1 (de) | Verfahren, datenverarbeitungseinrichtung und computerprogrammprodukt zur datenverarbeitung | |
| DE602006013854D1 (de) | Dma-übertragung von datensätzen und ein exklusives oder (xor) der datensätze | |
| ATE479155T1 (de) | System und verfahren zur verschlüsselung von tastenanschlägen bezüglich eines passworts | |
| CN1989726A (zh) | 用于执行加密计算的方法和装置 | |
| EP1496421A3 (de) | Vorrichtung und verfahren zur durchführung transparenter kryptographischer funktionen zur blockchiffrierung | |
| ATE484794T1 (de) | Vorrichtung und verfahren zur durchführung eines kryptographischen algorithmus | |
| EP2119101A4 (de) | Elliptisches skalarmultiplikationsverfahren gegen leistungsanalyseangriffe | |
| Wiemers et al. | Entropy reduction for the correlation-enhanced power analysis collision attack | |
| ATE447737T1 (de) | Verfahren zum schutz einer kryptographischen einheit mittels homographischer maskierung | |
| RU2003131278A (ru) | Способ шифрования данных | |
| Jayasena et al. | C ise L eaks: Information Leakage Assessment of Cryptographic Instruction Set Extension Prototypes | |
| ATE424265T1 (de) | Verfahren und vorrichtung zur verformung eines werkstücks | |
| Ambrose et al. | A smart random code injection to mask power analysis based side channel attacks | |
| Thuillet et al. | A smart card power analysis simulator | |
| CN103647640B (zh) | 针对des第二轮l寄存器翻转的功耗攻击方法 |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| RER | Ceased as to paragraph 5 lit. 3 law introducing patent treaties |