CA2388971A1 - Procede permettant au traitement de donnees de resister a l'extraction de donnees par l'analyse de signaux de voies laterales indesirables - Google Patents

Procede permettant au traitement de donnees de resister a l'extraction de donnees par l'analyse de signaux de voies laterales indesirables Download PDF

Info

Publication number
CA2388971A1
CA2388971A1 CA002388971A CA2388971A CA2388971A1 CA 2388971 A1 CA2388971 A1 CA 2388971A1 CA 002388971 A CA002388971 A CA 002388971A CA 2388971 A CA2388971 A CA 2388971A CA 2388971 A1 CA2388971 A1 CA 2388971A1
Authority
CA
Canada
Prior art keywords
data
mapping
mappings
algorithm
mapped
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
CA002388971A
Other languages
English (en)
Inventor
Manfred Von Willich
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
CYPHERMANX CONSULTANTS Ltd
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Publication of CA2388971A1 publication Critical patent/CA2388971A1/fr
Abandoned legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F7/00Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
    • G07F7/08Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
    • G07F7/10Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data
    • G07F7/1008Active credit-cards provided with means to personalise their use, e.g. with PIN-introduction/comparison system
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/75Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information by inhibiting the analysis of circuitry or operation
    • G06F21/755Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information by inhibiting the analysis of circuitry or operation with measures against power attack
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/34Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
    • G06Q20/341Active cards, i.e. cards including their own processing means, e.g. including an IC or chip
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F7/00Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
    • G07F7/08Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
    • G07F7/0806Details of the card
    • G07F7/0813Specific details related to card security
    • G07F7/082Features insuring the integrity of the data on or in the card
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F7/00Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
    • G07F7/08Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
    • G07F7/0806Details of the card
    • G07F7/0833Card having specific functional components
    • G07F7/084Additional components relating to data transfer and storing, e.g. error detection, self-diagnosis
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F7/00Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
    • G07F7/08Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
    • G07F7/10Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data
    • G07F7/1025Identification of user by a PIN code
    • G07F7/1083Counting of PIN attempts
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/002Countermeasures against attacks on cryptographic mechanisms
    • H04L9/003Countermeasures against attacks on cryptographic mechanisms for power analysis, e.g. differential power analysis [DPA] or simple power analysis [SPA]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0618Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
    • H04L9/0625Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation with splitting of the data block into left and right halves, e.g. Feistel based algorithms, DES, FEAL, IDEA or KASUMI
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2207/00Indexing scheme relating to methods or arrangements for processing data by operating upon the order or content of the data handled
    • G06F2207/72Indexing scheme relating to groups G06F7/72 - G06F7/729
    • G06F2207/7219Countermeasures against side channel or fault attacks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/16Obfuscation or hiding, e.g. involving white box

Landscapes

  • Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computer Hardware Design (AREA)
  • Signal Processing (AREA)
  • Business, Economics & Management (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Mathematical Physics (AREA)
  • Microelectronics & Electronic Packaging (AREA)
  • Accounting & Taxation (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • Storage Device Security (AREA)
CA002388971A 1999-10-25 2000-10-19 Procede permettant au traitement de donnees de resister a l'extraction de donnees par l'analyse de signaux de voies laterales indesirables Abandoned CA2388971A1 (fr)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
US16104799P 1999-10-25 1999-10-25
US60/161,047 1999-10-25
PCT/ZA2000/000192 WO2001031422A2 (fr) 1999-10-25 2000-10-19 Procede permettant au traitement de donnees de resister a l'extraction de donnees par l'analyse de signaux de voies laterales indesirables

Publications (1)

Publication Number Publication Date
CA2388971A1 true CA2388971A1 (fr) 2001-05-03

Family

ID=22579586

Family Applications (1)

Application Number Title Priority Date Filing Date
CA002388971A Abandoned CA2388971A1 (fr) 1999-10-25 2000-10-19 Procede permettant au traitement de donnees de resister a l'extraction de donnees par l'analyse de signaux de voies laterales indesirables

Country Status (8)

Country Link
EP (1) EP1226681A2 (fr)
JP (1) JP2003513490A (fr)
CN (1) CN1413398A (fr)
AU (1) AU773982B2 (fr)
CA (1) CA2388971A1 (fr)
EA (1) EA003874B1 (fr)
WO (1) WO2001031422A2 (fr)
ZA (1) ZA200202798B (fr)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104104587A (zh) * 2014-04-18 2014-10-15 天津大学 一种认证邮件协议的后一致性分析方法
US9009495B2 (en) 2013-06-28 2015-04-14 Envieta, LLC High speed cryptographic combining system, and method for programmable logic devices

Families Citing this family (19)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7142670B2 (en) * 2001-08-14 2006-11-28 International Business Machines Corporation Space-efficient, side-channel attack resistant table lookups
WO2003075506A1 (fr) * 2002-03-07 2003-09-12 Axalto Sa Procede permettant de securiser un ensemble electronique a cryptographie au moyen d'une cle secrete
FR2842376B1 (fr) * 2002-07-10 2004-09-24 Somfy Procede de communication selective entre objets
EP1457858A1 (fr) * 2003-03-14 2004-09-15 SCHLUMBERGER Systèmes Procédé de sécurisation d'un ensemble électronique à cryptoprocesseur
DE10341096A1 (de) * 2003-09-05 2005-03-31 Giesecke & Devrient Gmbh Übergang zwischen maskierten Repräsentationen eines Wertes bei kryptographischen Berechnungen
JP4604045B2 (ja) * 2003-11-13 2010-12-22 マジック テクノロジーズ,インコーポレーテッド 古典的なビット暗号化を有するqkd
KR101061906B1 (ko) * 2004-02-19 2011-09-02 삼성전자주식회사 전력분석공격에 안전한 기본 연산 장치 및 방법
EP1596278A1 (fr) * 2004-05-11 2005-11-16 Axalto SA Procédé de protection d'un ensemble cryptographique par masquage homographique
FR2873523B1 (fr) * 2004-07-22 2007-08-10 Sagem Procede et dispositif d'execution d'un calcul cryptographique
DE102004043243A1 (de) * 2004-09-07 2006-03-23 Comvenient Gmbh & Co. Kg Verfahren zum Schutz von Schlüsseln
EP1646174A1 (fr) * 2004-10-07 2006-04-12 Axalto SA Méthode et appareil pour générer un jeux d'instructions cryptographique automatiquement et génération d'un code
WO2006046187A1 (fr) * 2004-10-28 2006-05-04 Koninklijke Philips Electronics N.V. Procede et systeme permettant d'assombrir une fonction cryptographique
JP2008181225A (ja) * 2007-01-23 2008-08-07 Toshiba Corp Icカード
CN102016871B (zh) 2008-03-05 2017-11-07 爱迪德技术有限公司 密码系统
EP2525298B1 (fr) * 2011-05-17 2016-07-13 Nxp B.V. Procédé d'authentification
EP2620890A1 (fr) * 2012-01-25 2013-07-31 Gemalto SA Procédé de détection de défaillance injectée dans des registres de matériel d'un dispositif électronique
DE102012018924A1 (de) 2012-09-25 2014-03-27 Giesecke & Devrient Gmbh Seitenkanalgeschützte Maskierung
JP6264935B2 (ja) * 2014-02-24 2018-01-24 大日本印刷株式会社 情報処理装置の認証方法
CN105757878B (zh) * 2016-02-19 2018-07-27 广东美的暖通设备有限公司 通讯数据的编码及解码方法、装置和空调器

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9009495B2 (en) 2013-06-28 2015-04-14 Envieta, LLC High speed cryptographic combining system, and method for programmable logic devices
CN104104587A (zh) * 2014-04-18 2014-10-15 天津大学 一种认证邮件协议的后一致性分析方法
CN104104587B (zh) * 2014-04-18 2017-12-26 天津大学 一种认证邮件协议的后一致性分析方法

Also Published As

Publication number Publication date
JP2003513490A (ja) 2003-04-08
EP1226681A2 (fr) 2002-07-31
WO2001031422A2 (fr) 2001-05-03
EA200200468A1 (ru) 2002-10-31
CN1413398A (zh) 2003-04-23
ZA200202798B (en) 2003-09-23
WO2001031422A3 (fr) 2001-12-13
AU773982B2 (en) 2004-06-10
WO2001031422B1 (fr) 2002-01-10
AU2301401A (en) 2001-05-08
EA003874B1 (ru) 2003-10-30

Similar Documents

Publication Publication Date Title
AU773982B2 (en) Method for making data processing resistant to extraction of data by analysis of unintended side-channel signals
EP3337082B1 (fr) Procédé et système de génération de clés à chiffres ronds par mélangeurs de bits
Kumar et al. Development of modified AES algorithm for data security
US6278783B1 (en) Des and other cryptographic, processes with leak minimization for smartcards and other cryptosystems
US10313128B2 (en) Address-dependent key generator by XOR tree
CN104734845B (zh) 基于全加密算法伪操作的旁路攻击防护方法
WO2001008012A1 (fr) Procede et dispositif de prevention d'intrusion dans un ensemble micro-electronique par fuite d'information
US9602281B2 (en) Parallelizable cipher construction
Shi et al. Light-weight white-box encryption scheme with random padding for wearable consumer electronic devices
GB2532835A (en) Double-mix feistel network for key generation or encryption
Shoukat et al. Randomized substitution method for effectively secure block ciphers in IOT environment
EP2363974A1 (fr) Masquage de tables variable pour procédés cryptographiques
Swayamprakash et al. Design of Advanced Encryption Standard using Verilog HDL
Yang et al. WAS: improved white-box cryptographic algorithm over AS iteration
Shiba et al. Cubicle: A family of space‐hard ciphers for IoT
Ghellar et al. A novel AES cryptographic core highly resistant to differential power analysis attacks
CN116796345A (zh) 加解密方法、装置、设备及存储介质
Bronchain et al. Moe: multiplication operated encryption with trojan resilience
CN101364868A (zh) 基于广义信息域的伪随机码发生器及其发生方法
Misra et al. Analysing the parameters of chaos based image encryption schemes
Alwakeel A Novel Multilayered Encryption Model Featuring Dynamic Randomization and Adaptive Key Integration
CN116961880A (zh) 一种基于香农展开的白盒加密方法及系统
Garay et al. MAC precomputation with applications to secure memory
Novotný Cryptanalytic attacks on cyber-physical systems
CN121585368A (zh) 一种基于不相交线性码的1阶弹性五谱值函数的构造方法

Legal Events

Date Code Title Description
FZDE Discontinued