CA2388971A1 - Procede permettant au traitement de donnees de resister a l'extraction de donnees par l'analyse de signaux de voies laterales indesirables - Google Patents
Procede permettant au traitement de donnees de resister a l'extraction de donnees par l'analyse de signaux de voies laterales indesirables Download PDFInfo
- Publication number
- CA2388971A1 CA2388971A1 CA002388971A CA2388971A CA2388971A1 CA 2388971 A1 CA2388971 A1 CA 2388971A1 CA 002388971 A CA002388971 A CA 002388971A CA 2388971 A CA2388971 A CA 2388971A CA 2388971 A1 CA2388971 A1 CA 2388971A1
- Authority
- CA
- Canada
- Prior art keywords
- data
- mapping
- mappings
- algorithm
- mapped
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F7/00—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
- G07F7/08—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
- G07F7/10—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data
- G07F7/1008—Active credit-cards provided with means to personalise their use, e.g. with PIN-introduction/comparison system
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/75—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information by inhibiting the analysis of circuitry or operation
- G06F21/755—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information by inhibiting the analysis of circuitry or operation with measures against power attack
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/34—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
- G06Q20/341—Active cards, i.e. cards including their own processing means, e.g. including an IC or chip
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F7/00—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
- G07F7/08—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
- G07F7/0806—Details of the card
- G07F7/0813—Specific details related to card security
- G07F7/082—Features insuring the integrity of the data on or in the card
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F7/00—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
- G07F7/08—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
- G07F7/0806—Details of the card
- G07F7/0833—Card having specific functional components
- G07F7/084—Additional components relating to data transfer and storing, e.g. error detection, self-diagnosis
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F7/00—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
- G07F7/08—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
- G07F7/10—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data
- G07F7/1025—Identification of user by a PIN code
- G07F7/1083—Counting of PIN attempts
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/002—Countermeasures against attacks on cryptographic mechanisms
- H04L9/003—Countermeasures against attacks on cryptographic mechanisms for power analysis, e.g. differential power analysis [DPA] or simple power analysis [SPA]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0618—Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
- H04L9/0625—Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation with splitting of the data block into left and right halves, e.g. Feistel based algorithms, DES, FEAL, IDEA or KASUMI
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2207/00—Indexing scheme relating to methods or arrangements for processing data by operating upon the order or content of the data handled
- G06F2207/72—Indexing scheme relating to groups G06F7/72 - G06F7/729
- G06F2207/7219—Countermeasures against side channel or fault attacks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/16—Obfuscation or hiding, e.g. involving white box
Landscapes
- Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- Computer Security & Cryptography (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Computer Hardware Design (AREA)
- Signal Processing (AREA)
- Business, Economics & Management (AREA)
- Software Systems (AREA)
- General Engineering & Computer Science (AREA)
- Mathematical Physics (AREA)
- Microelectronics & Electronic Packaging (AREA)
- Accounting & Taxation (AREA)
- Strategic Management (AREA)
- General Business, Economics & Management (AREA)
- Storage Device Security (AREA)
Applications Claiming Priority (3)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US16104799P | 1999-10-25 | 1999-10-25 | |
| US60/161,047 | 1999-10-25 | ||
| PCT/ZA2000/000192 WO2001031422A2 (fr) | 1999-10-25 | 2000-10-19 | Procede permettant au traitement de donnees de resister a l'extraction de donnees par l'analyse de signaux de voies laterales indesirables |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| CA2388971A1 true CA2388971A1 (fr) | 2001-05-03 |
Family
ID=22579586
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| CA002388971A Abandoned CA2388971A1 (fr) | 1999-10-25 | 2000-10-19 | Procede permettant au traitement de donnees de resister a l'extraction de donnees par l'analyse de signaux de voies laterales indesirables |
Country Status (8)
| Country | Link |
|---|---|
| EP (1) | EP1226681A2 (fr) |
| JP (1) | JP2003513490A (fr) |
| CN (1) | CN1413398A (fr) |
| AU (1) | AU773982B2 (fr) |
| CA (1) | CA2388971A1 (fr) |
| EA (1) | EA003874B1 (fr) |
| WO (1) | WO2001031422A2 (fr) |
| ZA (1) | ZA200202798B (fr) |
Cited By (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN104104587A (zh) * | 2014-04-18 | 2014-10-15 | 天津大学 | 一种认证邮件协议的后一致性分析方法 |
| US9009495B2 (en) | 2013-06-28 | 2015-04-14 | Envieta, LLC | High speed cryptographic combining system, and method for programmable logic devices |
Families Citing this family (19)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US7142670B2 (en) * | 2001-08-14 | 2006-11-28 | International Business Machines Corporation | Space-efficient, side-channel attack resistant table lookups |
| WO2003075506A1 (fr) * | 2002-03-07 | 2003-09-12 | Axalto Sa | Procede permettant de securiser un ensemble electronique a cryptographie au moyen d'une cle secrete |
| FR2842376B1 (fr) * | 2002-07-10 | 2004-09-24 | Somfy | Procede de communication selective entre objets |
| EP1457858A1 (fr) * | 2003-03-14 | 2004-09-15 | SCHLUMBERGER Systèmes | Procédé de sécurisation d'un ensemble électronique à cryptoprocesseur |
| DE10341096A1 (de) * | 2003-09-05 | 2005-03-31 | Giesecke & Devrient Gmbh | Übergang zwischen maskierten Repräsentationen eines Wertes bei kryptographischen Berechnungen |
| JP4604045B2 (ja) * | 2003-11-13 | 2010-12-22 | マジック テクノロジーズ,インコーポレーテッド | 古典的なビット暗号化を有するqkd |
| KR101061906B1 (ko) * | 2004-02-19 | 2011-09-02 | 삼성전자주식회사 | 전력분석공격에 안전한 기본 연산 장치 및 방법 |
| EP1596278A1 (fr) * | 2004-05-11 | 2005-11-16 | Axalto SA | Procédé de protection d'un ensemble cryptographique par masquage homographique |
| FR2873523B1 (fr) * | 2004-07-22 | 2007-08-10 | Sagem | Procede et dispositif d'execution d'un calcul cryptographique |
| DE102004043243A1 (de) * | 2004-09-07 | 2006-03-23 | Comvenient Gmbh & Co. Kg | Verfahren zum Schutz von Schlüsseln |
| EP1646174A1 (fr) * | 2004-10-07 | 2006-04-12 | Axalto SA | Méthode et appareil pour générer un jeux d'instructions cryptographique automatiquement et génération d'un code |
| WO2006046187A1 (fr) * | 2004-10-28 | 2006-05-04 | Koninklijke Philips Electronics N.V. | Procede et systeme permettant d'assombrir une fonction cryptographique |
| JP2008181225A (ja) * | 2007-01-23 | 2008-08-07 | Toshiba Corp | Icカード |
| CN102016871B (zh) | 2008-03-05 | 2017-11-07 | 爱迪德技术有限公司 | 密码系统 |
| EP2525298B1 (fr) * | 2011-05-17 | 2016-07-13 | Nxp B.V. | Procédé d'authentification |
| EP2620890A1 (fr) * | 2012-01-25 | 2013-07-31 | Gemalto SA | Procédé de détection de défaillance injectée dans des registres de matériel d'un dispositif électronique |
| DE102012018924A1 (de) | 2012-09-25 | 2014-03-27 | Giesecke & Devrient Gmbh | Seitenkanalgeschützte Maskierung |
| JP6264935B2 (ja) * | 2014-02-24 | 2018-01-24 | 大日本印刷株式会社 | 情報処理装置の認証方法 |
| CN105757878B (zh) * | 2016-02-19 | 2018-07-27 | 广东美的暖通设备有限公司 | 通讯数据的编码及解码方法、装置和空调器 |
-
2000
- 2000-10-19 EA EA200200468A patent/EA003874B1/ru not_active IP Right Cessation
- 2000-10-19 CA CA002388971A patent/CA2388971A1/fr not_active Abandoned
- 2000-10-19 EP EP00986837A patent/EP1226681A2/fr not_active Withdrawn
- 2000-10-19 WO PCT/ZA2000/000192 patent/WO2001031422A2/fr not_active Ceased
- 2000-10-19 CN CN00817503A patent/CN1413398A/zh active Pending
- 2000-10-19 JP JP2001533494A patent/JP2003513490A/ja active Pending
- 2000-10-19 AU AU23014/01A patent/AU773982B2/en not_active Ceased
-
2002
- 2002-04-10 ZA ZA200202798A patent/ZA200202798B/xx unknown
Cited By (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US9009495B2 (en) | 2013-06-28 | 2015-04-14 | Envieta, LLC | High speed cryptographic combining system, and method for programmable logic devices |
| CN104104587A (zh) * | 2014-04-18 | 2014-10-15 | 天津大学 | 一种认证邮件协议的后一致性分析方法 |
| CN104104587B (zh) * | 2014-04-18 | 2017-12-26 | 天津大学 | 一种认证邮件协议的后一致性分析方法 |
Also Published As
| Publication number | Publication date |
|---|---|
| JP2003513490A (ja) | 2003-04-08 |
| EP1226681A2 (fr) | 2002-07-31 |
| WO2001031422A2 (fr) | 2001-05-03 |
| EA200200468A1 (ru) | 2002-10-31 |
| CN1413398A (zh) | 2003-04-23 |
| ZA200202798B (en) | 2003-09-23 |
| WO2001031422A3 (fr) | 2001-12-13 |
| AU773982B2 (en) | 2004-06-10 |
| WO2001031422B1 (fr) | 2002-01-10 |
| AU2301401A (en) | 2001-05-08 |
| EA003874B1 (ru) | 2003-10-30 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| AU773982B2 (en) | Method for making data processing resistant to extraction of data by analysis of unintended side-channel signals | |
| EP3337082B1 (fr) | Procédé et système de génération de clés à chiffres ronds par mélangeurs de bits | |
| Kumar et al. | Development of modified AES algorithm for data security | |
| US6278783B1 (en) | Des and other cryptographic, processes with leak minimization for smartcards and other cryptosystems | |
| US10313128B2 (en) | Address-dependent key generator by XOR tree | |
| CN104734845B (zh) | 基于全加密算法伪操作的旁路攻击防护方法 | |
| WO2001008012A1 (fr) | Procede et dispositif de prevention d'intrusion dans un ensemble micro-electronique par fuite d'information | |
| US9602281B2 (en) | Parallelizable cipher construction | |
| Shi et al. | Light-weight white-box encryption scheme with random padding for wearable consumer electronic devices | |
| GB2532835A (en) | Double-mix feistel network for key generation or encryption | |
| Shoukat et al. | Randomized substitution method for effectively secure block ciphers in IOT environment | |
| EP2363974A1 (fr) | Masquage de tables variable pour procédés cryptographiques | |
| Swayamprakash et al. | Design of Advanced Encryption Standard using Verilog HDL | |
| Yang et al. | WAS: improved white-box cryptographic algorithm over AS iteration | |
| Shiba et al. | Cubicle: A family of space‐hard ciphers for IoT | |
| Ghellar et al. | A novel AES cryptographic core highly resistant to differential power analysis attacks | |
| CN116796345A (zh) | 加解密方法、装置、设备及存储介质 | |
| Bronchain et al. | Moe: multiplication operated encryption with trojan resilience | |
| CN101364868A (zh) | 基于广义信息域的伪随机码发生器及其发生方法 | |
| Misra et al. | Analysing the parameters of chaos based image encryption schemes | |
| Alwakeel | A Novel Multilayered Encryption Model Featuring Dynamic Randomization and Adaptive Key Integration | |
| CN116961880A (zh) | 一种基于香农展开的白盒加密方法及系统 | |
| Garay et al. | MAC precomputation with applications to secure memory | |
| Novotný | Cryptanalytic attacks on cyber-physical systems | |
| CN121585368A (zh) | 一种基于不相交线性码的1阶弹性五谱值函数的构造方法 |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| FZDE | Discontinued |