FR2856538B1 - Procede de contre-mesure dans un composant electronique mettant en oeuvre un algorithme cryptographique du type a cle publique - Google Patents
Procede de contre-mesure dans un composant electronique mettant en oeuvre un algorithme cryptographique du type a cle publiqueInfo
- Publication number
- FR2856538B1 FR2856538B1 FR0307380A FR0307380A FR2856538B1 FR 2856538 B1 FR2856538 B1 FR 2856538B1 FR 0307380 A FR0307380 A FR 0307380A FR 0307380 A FR0307380 A FR 0307380A FR 2856538 B1 FR2856538 B1 FR 2856538B1
- Authority
- FR
- France
- Prior art keywords
- public key
- cryptographic algorithm
- electronic component
- key type
- countermeasure method
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/002—Countermeasures against attacks on cryptographic mechanisms
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F7/00—Methods or arrangements for processing data by operating upon the order or content of the data handled
- G06F7/60—Methods or arrangements for performing computations using a digital non-denominational number representation, i.e. number representation without radix; Computing devices using combinations of denominational and non-denominational quantity representations, e.g. using difunction pulse trains, STEELE computers, phase computers
- G06F7/72—Methods or arrangements for performing computations using a digital non-denominational number representation, i.e. number representation without radix; Computing devices using combinations of denominational and non-denominational quantity representations, e.g. using difunction pulse trains, STEELE computers, phase computers using residue arithmetic
- G06F7/723—Modular exponentiation
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F7/00—Methods or arrangements for processing data by operating upon the order or content of the data handled
- G06F7/60—Methods or arrangements for performing computations using a digital non-denominational number representation, i.e. number representation without radix; Computing devices using combinations of denominational and non-denominational quantity representations, e.g. using difunction pulse trains, STEELE computers, phase computers
- G06F7/72—Methods or arrangements for performing computations using a digital non-denominational number representation, i.e. number representation without radix; Computing devices using combinations of denominational and non-denominational quantity representations, e.g. using difunction pulse trains, STEELE computers, phase computers using residue arithmetic
- G06F7/724—Finite field arithmetic
- G06F7/725—Finite field arithmetic over elliptic curves
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
- H04L9/3006—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters
- H04L9/3013—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters involving the discrete logarithm problem, e.g. ElGamal or Diffie-Hellman systems
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
- H04L9/3066—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/04—Masking or blinding
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/12—Details relating to cryptographic hardware or logic circuitry
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Mathematical Analysis (AREA)
- Mathematical Optimization (AREA)
- Pure & Applied Mathematics (AREA)
- Computing Systems (AREA)
- Computational Mathematics (AREA)
- Computer Security & Cryptography (AREA)
- Mathematical Physics (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- General Engineering & Computer Science (AREA)
- Algebra (AREA)
- Complex Calculations (AREA)
- Storage Device Security (AREA)
Priority Applications (4)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| FR0307380A FR2856538B1 (fr) | 2003-06-18 | 2003-06-18 | Procede de contre-mesure dans un composant electronique mettant en oeuvre un algorithme cryptographique du type a cle publique |
| PCT/EP2004/051142 WO2004111833A1 (fr) | 2003-06-18 | 2004-06-17 | Procede de contre-mesure dans un composant electronique |
| EP04741817A EP1639450A1 (fr) | 2003-06-18 | 2004-06-17 | Procede de contre-mesure dans un composant electronique |
| US10/561,276 US20070121935A1 (en) | 2003-06-18 | 2004-06-17 | Method for countermeasuring in an electronic component |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| FR0307380A FR2856538B1 (fr) | 2003-06-18 | 2003-06-18 | Procede de contre-mesure dans un composant electronique mettant en oeuvre un algorithme cryptographique du type a cle publique |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| FR2856538A1 FR2856538A1 (fr) | 2004-12-24 |
| FR2856538B1 true FR2856538B1 (fr) | 2005-08-12 |
Family
ID=33484552
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| FR0307380A Expired - Fee Related FR2856538B1 (fr) | 2003-06-18 | 2003-06-18 | Procede de contre-mesure dans un composant electronique mettant en oeuvre un algorithme cryptographique du type a cle publique |
Country Status (4)
| Country | Link |
|---|---|
| US (1) | US20070121935A1 (fr) |
| EP (1) | EP1639450A1 (fr) |
| FR (1) | FR2856538B1 (fr) |
| WO (1) | WO2004111833A1 (fr) |
Families Citing this family (5)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CA2592875C (fr) * | 2005-01-18 | 2016-09-06 | Blackberry Limited | Verification acceleree de signatures numeriques et de cles publiques |
| US7912886B2 (en) * | 2006-12-14 | 2011-03-22 | Intel Corporation | Configurable exponent FIFO |
| EP2264939B1 (fr) * | 2008-03-31 | 2015-03-04 | Fujitsu Limited | Procédé de cryptage à fonction de contre-mesure contre les attaques par analyse de puissance |
| EP2169535A1 (fr) * | 2008-09-22 | 2010-03-31 | Thomson Licensing | Procédé, appareil et support de programme informatique pour le recodage régulier d'un entier positif |
| US9454494B2 (en) * | 2014-08-01 | 2016-09-27 | Honeywell International Inc. | Encrypting a communication from a device |
Family Cites Families (6)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| FR2784831B1 (fr) * | 1998-10-16 | 2000-12-15 | Gemplus Card Int | Procede de contre-mesure dans un composant electronique mettant en oeuvre un algorithme de cryptographie a cle secrete |
| US7599491B2 (en) * | 1999-01-11 | 2009-10-06 | Certicom Corp. | Method for strengthening the implementation of ECDSA against power analysis |
| DE19963408A1 (de) * | 1999-12-28 | 2001-08-30 | Giesecke & Devrient Gmbh | Tragbarer Datenträger mit Zugriffsschutz durch Schlüsselteilung |
| FR2810138B1 (fr) * | 2000-06-08 | 2005-02-11 | Bull Cp8 | Procede de stockage securise d'une donnee sensible dans une memoire d'un systeme embarque a puce electronique, notamment d'une carte a puce, et systeme embarque mettant en oeuvre le procede |
| US7127063B2 (en) * | 2001-12-31 | 2006-10-24 | Certicom Corp. | Method and apparatus for computing a shared secret key |
| US7551737B2 (en) * | 2003-03-31 | 2009-06-23 | International Business Machines Corporation | Cryptographic keys using random numbers instead of random primes |
-
2003
- 2003-06-18 FR FR0307380A patent/FR2856538B1/fr not_active Expired - Fee Related
-
2004
- 2004-06-17 EP EP04741817A patent/EP1639450A1/fr not_active Withdrawn
- 2004-06-17 US US10/561,276 patent/US20070121935A1/en not_active Abandoned
- 2004-06-17 WO PCT/EP2004/051142 patent/WO2004111833A1/fr not_active Ceased
Also Published As
| Publication number | Publication date |
|---|---|
| WO2004111833A1 (fr) | 2004-12-23 |
| FR2856538A1 (fr) | 2004-12-24 |
| EP1639450A1 (fr) | 2006-03-29 |
| US20070121935A1 (en) | 2007-05-31 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| DE602004004029D1 (de) | Verfahren zur Verteilung von Konferenzschlüsseln, gemäss einem Identitätsbasierten Verschlüsselungssystem. | |
| ATE518354T1 (de) | Verfahren und system zur bereitstellung von betrugserkennung für fernzugangs-dienste | |
| FR2809893B1 (fr) | Procede de contre-mesure dans un composant electronique mettant en oeuvre un algorithme de cryptographie a cle publique sur courbe elliptique | |
| ATE443886T1 (de) | Kryptografische verarbeitung von daten basierend auf der cassels-tate paarung | |
| WO2005025292A3 (fr) | Systeme et procede d'authentification apres evaluation des risques | |
| FR2926382B1 (fr) | Hierarchisation de cles cryptographiques dans un circuit electronique | |
| DE602004024896D1 (de) | Technik zum wählen von übertragungsparametern | |
| DE60308601D1 (de) | Verfahren und System zur Authentifizierung von Kommunikationsendgeräten | |
| DE602008005611D1 (de) | System und verfahren zur bereitstellung von fehlerdetektionsfähigkeit | |
| DE50311129D1 (de) | Verfahren und anordnung zur arithmetischen enkodierung und dekodierung von binären zuständen sowie ein entsprechendes computerprogramm und ein entsprechendes computerlesbares speichermedium | |
| FR2858496B1 (fr) | Procede pour la mise en oeuvre securisee d'un algorithme de cryptographie de type rsa et composant correspondant | |
| TW200520508A (en) | Authentication system | |
| ATE458219T1 (de) | Verfahren zur datenverarbeitung mit modularer potenzierung und dazugehörige vorrichtung | |
| FR2790890B1 (fr) | Procede de contre-mesure dans un composant electronique mettant en oeuvre un algorithme de cryptographie a cle secrete | |
| FR2856538B1 (fr) | Procede de contre-mesure dans un composant electronique mettant en oeuvre un algorithme cryptographique du type a cle publique | |
| DE50108011D1 (de) | Kryptographisches verfahren und kryptographische vorrichtung | |
| GB2428358B (en) | Crytographic system and method for encrypting input data | |
| DE60326707D1 (de) | Sches verfahren | |
| TW200514409A (en) | A system and associated methods to determine authentication priority between devices | |
| FR2856537B1 (fr) | Procede de contre-mesure par masquage de l'accumulateur dans un composant electronique mettant en oeuvre un algorithme de cryptographie a cle publique | |
| DE602004023811D1 (de) | Verfahren zur modularen Potenzierung zur Entschlüsselung bzw. zur Erzeugung von digitalen Signaturen | |
| ATE521943T1 (de) | Verfahren und vorrichtung zur zugriffssteuerung in wissensnetzen | |
| WO2007000701A3 (fr) | Dispositif et procede de protection de dispositif de traitement de donnees contre une attaque ou analyse | |
| DE60114474D1 (de) | Vorrichtung und verfahren zur zeitweiligen deaktivierung von teilnehmerinformationen | |
| ATE390782T1 (de) | Verfahren zur speicherung von botschaften in einem botschaftsspeicher und botschaftsspeicher |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| ST | Notification of lapse |
Effective date: 20090228 |