SK2892002A3 - Multiple module encryption method - Google Patents

Multiple module encryption method Download PDF

Info

Publication number
SK2892002A3
SK2892002A3 SK289-2002A SK2892002A SK2892002A3 SK 2892002 A3 SK2892002 A3 SK 2892002A3 SK 2892002 A SK2892002 A SK 2892002A SK 2892002 A3 SK2892002 A3 SK 2892002A3
Authority
SK
Slovakia
Prior art keywords
module
encryption
decryption
key
modules
Prior art date
Application number
SK289-2002A
Other languages
English (en)
Slovak (sk)
Inventor
Marco Sasselli
Christophe Nicolas
Michael John Hill
Original Assignee
Nagracard Sa
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nagracard Sa filed Critical Nagracard Sa
Publication of SK2892002A3 publication Critical patent/SK2892002A3/sk

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/002Countermeasures against attacks on cryptographic mechanisms
    • H04L9/003Countermeasures against attacks on cryptographic mechanisms for power analysis, e.g. differential power analysis [DPA] or simple power analysis [SPA]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/14Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/50Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Storage Device Security (AREA)
  • Compression, Expansion, Code Conversion, And Decoders (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Slot Machines And Peripheral Devices (AREA)
  • Coupling Device And Connection With Printed Circuit (AREA)
SK289-2002A 1999-08-30 2000-08-24 Multiple module encryption method SK2892002A3 (en)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
CH157399 1999-08-30
US19417100P 2000-04-03 2000-04-03
PCT/IB2000/001157 WO2001017159A1 (fr) 1999-08-30 2000-08-24 Methode d'encryptage multi-modules

Publications (1)

Publication Number Publication Date
SK2892002A3 true SK2892002A3 (en) 2002-07-02

Family

ID=25688037

Family Applications (1)

Application Number Title Priority Date Filing Date
SK289-2002A SK2892002A3 (en) 1999-08-30 2000-08-24 Multiple module encryption method

Country Status (27)

Country Link
EP (1) EP1208666A1 (es)
JP (1) JP2003508965A (es)
KR (1) KR20020041807A (es)
CN (1) CN100448193C (es)
AP (1) AP2002002433A0 (es)
AU (1) AU769437B2 (es)
BG (1) BG64520B1 (es)
BR (1) BR0013712A (es)
CA (1) CA2383042A1 (es)
CU (1) CU22950A3 (es)
CZ (1) CZ2002582A3 (es)
DZ (1) DZ3193A1 (es)
EA (1) EA003745B1 (es)
EE (1) EE200200106A (es)
HK (1) HK1048407B (es)
HR (1) HRP20020179A2 (es)
HU (1) HU224846B1 (es)
IL (1) IL148285A0 (es)
MA (1) MA25431A1 (es)
MX (1) MXPA02001849A (es)
NO (1) NO20020951L (es)
NZ (1) NZ517438A (es)
OA (1) OA12153A (es)
PL (1) PL353795A1 (es)
SK (1) SK2892002A3 (es)
TR (1) TR200200525T2 (es)
WO (1) WO2001017159A1 (es)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7409562B2 (en) 2001-09-21 2008-08-05 The Directv Group, Inc. Method and apparatus for encrypting media programs for later purchase and viewing
US8775319B2 (en) 2006-05-15 2014-07-08 The Directv Group, Inc. Secure content transfer systems and methods to operate the same
US10397258B2 (en) 2017-01-30 2019-08-27 Microsoft Technology Licensing, Llc Continuous learning for intrusion detection

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5594797A (en) * 1995-02-22 1997-01-14 Nokia Mobile Phones Variable security level encryption
DE19539700C1 (de) * 1995-10-25 1996-11-28 Siemens Ag Sicherheitschip

Also Published As

Publication number Publication date
HUP0202691A2 (en) 2002-12-28
DZ3193A1 (fr) 2001-03-08
IL148285A0 (en) 2002-09-12
HK1048407B (zh) 2009-09-25
CN1371563A (zh) 2002-09-25
CA2383042A1 (en) 2001-03-08
KR20020041807A (ko) 2002-06-03
PL353795A1 (en) 2003-12-01
EP1208666A1 (fr) 2002-05-29
WO2001017159A1 (fr) 2001-03-08
AP2002002433A0 (en) 2002-03-31
AU6311800A (en) 2001-03-26
MXPA02001849A (es) 2004-02-26
OA12153A (fr) 2006-05-08
CU22950A3 (es) 2004-04-13
CZ2002582A3 (cs) 2002-07-17
NZ517438A (en) 2003-09-26
EA003745B1 (ru) 2003-08-28
JP2003508965A (ja) 2003-03-04
AU769437B2 (en) 2004-01-29
EA200200184A1 (ru) 2002-06-27
NO20020951L (no) 2002-04-23
HU224846B1 (en) 2006-03-28
BG64520B1 (bg) 2005-05-31
BG106436A (en) 2002-10-31
CN100448193C (zh) 2008-12-31
MA25431A1 (fr) 2002-04-01
TR200200525T2 (tr) 2002-07-22
HK1048407A1 (zh) 2003-03-28
EE200200106A (et) 2003-04-15
HRP20020179A2 (en) 2004-02-29
BR0013712A (pt) 2002-05-07
NO20020951D0 (no) 2002-02-27

Similar Documents

Publication Publication Date Title
US8296577B2 (en) Cryptographic bus architecture for the prevention of differential power analysis
Messerges Power analysis attacks and countermeasures for cryptographic algorithms
US8422671B2 (en) Methods of encryption and decryption using operand ordering and encryption systems using the same
EP1234404B1 (en) Generation of a mathematically constrained key using a one-way function
Shah et al. An efficient audio encryption scheme based on finite fields
EP2154604A1 (en) Countermeasure securing exponentiation based cryptography
KR100546375B1 (ko) 자체 오류 감지 기능을 강화한 상호 의존적 병렬 연산방식의 하드웨어 암호화 장치 및 그 하드웨어 암호화 방법
US7123717B1 (en) Countermeasure method in an electronic component which uses an RSA-type public key cryptographic algorithm
Guilley et al. Defeating any secret cryptography with SCARE attacks
Mukherjee et al. A counter measure to prevent timing-based side-channel attack on FPGA
Malkin et al. A cryptographic method for secure watermark detection
US7190790B1 (en) Multiple module encryption method
US20060153372A1 (en) Smart card and method protecting secret key
SK2892002A3 (en) Multiple module encryption method
WO2017114739A1 (en) System and method for hiding a cryptographic secret using expansion
Matthews Low cost attacks on smart cards: the electromagnetic sidechannel
Ahmed et al. Implementation of rc5 block cipher algorithm for image cryptosystems
Alexandru-Vasile Ransomware data recovery techniques
Shoukat et al. Effective evaluation metrics for the assessment of cryptographic algorithms and key exchange tactics
Altigani et al. Evaluating AES Performance Using NIST Recommended Block Cipher Modes of Operation
Babash Automata Under Effective Observation
Klaib et al. Empirical Comparison Study of RC4 and RSA Algorithms
Belferdi et al. A novel Cholesky decomposition-based scheme for strict image authentication
Abubakar et al. A Cryptanalytic Approach to Breaking RSA Encryption Using Public Key, with Proposed Improvement Leveraging Prime Number Distribution Patterns
Raja Durai et al. Enhancing RSA with Random Insertion Method: A New Approach to Secure Cryptography