WO2005069122A3 - Procede cryptographique d'exponentiation modulaire protege contre les attaques de type dpa - Google Patents
Procede cryptographique d'exponentiation modulaire protege contre les attaques de type dpa Download PDFInfo
- Publication number
- WO2005069122A3 WO2005069122A3 PCT/EP2004/053472 EP2004053472W WO2005069122A3 WO 2005069122 A3 WO2005069122 A3 WO 2005069122A3 EP 2004053472 W EP2004053472 W EP 2004053472W WO 2005069122 A3 WO2005069122 A3 WO 2005069122A3
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- bits
- accumulator
- modular exponentiation
- protected against
- against dpa
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Ceased
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F7/00—Methods or arrangements for processing data by operating upon the order or content of the data handled
- G06F7/60—Methods or arrangements for performing computations using a digital non-denominational number representation, i.e. number representation without radix; Computing devices using combinations of denominational and non-denominational quantity representations, e.g. using difunction pulse trains, STEELE computers, phase computers
- G06F7/72—Methods or arrangements for performing computations using a digital non-denominational number representation, i.e. number representation without radix; Computing devices using combinations of denominational and non-denominational quantity representations, e.g. using difunction pulse trains, STEELE computers, phase computers using residue arithmetic
- G06F7/723—Modular exponentiation
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/72—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in cryptographic circuits
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2207/00—Indexing scheme relating to methods or arrangements for processing data by operating upon the order or content of the data handled
- G06F2207/72—Indexing scheme relating to groups G06F7/72 - G06F7/729
- G06F2207/7276—Additional details of aspects covered by group G06F7/723
- G06F2207/7285—Additional details of aspects covered by group G06F7/723 using the window method, i.e. left-to-right k-ary exponentiation
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F7/00—Methods or arrangements for processing data by operating upon the order or content of the data handled
- G06F7/60—Methods or arrangements for performing computations using a digital non-denominational number representation, i.e. number representation without radix; Computing devices using combinations of denominational and non-denominational quantity representations, e.g. using difunction pulse trains, STEELE computers, phase computers
- G06F7/72—Methods or arrangements for performing computations using a digital non-denominational number representation, i.e. number representation without radix; Computing devices using combinations of denominational and non-denominational quantity representations, e.g. using difunction pulse trains, STEELE computers, phase computers using residue arithmetic
- G06F7/724—Finite field arithmetic
- G06F7/725—Finite field arithmetic over elliptic curves
Landscapes
- Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Pure & Applied Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Computational Mathematics (AREA)
- Mathematical Analysis (AREA)
- Mathematical Optimization (AREA)
- Mathematical Physics (AREA)
- Software Systems (AREA)
- Computer Security & Cryptography (AREA)
- Computing Systems (AREA)
- Storage Device Security (AREA)
- Complex Calculations (AREA)
Abstract
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| EP04804829A EP1695204A2 (fr) | 2003-12-19 | 2004-12-14 | Procede d'exponentiation modulaire protege contre les attaques du type dpa |
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| FR0314959 | 2003-12-19 | ||
| FR0314959A FR2864390B1 (fr) | 2003-12-19 | 2003-12-19 | Procede cryptographique d'exponentiation modulaire protege contre les attaques de type dpa. |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| WO2005069122A2 WO2005069122A2 (fr) | 2005-07-28 |
| WO2005069122A3 true WO2005069122A3 (fr) | 2006-06-01 |
Family
ID=34630319
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| PCT/EP2004/053472 Ceased WO2005069122A2 (fr) | 2003-12-19 | 2004-12-14 | Procede cryptographique d'exponentiation modulaire protege contre les attaques de type dpa |
Country Status (4)
| Country | Link |
|---|---|
| EP (1) | EP1695204A2 (fr) |
| CN (1) | CN1918543A (fr) |
| FR (1) | FR2864390B1 (fr) |
| WO (1) | WO2005069122A2 (fr) |
Families Citing this family (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| FR2888690A1 (fr) * | 2005-07-13 | 2007-01-19 | Gemplus Sa | Procede cryptographique pour la mise en oeuvre securisee d'une exponentiation et composant associe |
| JP5482048B2 (ja) * | 2009-09-18 | 2014-04-23 | ソニー株式会社 | 集積回路および電子機器 |
| FR2972064B1 (fr) * | 2011-02-25 | 2013-03-15 | Inside Secure | Procede de cryptographie comprenant une operation d'exponentiation |
Citations (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| WO2001031436A1 (fr) * | 1999-10-28 | 2001-05-03 | Bull Cp8 | Procede de securisation d'un ensemble electronique de cryptographie a base d'exponentiation modulaire contre les attaques par analyse physique |
| FR2829646A1 (fr) * | 2001-09-07 | 2003-03-14 | Gemplus Card Int | Procede securise de mise en oeuvre d'un algorithme de cryptographie et composant correspondant |
-
2003
- 2003-12-19 FR FR0314959A patent/FR2864390B1/fr not_active Expired - Fee Related
-
2004
- 2004-12-14 EP EP04804829A patent/EP1695204A2/fr not_active Withdrawn
- 2004-12-14 CN CN 200480041877 patent/CN1918543A/zh active Pending
- 2004-12-14 WO PCT/EP2004/053472 patent/WO2005069122A2/fr not_active Ceased
Patent Citations (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| WO2001031436A1 (fr) * | 1999-10-28 | 2001-05-03 | Bull Cp8 | Procede de securisation d'un ensemble electronique de cryptographie a base d'exponentiation modulaire contre les attaques par analyse physique |
| FR2829646A1 (fr) * | 2001-09-07 | 2003-03-14 | Gemplus Card Int | Procede securise de mise en oeuvre d'un algorithme de cryptographie et composant correspondant |
Non-Patent Citations (4)
| Title |
|---|
| CHEVALLIER-MAMES B: "Self-randomized exponentiation algorithms", TOPICS IN CRYPTOLOGY - CT-RSA 2004. PROCEEDINGS. SPRINGER-VERLAG, LECTURE NOTES IN COMPUTER SCIENCE, vol. 2964, 27 February 2004 (2004-02-27), BERLIN, GERMANY, pages 236 - 249, XP002297836, ISBN: 3-540-20996-4 * |
| ITOH K ET AL: "DPA COUNTERMEASURES BY IMPROVING THE WINDOW METHOD", CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS. INTERNATIONAL WORKSHOP, XX, XX, 13 August 2002 (2002-08-13), pages 303 - 317, XP001160529 * |
| JOYE M: "Recovering lost efficiency of exponentiation algorithms on smart cards", ELECTRONICS LETTERS, IEE STEVENAGE, GB, vol. 38, no. 19, 12 September 2002 (2002-09-12), pages 1095 - 1097, XP006019065, ISSN: 0013-5194 * |
| WALTER C D: "MIST: AN EFFICIENT, RANDOMIZED EXPONENTIATION ALGORITHM FOR RESISTING POWER ANALYSIS", LECTURE NOTES IN COMPUTER SCIENCE, SPRINGER VERLAG, NEW YORK, NY, US, vol. 2271, 18 February 2002 (2002-02-18), pages 53 - 66, XP008004946, ISSN: 0302-9743 * |
Also Published As
| Publication number | Publication date |
|---|---|
| CN1918543A (zh) | 2007-02-21 |
| FR2864390B1 (fr) | 2006-03-31 |
| EP1695204A2 (fr) | 2006-08-30 |
| WO2005069122A2 (fr) | 2005-07-28 |
| FR2864390A1 (fr) | 2005-06-24 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| EP3188001B1 (fr) | Procédé et dispositif de multiplication modulaire | |
| EP2290525A3 (fr) | Unité de réduction de processeur permettant d'accumuler de multiples opérandes avec ou sans saturation | |
| WO2004114045A3 (fr) | Technique d'appariement en deux phases de valeurs de hachage dans des systemes de protection de messages | |
| WO2008007305A3 (fr) | Vérification de l'authenticité d'un environnement d'exécution | |
| WO2008060290A3 (fr) | Système et procédé pour générer un nombre imprévisible en utilisant un algorithme ensemencé | |
| CA2522046A1 (fr) | Procedes et appareil d'administration sure et adaptative d'un contenu multimedia | |
| US20150063561A1 (en) | Protection of a calculation against side-channel attacks | |
| EP1160661A3 (fr) | Procédé pour la multiplication scalaire sur une courbe elliptique et dispositif correspondant | |
| WO2005006109A3 (fr) | Systeme et procede d'authentification de logiciel au moyen de cles intermediaires cachees | |
| WO2003023605A3 (fr) | Dispositif et procede pour calculer le resultat d'une exponentiation modulaire | |
| WO2013043405A3 (fr) | Exponentiation modulaire comportant un stockage partitionné et dispersé de résultats de multiplication de montgomery | |
| JP2002258743A5 (fr) | ||
| WO2003001362A3 (fr) | Procede et un appareil permettant d'effectuer efficacement des calculs arithmetique dans un materiel informatique | |
| CN101213513B (zh) | 保护数据处理装置免受密码攻击或分析的设备和方法 | |
| TW200703037A (en) | Cryptographically secure modular polynomial reduction method and computational hardware for executing the same | |
| US20070064930A1 (en) | Modular exponentiation with randomized exponent | |
| WO2004112306A3 (fr) | Methode de defense contre des attaques se manifestant par une analyse de courant differentielle | |
| WO2005069122A3 (fr) | Procede cryptographique d'exponentiation modulaire protege contre les attaques de type dpa | |
| CA2259089C (fr) | Methode et appareillage de masquage des operations cryptographiques | |
| WO2005055027A3 (fr) | Procedes et appareil de generation d'un retard au moyen d'un compteur | |
| WO2004046017A3 (fr) | Procede de division entiere securise contre les attaques a canaux caches | |
| NO20030415D0 (no) | Kryptografisk privat nökkellagring og fremgangsmåte og apparat for gjenvinning av denne | |
| JP2004226674A (ja) | 情報処理方法 | |
| Goldston | Linnik's theorem on Goldbach numbers in short intervals | |
| FR2884088A1 (fr) | Procede et dispositif cryptographique permettant de proteger les logiques de cles publiques contre les attaques par faute |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| AK | Designated states |
Kind code of ref document: A2 Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BW BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE EG ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NA NI NO NZ OM PG PH PL PT RO RU SC SD SE SG SK SL SY TJ TM TN TR TT TZ UA UG US UZ VC VN YU ZA ZM ZW |
|
| AL | Designated countries for regional patents |
Kind code of ref document: A2 Designated state(s): GM KE LS MW MZ NA SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IS IT LT LU MC NL PL PT RO SE SI SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG |
|
| 121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
| WWE | Wipo information: entry into national phase |
Ref document number: 2004804829 Country of ref document: EP |
|
| WWE | Wipo information: entry into national phase |
Ref document number: 2006544433 Country of ref document: JP |
|
| NENP | Non-entry into the national phase |
Ref country code: DE |
|
| WWW | Wipo information: withdrawn in national office |
Country of ref document: DE |
|
| WWE | Wipo information: entry into national phase |
Ref document number: 200480041877.X Country of ref document: CN |
|
| WWP | Wipo information: published in national office |
Ref document number: 2004804829 Country of ref document: EP |
|
| WWW | Wipo information: withdrawn in national office |
Ref document number: 2004804829 Country of ref document: EP |