ATE434879T1 - Gegenmassnahmen in einem elektronischen baustein zur ausführung eines krypto-algorithmus mit auf elliptischen kurven basierendem öffentlichem schlüssel - Google Patents
Gegenmassnahmen in einem elektronischen baustein zur ausführung eines krypto-algorithmus mit auf elliptischen kurven basierendem öffentlichem schlüsselInfo
- Publication number
- ATE434879T1 ATE434879T1 AT00910928T AT00910928T ATE434879T1 AT E434879 T1 ATE434879 T1 AT E434879T1 AT 00910928 T AT00910928 T AT 00910928T AT 00910928 T AT00910928 T AT 00910928T AT E434879 T1 ATE434879 T1 AT E434879T1
- Authority
- AT
- Austria
- Prior art keywords
- public key
- countermeasures
- executing
- electronic device
- algorithms
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F7/00—Methods or arrangements for processing data by operating upon the order or content of the data handled
- G06F7/60—Methods or arrangements for performing computations using a digital non-denominational number representation, i.e. number representation without radix; Computing devices using combinations of denominational and non-denominational quantity representations, e.g. using difunction pulse trains, STEELE computers, phase computers
- G06F7/72—Methods or arrangements for performing computations using a digital non-denominational number representation, i.e. number representation without radix; Computing devices using combinations of denominational and non-denominational quantity representations, e.g. using difunction pulse trains, STEELE computers, phase computers using residue arithmetic
- G06F7/724—Finite field arithmetic
- G06F7/725—Finite field arithmetic over elliptic curves
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/002—Countermeasures against attacks on cryptographic mechanisms
- H04L9/003—Countermeasures against attacks on cryptographic mechanisms for power analysis, e.g. differential power analysis [DPA] or simple power analysis [SPA]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
- H04L9/3066—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2207/00—Indexing scheme relating to methods or arrangements for processing data by operating upon the order or content of the data handled
- G06F2207/72—Indexing scheme relating to groups G06F7/72 - G06F7/729
- G06F2207/7219—Countermeasures against side channel or fault attacks
- G06F2207/7223—Randomisation as countermeasure against side channel attacks
- G06F2207/7228—Random curve mapping, e.g. mapping to an isomorphous or projective curve
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/08—Randomization, e.g. dummy operations or using noise
Landscapes
- Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Pure & Applied Mathematics (AREA)
- Mathematical Analysis (AREA)
- Mathematical Optimization (AREA)
- Computer Security & Cryptography (AREA)
- Signal Processing (AREA)
- Computing Systems (AREA)
- Mathematical Physics (AREA)
- Computational Mathematics (AREA)
- Computer Networks & Wireless Communication (AREA)
- General Engineering & Computer Science (AREA)
- Algebra (AREA)
- Complex Calculations (AREA)
- Credit Cards Or The Like (AREA)
- Storage Device Security (AREA)
- Studio Circuits (AREA)
- Image Processing (AREA)
- Facsimile Image Signal Circuits (AREA)
- Lock And Its Accessories (AREA)
- Photoreceptors In Electrophotography (AREA)
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
FR9903921A FR2791497B1 (fr) | 1999-03-26 | 1999-03-26 | Procedes de contre-mesure dans un composant electronique mettant en oeuvre un algorithme de crytographie a cle publique de type courbe elliptique |
PCT/FR2000/000603 WO2000059156A1 (fr) | 1999-03-26 | 2000-03-13 | Procedes de contre-mesure dans un composant electronique mettant en oeuvre un algorithme de cryptographie a cle publique de type courbe elliptique |
Publications (1)
Publication Number | Publication Date |
---|---|
ATE434879T1 true ATE434879T1 (de) | 2009-07-15 |
Family
ID=9543775
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
AT00910928T ATE434879T1 (de) | 1999-03-26 | 2000-03-13 | Gegenmassnahmen in einem elektronischen baustein zur ausführung eines krypto-algorithmus mit auf elliptischen kurven basierendem öffentlichem schlüssel |
Country Status (11)
Country | Link |
---|---|
US (1) | US7162033B1 (de) |
EP (1) | EP1166494B1 (de) |
JP (1) | JP2002540483A (de) |
CN (1) | CN1345495A (de) |
AT (1) | ATE434879T1 (de) |
AU (1) | AU3296500A (de) |
DE (1) | DE60042448D1 (de) |
ES (1) | ES2331456T3 (de) |
FR (1) | FR2791497B1 (de) |
MX (1) | MXPA01009498A (de) |
WO (1) | WO2000059156A1 (de) |
Families Citing this family (29)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP3796993B2 (ja) | 1998-12-22 | 2006-07-12 | 株式会社日立製作所 | 楕円曲線暗号実行方法及び装置並びに記録媒体 |
FR2828779B1 (fr) * | 2001-08-17 | 2004-01-16 | Gemplus Card Int | Procede de calcul universel applique a des points d'une courbe elliptique |
EP1648111B1 (de) * | 2003-07-22 | 2014-01-15 | Fujitsu Limited | Manipulationsbeständige verschlüsselung mit geheimem schlüssel |
JP4284320B2 (ja) | 2003-08-06 | 2009-06-24 | 富士通株式会社 | 楕円曲線暗号装置,楕円曲線暗号方法および楕円曲線暗号プログラム |
US7379546B2 (en) * | 2004-03-03 | 2008-05-27 | King Fahd University Of Petroleum And Minerals | Method for XZ-elliptic curve cryptography |
US7961874B2 (en) * | 2004-03-03 | 2011-06-14 | King Fahd University Of Petroleum & Minerals | XZ-elliptic curve cryptography with secret key embedding |
US7961873B2 (en) * | 2004-03-03 | 2011-06-14 | King Fahd University Of Petroleum And Minerals | Password protocols using XZ-elliptic curve cryptography |
JP5147412B2 (ja) * | 2005-01-21 | 2013-02-20 | サーティコム コーポレーション | 楕円曲線乱数生成 |
KR100723863B1 (ko) * | 2005-11-12 | 2007-05-31 | 한국전자통신연구원 | 랜덤화한 프로베니우스 분해방법을 이용한 차분 공격 방지방법 및 그 장치 |
JP4513752B2 (ja) * | 2006-01-16 | 2010-07-28 | ソニー株式会社 | 暗号処理装置、および暗号処理方法、並びにコンピュータ・プログラム |
JP4682852B2 (ja) * | 2006-01-16 | 2011-05-11 | ソニー株式会社 | 暗号処理装置、および暗号処理方法、並びにコンピュータ・プログラム |
DE102006013515A1 (de) * | 2006-03-23 | 2007-10-04 | Siemens Ag | Kryptographisches Verfahren mit elliptischen Kurven |
US8559625B2 (en) * | 2007-08-07 | 2013-10-15 | Inside Secure | Elliptic curve point transformations |
US7991162B2 (en) | 2007-09-14 | 2011-08-02 | University Of Ottawa | Accelerating scalar multiplication on elliptic curve cryptosystems over prime fields |
US8233615B2 (en) | 2008-01-15 | 2012-07-31 | Inside Secure | Modular reduction using a special form of the modulus |
US8619977B2 (en) * | 2008-01-15 | 2013-12-31 | Inside Secure | Representation change of a point on an elliptic curve |
CN101630244B (zh) * | 2009-07-28 | 2012-05-23 | 哈尔滨工业大学深圳研究生院 | 一种流水线型椭圆曲线双标量乘法系统及方法 |
JP5323196B2 (ja) | 2009-09-18 | 2013-10-23 | 株式会社東芝 | 演算装置、方法およびプログラム |
US8699701B2 (en) | 2010-12-01 | 2014-04-15 | King Fahd University | Method of performing XZ-elliptic curve cryptography for use with network security protocols |
US8509426B1 (en) | 2010-12-01 | 2013-08-13 | King Fahd University Of Petroleum And Minerals | XZ-elliptic curve cryptography system and method |
US8413906B2 (en) | 2011-05-22 | 2013-04-09 | King Saud University | Countermeasures to secure smart cards |
CN102394747B (zh) * | 2011-11-23 | 2015-01-14 | 上海爱信诺航芯电子科技有限公司 | 一种快速嵌入明文到椭圆曲线上一点的方法 |
FR3024808B1 (fr) * | 2014-08-05 | 2016-07-29 | Inside Secure | Procede de cryptographie sur courbe elliptique comprenant une detection d’erreur |
US9419789B2 (en) | 2014-09-05 | 2016-08-16 | Umm Al-Qura University | Method and apparatus for scalar multiplication secure against differential power attacks |
US9645794B2 (en) * | 2014-09-23 | 2017-05-09 | Texas Instruments Incorporated | Homogeneous atomic pattern for double, add, and subtract operations for digital authentication using elliptic curve cryptography |
FR3033965B1 (fr) * | 2015-03-18 | 2018-12-07 | Maxim Integrated Products, Inc. | Systèmes et procédés de commande de dispositifs de cryptage sur courbe elliptique sécurisés |
US10181944B2 (en) | 2015-06-16 | 2019-01-15 | The Athena Group, Inc. | Minimizing information leakage during modular exponentiation and elliptic curve point multiplication |
EP3220305B1 (de) * | 2016-02-22 | 2018-10-31 | Eshard | Verfahren zur prüfung des widerstands einer schaltung zu einer seitenkanalanalyse von zweiter ordnung oder mehr |
US11146397B2 (en) * | 2017-10-31 | 2021-10-12 | Micro Focus Llc | Encoding abelian variety-based ciphertext with metadata |
Family Cites Families (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6307935B1 (en) * | 1991-09-17 | 2001-10-23 | Apple Computer, Inc. | Method and apparatus for fast elliptic encryption with direct embedding |
US5497423A (en) * | 1993-06-18 | 1996-03-05 | Matsushita Electric Industrial Co., Ltd. | Method of implementing elliptic curve cryptosystems in digital signatures or verification and privacy communication |
WO1996004602A1 (en) * | 1994-07-29 | 1996-02-15 | Certicom Corp. | Elliptic curve encryption systems |
-
1999
- 1999-03-26 FR FR9903921A patent/FR2791497B1/fr not_active Expired - Fee Related
-
2000
- 2000-03-13 CN CN00805495A patent/CN1345495A/zh active Pending
- 2000-03-13 AU AU32965/00A patent/AU3296500A/en not_active Abandoned
- 2000-03-13 JP JP2000608545A patent/JP2002540483A/ja active Pending
- 2000-03-13 ES ES00910928T patent/ES2331456T3/es not_active Expired - Lifetime
- 2000-03-13 DE DE60042448T patent/DE60042448D1/de not_active Expired - Lifetime
- 2000-03-13 EP EP00910928A patent/EP1166494B1/de not_active Expired - Lifetime
- 2000-03-13 WO PCT/FR2000/000603 patent/WO2000059156A1/fr active Application Filing
- 2000-03-13 MX MXPA01009498A patent/MXPA01009498A/es active IP Right Grant
- 2000-03-13 US US09/937,396 patent/US7162033B1/en not_active Expired - Fee Related
- 2000-03-13 AT AT00910928T patent/ATE434879T1/de not_active IP Right Cessation
Also Published As
Publication number | Publication date |
---|---|
EP1166494A1 (de) | 2002-01-02 |
EP1166494B1 (de) | 2009-06-24 |
US7162033B1 (en) | 2007-01-09 |
CN1345495A (zh) | 2002-04-17 |
WO2000059156A1 (fr) | 2000-10-05 |
JP2002540483A (ja) | 2002-11-26 |
MXPA01009498A (es) | 2002-06-04 |
FR2791497A1 (fr) | 2000-09-29 |
DE60042448D1 (de) | 2009-08-06 |
ES2331456T3 (es) | 2010-01-05 |
FR2791497B1 (fr) | 2001-05-18 |
AU3296500A (en) | 2000-10-16 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
ATE434879T1 (de) | Gegenmassnahmen in einem elektronischen baustein zur ausführung eines krypto-algorithmus mit auf elliptischen kurven basierendem öffentlichem schlüssel | |
Medwed et al. | Template attacks on ECDSA | |
EP2207087B1 (de) | Verfahren zum Schutz einer kryptografischen Vorrichtung gegen SPA-, DPA- und Zeitangriffe | |
EP2820791B1 (de) | Gegenmassnahmeverfahren gegen seitenkanalanalyse auf kryptografische algorithmen mithilfe boolescher operationen und arithmetischer operationen | |
HK1076883A1 (en) | Trusted system clock | |
CN1415147A (zh) | 具有通过密钥再分进行存取保护的便携式数据存储介质 | |
CN1355974A (zh) | 密码操作里的电能攻击和时间攻击的对策 | |
Savari et al. | Comparison of ECC and RSA algorithm in multipurpose smart card application | |
KR101334040B1 (ko) | 대칭키 암호화 시스템의 마스킹 연산 방법 및 장치 | |
US20080022126A1 (en) | Method to Protect a Cryptographic Assembly by Homographic Masking | |
CN106357378A (zh) | 用于sm2签名的密钥检测方法及其系统 | |
WO2011061263A1 (en) | Countermeasures against power attacks for the randomization of the exponent | |
Izumi et al. | Improved countermeasure against Address-bit DPA for ECC scalar multiplication | |
Leng | Smart card applications and security | |
Pereida García et al. | Size, speed, and security: An Ed25519 case study | |
CN105743644B (zh) | 一种多变量二次方程的掩码加密装置 | |
US10305678B2 (en) | Imbalanced montgomery ladder | |
CN104125061A (zh) | 使用rsa加密算法的电子部件中的防攻击方法 | |
Sim et al. | Study for improving attack complexity against RSA collision analysis | |
EP4372548A1 (de) | Schutz von kryptographischen vorgängen vor horizontalen seitenkanal-analyse-angriffen | |
Pontie et al. | Randomized windows for secure scalar multiplication on elliptic curves | |
Jin et al. | Resistance DPA of RSA on Smartcard | |
EP1201056B1 (de) | Verfahren zum schutz einer tragbaren karte | |
Chen et al. | Mind your nonces moving: Template-based partially-sharing nonces attack on SM2 digital signature algorithm | |
Prabu et al. | An overview of side channel attacks and its countermeasures using elliptic curve cryptography |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
RER | Ceased as to paragraph 5 lit. 3 law introducing patent treaties |