会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 4. 发明专利
    • Encryption processor
    • 加密处理器
    • JP2010034682A
    • 2010-02-12
    • JP2008192356
    • 2008-07-25
    • Dainippon Printing Co Ltd大日本印刷株式会社
    • OKI SHUICHI
    • H04L9/10
    • G06F7/723G06F2207/7219
    • PROBLEM TO BE SOLVED: To prevent any side channel attack without altering the arithmetic formula itself of encryption. SOLUTION: A numerical value M is applied to an input part 110, a numerical value C is determined by performing an exponentiation remainder operation using a secret key D by an arithmetic execution part 130, and the numerical value C is output from an output part 120. The secret key D expressed by binary digits is read from a storage part 150, and a numerical value d of one digit is re-encoded into a redundant k-order digit which becomes a value within the range of "0≤d≤dmax (dmax>k-1)" by a re-encoding part 140. In this case, since re-encoding using a random number R generated by a random number generation part 160 is performed, the numerical value of each digit configuring the secret key D to be used for an actual arithmetic operation by an arithmetic execution part 130 is selected at random each time. Even when an arithmetic operation based on the same arithmetic formula is performed by using the same numerical value D to the same numerical value M by the arithmetic execution part 130, a power consumption pattern is made different each time, and analysis based on power consumption is invalidated. COPYRIGHT: (C)2010,JPO&INPIT
    • 要解决的问题:防止任何侧面信道攻击而不改变算术公式本身的加密。 解决方案:将数值M应用于输入部分110,通过算术执行部分130通过使用秘密密钥D执行求幂余数运算来确定数值C,并且从数字值C输出数值C 从存储部分150读取由二进制数字表示的秘密密钥D,并且将一位数字的数值d重新编码为冗余k位数,其变为“0≤ d≤dmax(dmax> k-1)“。在这种情况下,由于执行由随机数生成部160生成的随机数R的重新编码,所以每个数字的数值配置 每次随机选择用于算术执行部件130的实际算术运算的秘密密钥D. 即使当通过算术执行部130将相同的数值D与相同的数值M进行相同的运算公式的运算时,也可以每次都使功耗模式不同,基于功耗的分析是 无效。 版权所有(C)2010,JPO&INPIT