会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 7. 发明授权
    • Prevention of side channel attacks against block cipher implementations and other cryptographic systems
    • 防止针对块密码实现和其他加密系统的侧信道攻击
    • US07787620B2
    • 2010-08-31
    • US11252898
    • 2005-10-18
    • Paul C. KocherJoshua M. JaffeBenjamin C. Jun
    • Paul C. KocherJoshua M. JaffeBenjamin C. Jun
    • H04L9/22
    • H04L9/0625G06F21/556G06F21/602G06F21/755G06F2207/7219H04L9/003H04L2209/046H04L2209/08H04L2209/127
    • Methods and apparatuses are disclosed for improving DES and other cryptographic protocols against external monitoring attacks by reducing the amount (and signal-to-noise ratio) of useful information leaked during processing. An improved DES implementation of the invention instead uses two 56-bit keys (K1 and K2) and two 64-bit plaintext messages (M1 and M2), each associated with a permutation (i.e., K1P, K2P and M1P, M2P) such that K1P{K1} XOR K2P{K2} equals the “standard” DES key K, and M1P{M1} XOR M2P{M2} equals the “standard” message. During operation of the device, the tables are preferably periodically updated, by introducing fresh entropy into the tables faster than information leaks out, so that attackers will not be able to obtain the table contents by analysis of measurements. The technique is implementable in cryptographic smartcards, tamper resistant chips, and secure processing systems of all kinds.
    • 公开了用于通过减少在处理期间泄露的有用信息的量(和信噪比)来改善DES和其他加密协议以防外部监视攻击的方法和装置。 本发明的改进的DES实施方案改为使用两个56位密钥(K1和K2)和两个64位明文消息(M1和M2),每个与排列相关联(即,K1P,K2P和M1P,M2P),使得 K1P {K1} XOR K2P {K2}等于“标准”DES密钥K,M1P {M1} XOR M2P {M2}等于“标准”消息。 在设备的操作期间,优选地通过将新鲜的熵引入到表中比信息泄漏出来更周期地更新表,使得攻击者将不能通过分析测量获得表内容。 该技术可在加密智能卡,防篡改芯片和各种安全处理系统中实现。
    • 8. 发明授权
    • Cryptographic computation using masking to prevent differential power analysis and other attacks
    • 使用掩码进行密码计算,以防止差分功率分析和其他攻击
    • US07668310B2
    • 2010-02-23
    • US09930836
    • 2001-08-15
    • Paul C. KocherJoshua M. JaffeBenjamin C. Jun
    • Paul C. KocherJoshua M. JaffeBenjamin C. Jun
    • H04L9/22
    • H04L9/0625G06F21/556G06F21/602G06F21/755G06F2207/7219H04L9/003H04L2209/046H04L2209/08H04L2209/127
    • Methods and apparatuses are disclosed for improving DES and other cryptographic protocols against external monitoring attacks by reducing the amount (and signal-to-noise ratio) of useful information leaked during processing. An improved DES implementation of the invention instead uses two 56-bit keys (K1 and K2) and two 64-bit plaintext messages (M1 and M2), each associated with a permutation (i.e., K1P, K2P and M1P, M2P) such that K1P{K1} XOR K2P {K2} equals the “standard” DES key K, and M1P{M1} XOR M2P{M2} equals the “standard” message. During operation of the device, the tables are preferably periodically updated, by introducing fresh entropy into the tables faster than information leaks out, so that attackers will not be able to obtain the table contents by analysis of measurements. The technique is implementable in cryptographic smartcards, tamper resistant chips, and secure processing systems of all kinds.
    • 公开了用于通过减少在处理期间泄露的有用信息的量(和信噪比)来改善DES和其他加密协议以防外部监视攻击的方法和装置。 本发明的改进的DES实施方案改为使用两个56位密钥(K1和K2)和两个64位明文消息(M1和M2),每个与排列相关联(即,K1P,K2P和M1P,M2P),使得 K1P {K1} XOR K2P {K2}等于“标准”DES密钥K,M1P {M1} XOR M2P {M2}等于“标准”消息。 在设备的操作期间,优选地通过将新鲜的熵引入到表中比信息泄漏出来更周期地更新表,使得攻击者将不能通过分析测量获得表内容。 该技术可在加密智能卡,防篡改芯片和各种安全处理系统中实现。