会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 1. 发明申请
    • METHOD OF COUNTERING SIDE-CHANNEL ATTACKS ON ELLIPTIC CURVE CRYPTOSYSTEM
    • 在线性曲线CRYPTOSYSTEM上计算侧面通道攻击的方法
    • US20090034720A1
    • 2009-02-05
    • US12108410
    • 2008-04-23
    • Yoo-Jin BaekIhor Vasyltsov
    • Yoo-Jin BaekIhor Vasyltsov
    • H04L9/30
    • G06F7/725G06F2207/7271H04L9/003H04L9/004H04L9/3066
    • A method of countering side-channel attacks on an elliptic curve cryptosystem (ECC) is provided. The method comprises extending a definition field of an elliptic curve of the ECC to an extension ring in a first field; generating a temporary ciphertext in the extension ring and countering attacks on the ECC; and generating a final ciphertext for the first field if a fault injection attack on the ECC is not detected. The countering of attacks on the ECC may comprise countering a power attack on the ECC. Checking if there is a fault injection attack on the ECC may be performed by determining if the temporary ciphertext satisfies a second elliptic curve equation. The fault detection algorithms takes place in a small subring of the extension ring, not in the original field, to minimize the computational overhead. The method can improve the stability of the ECC and reduce computational overhead of the ECC.
    • 提供了一种针对椭圆曲线密码系统(ECC)的侧信道攻击的方法。 该方法包括将ECC的椭圆曲线的定义域扩展到第一场中的扩展环; 在扩展环中生成临时密文,并对ECC进行攻击; 并且如果未检测到对ECC的故障注入攻击,则为第一场产生最终密文。 对ECC的攻击的对抗可能包括对抗ECC的电源攻击。 可以通过确定临时密文是否满足第二椭圆曲线方程来检查是否存在对ECC的故障注入攻击。 故障检测算法发生在扩展环的小环中,而不是在原始字段中,以最小化计算开销。 该方法可以提高ECC的稳定性,减少ECC的计算开销。
    • 2. 发明授权
    • Method of countering side-channel attacks on elliptic curve cryptosystem
    • 对椭圆曲线密码系统进行边信道攻击的方法
    • US08345863B2
    • 2013-01-01
    • US12108410
    • 2008-04-23
    • Yoo-Jin BaekIhor Vasyltsov
    • Yoo-Jin BaekIhor Vasyltsov
    • H04L29/06
    • G06F7/725G06F2207/7271H04L9/003H04L9/004H04L9/3066
    • A method of countering side-channel attacks on an elliptic curve cryptosystem (ECC) is provided. The method comprises extending a definition field of an elliptic curve of the ECC to an extension ring in a first field; generating a temporary ciphertext in the extension ring and countering attacks on the ECC; and generating a final ciphertext for the first field if a fault injection attack on the ECC is not detected. The countering of attacks on the ECC may comprise countering a power attack on the ECC. Checking if there is a fault injection attack on the ECC may be performed by determining if the temporary ciphertext satisfies a second elliptic curve equation. The fault detection algorithms takes place in a small subring of the extension ring, not in the original field, to minimize the computational overhead. The method can improve the stability of the ECC and reduce computational overhead of the ECC.
    • 提供了一种针对椭圆曲线密码系统(ECC)的侧信道攻击的方法。 该方法包括将ECC的椭圆曲线的定义域扩展到第一场中的扩展环; 在扩展环中生成临时密文,并对ECC进行攻击; 并且如果未检测到对ECC的故障注入攻击,则为第一场产生最终密文。 对ECC的攻击的对抗可能包括对抗ECC的电源攻击。 可以通过确定临时密文是否满足第二椭圆曲线方程来检查是否存在对ECC的故障注入攻击。 故障检测算法发生在扩展环的小环中,而不是在原始字段中,以最小化计算开销。 该方法可以提高ECC的稳定性,减少ECC的计算开销。
    • 4. 发明申请
    • Modular multiplication method, modular multiplier and cryptosystem having the same
    • 模块化乘法,模乘法和密码系统相同
    • US20090100120A1
    • 2009-04-16
    • US11980360
    • 2007-10-31
    • Saldamli GokayYoo-Jin Baek
    • Saldamli GokayYoo-Jin Baek
    • G06F7/72
    • G06F7/722
    • Provided are a modular multiplication method with an improved arithmetic operation, a modular multiplier and a cryptograph calculating system having the modular multiplier. The modular multiplication method comprises performing a first arithmetic operation including a first multiplication on a first bit string of a multiplicand and a first bit string of a multiplier and a first reduction for eliminating partial bits of the first multiplication result, performing a second arithmetic operation including a second multiplication on a second bit string of the multiplicand and a second bit string of the multiplier and a second reduction for eliminating partial bits of the second multiplication result, and calculating a modular multiplication result using the result of the first arithmetic operation and the result of the second arithmetic result. The first arithmetic operation and the second arithmetic operation are independently performed.
    • 提供了具有改进的算术运算的模乘法,模乘法器和具有模乘法器的加密计算系统。 所述模乘法包括执行包括对被乘数的第一比特串和乘法器的第一比特串进行第一乘法的第一乘法运算和用于消除第一相乘结果的部分比特的第一减法,执行包括 被乘数的第二比特串和乘法器的第二比特串的第二乘法和用于消除第二相乘结果的部分比特的第二减法,并且使用第一算术运算的结果和结果来计算乘法运算结果 的第二算术结果。 第一算术运算和第二算术运算被独立地执行。
    • 5. 发明申请
    • Cryptographic apparatus, cryptographic method, and storage medium thereof
    • 加密装置,密码方法及其存储介质
    • US20050147243A1
    • 2005-07-07
    • US11030665
    • 2005-01-06
    • Yoo-Jin Baek
    • Yoo-Jin Baek
    • G06F7/52G06F7/00G06F7/58H04L9/28
    • G06F7/00G06F2207/7233H04L9/003
    • A cryptographic apparatus, a cryptographic method, and a computer readable storage medium provide for conversion between Boolean-masked data and arithmetic-masked data in a manner that allows for a reduction in computational overhead and hardware overhead. The cryptographic apparatus comprises: a first masking circuit which receives a first random number and data and outputs first-masked data; and a second masking circuit which receives a second random number and the first-masked data output from the first masking circuit, and outputs second-masked data. The second masking circuit comprises: an AND circuit which performs an AND operation between the first-masked data and the second random number; a shift circuit which receives the output signal of the AND circuit, and shifts the received output signal in a predetermined direction by predetermined bits; and a subtractor which receives the first-masked data and the output signal of the shift circuit, performs arithmetic subtraction of the output of the shift circuit form the first-masked data, and outputs second-masked is data. The first-masked data is Boolean-masked data and the second-masked data is arithmetic-masked data.
    • 密码装置,密码方法和计算机可读存储介质以允许降低计算开销和硬件开销的方式提供布尔掩蔽数据和算术屏蔽数据之间的转换。 密码装置包括:第一掩蔽电路,其接收第一随机数和数据并输出第一掩蔽数据; 以及第二掩蔽电路,其接收第二随机数和从第一掩蔽电路输出的第一掩蔽数据,并输出第二掩蔽数据。 第二掩蔽电路包括:AND电路,其执行第一屏蔽数据和第二随机数之间的“与”运算; 接收AND电路的输出信号并将接收的输出信号沿预定方向移位预定位的移位电路; 以及接收第一屏蔽数据和移位电路的输出信号的减法器,对从第一掩码数据输出的移位电路进行运算减法,并输出第二掩码数据。 第一个屏蔽的数据是布尔屏蔽的数据,第二个屏蔽的数据是算术屏蔽的数据。
    • 6. 发明授权
    • Modular multiplication method, modular multiplier and cryptosystem having the same
    • 模块化乘法,模乘法和密码系统相同
    • US08055696B2
    • 2011-11-08
    • US11980360
    • 2007-10-31
    • Saldamli GokayYoo-Jin Baek
    • Saldamli GokayYoo-Jin Baek
    • G06F7/38
    • G06F7/722
    • Provided are a modular multiplication method with an improved arithmetic operation, a modular multiplier and a cryptograph calculating system having the modular multiplier. The modular multiplication method comprises performing a first arithmetic operation including a first multiplication on a first bit string of a multiplicand and a first bit string of a multiplier and a first reduction for eliminating partial bits of the first multiplication result, performing a second arithmetic operation including a second multiplication on a second bit string of the multiplicand and a second bit string of the multiplier and a second reduction for eliminating partial bits of the second multiplication result, and calculating a modular multiplication result using the result of the first arithmetic operation and the result of the second arithmetic result. The first arithmetic operation and the second arithmetic operation are independently performed.
    • 提供了具有改进的算术运算的模乘法,模乘法器和具有模乘法器的加密计算系统。 所述模乘法包括执行包括对被乘数的第一比特串和乘法器的第一比特串进行第一乘法的第一乘法运算和用于消除第一相乘结果的部分比特的第一减法,执行包括 被乘数的第二比特串和乘法器的第二比特串的第二乘法和用于消除第二相乘结果的部分比特的第二减法,并且使用第一算术运算的结果和结果来计算乘法运算结果 的第二算术结果。 第一算术运算和第二算术运算被独立地执行。
    • 7. 发明申请
    • Cryptographic logic circuits and method of performing logic operations
    • 密码逻辑电路和执行逻辑运算的方法
    • US20070188355A1
    • 2007-08-16
    • US11334430
    • 2006-01-19
    • Yoo-Jin Baek
    • Yoo-Jin Baek
    • H03M7/34
    • H04L9/003H04L2209/046H04L2209/08H04L2209/12
    • Example embodiments of the present invention disclose a cryptographic logic circuit, which may include a first logic unit configured to execute at least one logic operation for a plurality of data pairs, the data pairs including random data and random masking data, and a second logic unit configured to execute a logic operation for the results of the first logic unit. Also, the example embodiments of the present invention, which may a method of performing a logic operation in a cryptographic logic circuit including converting a plurality of input data and random data into a plurality of random masking data, executing a first logic operation on the random data and random masking data, executing a second logic operation on the output of the first logic operation, and outputting the result of the second logic operation random masking data.
    • 本发明的示例性实施例公开了一种加密逻辑电路,其可以包括被配置为对多个数据对执行至少一个逻辑运算的第一逻辑单元,所述数据对包括随机数据和随机屏蔽数据,以及第二逻辑单元 被配置为对所述第一逻辑单元的结果执行逻辑运算。 此外,本发明的示例实施例可以是在密码逻辑电路中执行逻辑运算的方法,包括将多个输入数据和随机数据转换为多个随机屏蔽数据,对随机的执行第一逻辑运算 数据和随机屏蔽数据,对第一逻辑运算的输出执行第二逻辑运算,并输出第二逻辑运算随机屏蔽数据的结果。
    • 8. 发明申请
    • System and recording medium for securing data and methods thereof
    • 用于保护数据的系统和记录介质及其方法
    • US20060029224A1
    • 2006-02-09
    • US11197316
    • 2005-08-05
    • Yoo-Jin BaekSang-geun OhSeo-kyu Kim
    • Yoo-Jin BaekSang-geun OhSeo-kyu Kim
    • H04L9/30
    • H04L9/004H04L9/302H04L9/3249H04L2209/04
    • A system and recording medium for securing data and methods thereof including a modular exponentiation. One embodiment includes first masking a message, second masking an exponent, and executing a modular exponentiation based at least one of the first and second maskings. Another embodiment includes first masking a message, second masking at least one exponent, executing a modular exponentiation based at least one of the first and second maskings, detecting an error, executing a modular multiplication operation based on the detection and diffusing the detected error to generate an electronic signature. Yet another embodiment includes first masking a message, second masking at least one exponent, executing a modular exponentiation based at least one of the first and second maskings, detecting an error, and generating an electronic signature based on the detected error.
    • 一种用于保护数据的系统和记录介质及其方法,包括模幂运算。 一个实施例包括首先掩蔽消息,第二掩蔽指数,以及基于第一和第二掩码中的至少一个执行模幂运算。 另一个实施例包括首先掩蔽消息,第二掩蔽至少一个指数,基于第一和第二掩码中的至少一个执行模幂运算,检测错误,基于检测执行模乘法运算并扩展检测到的错误以产生 电子签名。 另一个实施例包括首先掩蔽消息,第二掩蔽至少一个指数,基于第一和第二掩蔽中的至少一个执行模幂运算,检测错误,以及基于检测到的错误生成电子签名。