会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 3. 发明申请
    • IMPROVED DES AND OTHER CRYPTOGRAPHIC PROCESSES WITH LEAK MINIMIZATION FOR SMARTCARDS AND OTHER CRYPTOSYSTEMS
    • 改进DES和其他用于智能卡和其他CRYPTOSYSMS的泄漏最小化的克隆过程
    • WO9967919A3
    • 2000-03-23
    • PCT/US9912734
    • 1999-06-03
    • CRYPTOGRAPHY RES INC
    • KOCHER PAUL CJAFFE JOSHUA MJUN BENJAMIN C
    • G09C1/00H04L9/06H04L9/32
    • H04L9/0625G06F21/556G06F21/602G06F21/755G06F2207/7219H04L9/003H04L2209/046H04L2209/08H04L2209/127
    • Methods and apparatuses are disclosed for improving DES and other cryptographic protocols against external monitoring attacks by reducing the amount (and signal-to-noise ratio) of useful information leaked during processing. An improved DES implementation of the invention instead uses two 56-bit keys (K1 and K2) (100) and two 64-bit plaintext messages (M1 and M2), each associated with a permutation (i.e., K1P, K2P and M1P, M2P) such that K1P {K1} XOR K2P {K2} equals the "standard" DES key K (110), and M1P {M1} XOR M2P {M2} equals the "standard" message. During operation (145) of the device, the tables are preferably periodically updated, by introducing fresh entropy into the tables faster than information leaks out, so that attackers will not be able to obtain the table contents by analysis of measurements. The technique is implementable in cryptographic smartcards, tamper resistant chips, and secure processing systems of all kinds.
    • 公开了用于通过减少在处理期间泄露的有用信息的量(和信噪比)来改善DES和其他加密协议以抵抗外部监视攻击的方法和装置。 本发明改进的DES实现代替使用两个56位密钥(K1和K2)(100)和两个64位明文消息(M1和M2),每个与置换相关联(即,K1P,K2P和M1P,M2P ),使得K1P {K1} XOR K2P {K2}等于“标准”DES密钥K(110),并且M1P {M1} XOR M2P {M2}等于“标准”消息。 在设备的操作(145)期间,优选地通过将新鲜熵引入表中来快速地将信息泄漏出来,周期性地更新表,使得攻击者将不能通过分析测量获得表内容。 该技术可以在加密智能卡,防篡改芯片和各种安全处理系统中实现。
    • 4. 发明申请
    • SECURE MODULAR EXPONENTIATION WITH LEAK MINIMIZATION FOR SMARTCARDS AND OTHER CRYPTOSYSTEMS
    • 用于智能卡和其他CRYPTOSYSTEMS的安全模块化授权与泄漏最小化
    • WO9967909A3
    • 2000-05-04
    • PCT/US9912740
    • 1999-06-03
    • CRYPTOGRAPHY RES INC
    • KOCHER PAUL CJAFFE JOSHUA M
    • G06F7/72H04L9/28G06F12/14
    • H04L9/3066G06F7/723G06F7/725G06F21/556G06F21/602G06F21/755G06F2207/7261H04L9/003H04L9/0841H04L2209/127H04L2209/56
    • Methods and apparatuses are disclosed for securing cryptosystems against external monitoring attacks by reducing the amount (and signal to noise ratio) of useful information leaked during processing. In general, this is accomplished by implementing critical operations using "branchless" or fixed execution path routines (115, 125) whereby the execution path does not vary in any manner that can reveal new information about the secret key during subsequent operations. More particularly, various embodiments of the invention include: implementing modular exponentiation without key-dependent conditional jumps (125); implementing modular exponentiation with fixed memory access patterns (120); implementing modular multiplication without using leak-prone multiplication-by-one operations (115); and implementing leak-minimization multiplication (and other operations) for elliptic curve cryptosystems (130).
    • 公开了用于通过减少在处理期间泄露的有用信息的量(和信噪比)来保护密码系统免受外部监视攻击的方法和装置。 通常,这是通过使用“无分支”或固定执行路径例程(115,125)实现关键操作来实现的,由此执行路径不以可以在随后的操作期间揭示有关秘密密钥的新信息的任何方式变化。 更具体地,本发明的各种实施例包括:实现没有密钥依赖条件跳转(125)的模幂运算; 用固定存储器访问模式(120)实现模幂运算; 实现模乘,而不使用易泄漏的乘法运算(115); 并为椭圆曲线密码系统(130)实施泄漏最小化乘法(和其他操作)。