摘要:
A fault detection method for an encryption/decryption system based on a block cipher comprises the steps of subjecting a state array (CST) to multiple rounds, each round comprising a same series of sequential operations transforming the state array; storing the state of a reference operation (ShiftRows) of a current round as a checkpoint state (CHK); storing the state of the reference operation in the next round as an intermediate state; applying one round of reciprocal operations to the intermediate state, starting from the reciprocal of the reference operation (InvShiftRows); and comparing the result state of said one round of reciprocal operations with the checkpoint state.
摘要:
The invention relates to a method for securing the execution of a program by a processor, the program comprising a comparison instruction (S1) for comparing two data (D1, D2), followed by an operation of the program (SI2) which is selected as a function of a comparison result provided by the comparison instruction, the method comprising steps consisting in: before the execution of the comparison instruction, calculating in various ways comparison data representative of the equality of the data to be compared, after the execution of the comparison instruction, verifying whether the comparison data calculated are consistent with the fact that the operation is selected or not selected, and activating an error signal (ER) if the comparison data are mutually inconsistent or inconsistent with the result of the comparison.
摘要:
The invention relates to a method for sharing a memory (MEM1) between two functional entities (E1, E2), comprising the steps of attributing a first data transformation function (T1) and a first inverse transformation function (I1) to the first functional entity, and attributing a second data transformation function (T2) and a second inverse transformation function (I2) to the second functional entity (E2), the second inverse transformation function (I2) being incompatible with the first transformation function (T1) and the first inverse transformation function (I1) being incompatible with the second transformation function (T2).
摘要:
A data processing system with a trusted execution environment, comprises a host processor (12) having a secure mode for operating in the trusted execution environment and a non-secure mode; and a secure module (10) configured to respond to tokens posted by the host processor in secure mode, wherein each token identifies a secure asset, and source and destination addresses within secure and public address spaces. The secure module includes an internal memory (16) storing secure assets identifiable by the tokens; a memory access circuit (26) connected to read data from the source addresses and write processed data to the destination addresses; and a cryptography engine (18, 20) configured to process the read data using the identified secure assets. The secure module (10') is configured to also respond to tokens posted by the host processor in non-secure mode. The internal memory (16') of the secure module stores a rule (Px) together with each secure asset (Ax), defining permissions as to the address spaces where the memory access circuit may read and write the data. The secure module ignores tokens that do not satisfy the permissions defined for the corresponding assets.