摘要:
When processing a data conversion function of a MISTY structure, such as the FO function of MISTY1, the logical calculation result t3 of the exclusive OR 614 of the process result of the FI function 602 of the MISTY structure in the second stage and a logical calculation result t1 of an exclusive OR 612 of the MISTY structure in the first stage is not stored in a register. The logical calculation result t3 and the logical calculation result of respective exclusive OR 642 and 643 are subject to a direct exclusive OR with the respective exclusive OR 642 and 643.
摘要:
The generation of individual-specific information having a good reliability and uniqueness is made possible with a little circuit scale. For this purpose, an individual-specific information generation apparatus that generates individual-specific information of an electronic device is configured including a plurality of digital circuits, a random number judgment unit and an individual-specific information generation unit. Here, the plurality of digital circuits are in the same circuit configuration. Each of the digital circuits outputs a fixed output value or a random number output value individually without their output with respect to a certain input being determined unambiguously among the digital circuits. Meanwhile, in each of the digital circuit, an order is defined in advance. The random number judgment unit judges whether the output value is a random value or fixed, for each of the plurality of digital circuits. Then, the individual-specific information generation unit generates the individual-specific information based on information of the order defined in the digital circuit judge by the random number judgment unit as having a fixed output value among the plurality of digital circuits and the output value.
摘要:
A cryptographic processing device, comprising: a storage unit; initial setting unit for setting a value to be stored in the storage unit; Montgomery modular multiplication operation unit for performing a Montgomery modular multiplication operation plural times for a value set by the initial setting unit; and fault attack detection unit for determining whether or not a fault attack occurred for each of at least some parts of the Montgomery modular multiplication operations performed plural times.
摘要:
First information (111) that makes it possible to identify a reliability of document creation by a first person is generated based on evaluation information (101) on documents created by the first person in the past. The first information (111) is transmitted to an information processing apparatus (100) together with a verification request for a document (110) newly created by the first person. The information processing apparatus (100) receives the verification request for the document (110) newly created by the first person together with the first information (111). When receiving the verification request, the information processing apparatus (100) generates second information (112) depending on the reliability of document creation by the first person based on the received first information (111). The information processing apparatus (100) outputs a verification result of the newly created document (110), the verification result containing the generated second information (112).
摘要:
Based on an encrypting method for performing an exponential remainder calculation y=a d (mod n) from an u-bit exponent d=(d u-1 , ..., d 0 ) 2 , input data a, and a modulo n, calculating a'=a 2 (mod n) is performed first. Next, calculating y=(a') f (mod n) is performed on f=(d u-1 , d u-2 , ..., d 1 ) 2 . Then, when d 0 =1, calculating y=y×a (mod n) is performed. Then, outputting y=a d (mod n) is performed. In the first step, although an attacker inputs data including a minus value such as a=-1 and a=s, -s, etc., only plus values can be constantly generated in multiplication and squaring. Therefore, the method makes it hard to estimate a secret key using power analyzing attacks such as the SPA and the DPA, thereby realizing an encryption processor having high tamper-resistance.
摘要:
In a MISTY1 FI function, an exclusive OR 102 to which a round key KIij2 is inputted is arranged between an exclusive OR 101 arranged on a 9-bit critical path 100a in a first MISTY structure and a zero-extend conversion 120U connected to the branching point 301 of a 7-bit right system data path 110a. Then, a 9-bit round key KIij1 is truncate-converted to seven bits, the exclusive OR of the seven bits and the round key KIij1 is calculated by an exclusive OR 113 and the calculation result is inputted to an exclusive OR 112 arranged on the right system data path 110a in the second stage MISTY structure.