摘要:
A non-linear transformation including a plurality of non-linear logical operations is masked to a second or higher order. The masking includes receiving a set of random bits, and machine-masking two or more of the plurality of non-linear logical operations with a same random bit from the set of random bits.
摘要:
An encryption device (10) for performing elliptic curve encryption by using an individual key includes randomization means (16) for setting a point R on the elliptic curve generated according to a random number to be an initial point V0, calculation means (20) based on a bit sequence of a scalar value d for the elliptic curve encryption for executing addition of the initial point V0 and an input point A on the elliptical curve multiplied by a scalar, i.e., V1 = V0 + dA, randomization release means (22) for executing subtraction of the initial point V0 from the sum V1 obtained from the calculation, i.e., V = V1 - V0, and means (24) for supplying the point V obtained by the randomization release means as an output.
摘要:
Es ist ein Datenverarbeitungsverfahren vorgesehen, bei dem in einer Verarbeitungseinheit (1,2) zugeführte Daten verarbeitet werden, und zum Betreiben ein Strom zugeführt wird, wobei ein Teil des zugeführten Stromes zufallsgesteuert einer Hilfsschaltung zugeführt wird.
摘要:
There are disclosed systems and methods for computing an exponentiated message. In one embodiment blinding is maintained during the application of a Chinese Remainder Theorem (CRT) algorithm and then removed subsequent to the completion of the CRT algorithm. In another embodiment, fault injection attacks, such as the gcd attack, can be inhibited by applying and retaining blinding during the application of the CRT algorithm to yield a blinded exponentiation value, and then subsequently removing the blinding in a manner that causes an error injected into the CRT computation to cascade into the exponent of the value used to unblind the blinded exponentiated value.
摘要:
A cryptographic apparatus, a cryptographic method, and a computer readable storage medium provide for conversion between Boolean-masked data and arithmetic-masked data in a manner that allows for a reduction in computational overhead and hardware overhead. The cryptographic apparatus comprises: a first masking circuit which receives a first random number and data and outputs first-masked data; and a second masking circuit which receives a second random number and the first-masked data output from the first masking circuit, and outputs second-masked data. The second masking circuit comprises: an AND circuit which performs an AND operation between the first-masked data and the second random number; a shift circuit which receives the output signal of the AND circuit, and shifts the received output signal in a predetermined direction by predetermined bits; and a subtractor which receives the first-masked data and the output signal of the shift circuit, performs arithmetic subtraction of the output of the shift circuit form the first-masked data, and outputs second-masked data. The first-masked data is Boolean-masked data and the second-masked data is arithmetic-masked data.
摘要:
In order to further develop an arrangement for as well as a method of protecting at least one data processing device, in particular at least one embedded system, for example at least one chip card or smart card, against at least one attack, in particular against at least one side-channel attack, for example against at least one current trace analysis, the data processing device, in particular at least one integrated circuit of the data processing device, carrying out calculations, in particular cryptographic operations wherein an attack, for example an E[lectro]M[agnetic] radiation attack, or an analysis, for example a D[ifferential]P[ower]A[nalysis], such attack or such analysis in particular targeted on finding out a private key, is to be securely averted, it is proposed to blind all intermediate results of the calculations by at least one random variable.
摘要:
The invention relates to an encoding method and an encoding device. At least one partial cryptographic operation yi=fi(xi, ki) is carried out by data xi, ki which are digitally stored as data bit words and the result or intermediate results yi are digitally stored or temporarily stored as data bit words. At least one of the data xi, ki and/or the result or at least intermediate result yi is optionally complemented or not bit by bit to æi, ki and/or yi, in accordance with a control signal ri based on random numbers.
摘要:
La présente invention concerne un procédé de protection d'un ensemble mettant en oeuvre un processus de calcul cryptographique qui utilise une fonction homographique f du type :
f(z)= (az+b) / (cz+d) quand (cz+d) n'est pas égal à 0 et f(-d/c)=a/c la fonction f opérant sur des variables masquées caractérisé en ce que, pour tout k, si x est une entrée et y = f(x+k) une sortie de la fonction f, pour passer directement d'une valeur masquée x+m_i (masquage additif de type XOR) à une valeur masquée y+m_j, le procédé consiste à réaliser cette opération à l'aide d'une composition de plusieurs transformations opérant sur GF(2^k) avec l'adjonction de l'infini, définies sous forme (ax+b)/(cx+d), et de transformations qui échangent deux points.