IMPROVED DES AND OTHER CRYPTOGRAPHIC PROCESSES WITH LEAK MINIMIZATION FOR SMARTCARDS AND OTHER CRYPTOSYSTEMS
    1.
    发明申请
    IMPROVED DES AND OTHER CRYPTOGRAPHIC PROCESSES WITH LEAK MINIMIZATION FOR SMARTCARDS AND OTHER CRYPTOSYSTEMS 审中-公开
    改进DES和其他用于智能卡和其他CRYPTOSYSMS的泄漏最小化的克隆过程

    公开(公告)号:WO9967919A3

    公开(公告)日:2000-03-23

    申请号:PCT/US9912734

    申请日:1999-06-03

    Abstract: Methods and apparatuses are disclosed for improving DES and other cryptographic protocols against external monitoring attacks by reducing the amount (and signal-to-noise ratio) of useful information leaked during processing. An improved DES implementation of the invention instead uses two 56-bit keys (K1 and K2) (100) and two 64-bit plaintext messages (M1 and M2), each associated with a permutation (i.e., K1P, K2P and M1P, M2P) such that K1P {K1} XOR K2P {K2} equals the "standard" DES key K (110), and M1P {M1} XOR M2P {M2} equals the "standard" message. During operation (145) of the device, the tables are preferably periodically updated, by introducing fresh entropy into the tables faster than information leaks out, so that attackers will not be able to obtain the table contents by analysis of measurements. The technique is implementable in cryptographic smartcards, tamper resistant chips, and secure processing systems of all kinds.

    Abstract translation: 公开了用于通过减少在处理期间泄露的有用信息的量(和信噪比)来改善DES和其他加密协议以抵抗外部监视攻击的方法和装置。 本发明改进的DES实现代替使用两个56位密钥(K1和K2)(100)和两个64位明文消息(M1和M2),每个与置换相关联(即,K1P,K2P和M1P,M2P ),使得K1P {K1} XOR K2P {K2}等于“标准”DES密钥K(110),并且M1P {M1} XOR M2P {M2}等于“标准”消息。 在设备的操作(145)期间,优选地通过将新鲜熵引入表中来快速地将信息泄漏出来,周期性地更新表,使得攻击者将不能通过分析测量获得表内容。 该技术可以在加密智能卡,防篡改芯片和各种安全处理系统中实现。

    LEAK-RESISTANT CRYPTOGRAPHIC INDEXED KEY UPDATE
    2.
    发明申请
    LEAK-RESISTANT CRYPTOGRAPHIC INDEXED KEY UPDATE 审中-公开
    耐腐蚀CRYPTOGRAPHIC INDEXED KEY UPDATE

    公开(公告)号:WO0002342A2

    公开(公告)日:2000-01-13

    申请号:PCT/US9915146

    申请日:1999-07-02

    Inventor: KOCHER PAUL C

    Abstract: Methods and apparatus for increasing the leak-resistance of cryptographic system using an indexed key update technique are disclosed. By repeatedly applying the update process, information leaking during cryptographic operations that is collected by attackers rapidly becomes obsolete. Thus, such a system can remain secure against attacks involving analysis of measurements of the device's power consumption, electromagnetic characteristics, or other information leaked during transactions. The server then performs a series of operations to determine the sequence of transformation needed to re-derive the correction session key from the client's secret value (190).

    Abstract translation: 公开了使用索引密钥更新技术增加密码系统的防漏性的方法和装置。 通过重复应用更新过程,攻击者收集的密码操作过程中信息泄露迅速变得过时。 因此,这种系统可以保持安全性,防止涉及分析设备的功耗,电磁特性或事务中泄露的其他信息的测量的攻击。 然后,服务器执行一系列操作以确定从客户端的秘密值重新导出校正会话密钥所需的变换序列(190)。

    SECURE MODULAR EXPONENTIATION WITH LEAK MINIMIZATION FOR SMARTCARDS AND OTHER CRYPTOSYSTEMS
    3.
    发明申请
    SECURE MODULAR EXPONENTIATION WITH LEAK MINIMIZATION FOR SMARTCARDS AND OTHER CRYPTOSYSTEMS 审中-公开
    用于智能卡和其他CRYPTOSYSTEMS的安全模块化授权与泄漏最小化

    公开(公告)号:WO9967909A3

    公开(公告)日:2000-05-04

    申请号:PCT/US9912740

    申请日:1999-06-03

    Abstract: Methods and apparatuses are disclosed for securing cryptosystems against external monitoring attacks by reducing the amount (and signal to noise ratio) of useful information leaked during processing. In general, this is accomplished by implementing critical operations using "branchless" or fixed execution path routines (115, 125) whereby the execution path does not vary in any manner that can reveal new information about the secret key during subsequent operations. More particularly, various embodiments of the invention include: implementing modular exponentiation without key-dependent conditional jumps (125); implementing modular exponentiation with fixed memory access patterns (120); implementing modular multiplication without using leak-prone multiplication-by-one operations (115); and implementing leak-minimization multiplication (and other operations) for elliptic curve cryptosystems (130).

    Abstract translation: 公开了用于通过减少在处理期间泄露的有用信息的量(和信噪比)来保护密码系统免受外部监视攻击的方法和装置。 通常,这是通过使用“无分支”或固定执行路径例程(115,125)实现关键操作来实现的,由此执行路径不以可以在随后的操作期间揭示有关秘密密钥的新信息的任何方式变化。 更具体地,本发明的各种实施例包括:实现没有密钥依赖条件跳转(125)的模幂运算; 用固定存储器访问模式(120)实现模幂运算; 实现模乘,而不使用易泄漏的乘法运算(115); 并为椭圆曲线密码系统(130)实施泄漏最小化乘法(和其他操作)。

    MULTIPLICATIVE MASKING FOR CRYPTOGRAPHIC OPERATIONS
    4.
    发明申请
    MULTIPLICATIVE MASKING FOR CRYPTOGRAPHIC OPERATIONS 审中-公开
    密码操作的乘法掩码

    公开(公告)号:WO2016094195A2

    公开(公告)日:2016-06-16

    申请号:PCT/US2015063812

    申请日:2015-12-03

    CPC classification number: H04L9/003 H04L2209/046

    Abstract: A value corresponding to an input for a cryptographic operation may be received. The value may be masked by multiplying the value with a first number modulo a prime number. The cryptographic operation may subsequently be performed on the masked value.

    Abstract translation: 可以接收对应于用于密码操作的输入的值。 该值可以通过将该值乘以以素数为模的第一个数字而被掩盖。 随后可以对掩码值执行密码操作。

    BALANCED CRYPTOGRAPHIC COMPUTATIONAL METHOD AND APPARATUS FOR LEAK MINIMIZATION IN SMARTCARDS AND OTHER CRYPTOSYSTEMS
    6.
    发明申请
    BALANCED CRYPTOGRAPHIC COMPUTATIONAL METHOD AND APPARATUS FOR LEAK MINIMIZATION IN SMARTCARDS AND OTHER CRYPTOSYSTEMS 审中-公开
    智能卡和其他CRYPTOSYSMS中的平均最小化平衡计算方法和装置

    公开(公告)号:WO9967766A2

    公开(公告)日:1999-12-29

    申请号:PCT/US9912739

    申请日:1999-06-03

    Abstract: Cryptographic devices that leak information about their secrets through externally monitorable characteristics (such as electromagnetic radiation and power consumption) may be vulnerable to attack, and previously-known methods that could address such leaking are inappropriate for smartcards and many other cryptographic applications. Methods and apparatuses are disclosed for performing computations in which the representation of data, the number of system state transitions at each computational step, and the Hamming weights of all operands are independent of computation inputs, intermediate values, or results. Exemplary embodiments implemented using conventional (leaky) hardware elements (such as electronic components, logic gates, etc.) as well as software executing on conventional (leaky) microprocessors are described. Smartcards and other tamper-resistant devices of the invention provide greatly improved resistance to cryptographic attacks involving external monitoring.

    Abstract translation: 通过外部可监控特性(如电磁辐射和功耗)泄露其秘密信息的密码设备可能容易受到攻击,而可能解决此类漏洞的先前已知的方法不适用于智能卡和许多其他密码应用。 公开了用于执行计算的方法和装置,其中数据的表示,每个计算步骤的系统状态转换的数量以及所有操作数的汉明权重与计算输入,中间值或结果无关。 描述了使用常规(泄漏)硬件元件(例如电子元件,逻辑门等)实现的示例性实施例以及在常规(泄漏)微处理器上执行的软件。 本发明的智能卡和其他防篡改装置提供了大大提高的抵抗涉及外部监视的密码攻击的能力。

    BALANCED CRYPTOGRAPHIC COMPUTATIONAL METHOD AND APPARATUS FOR LEAK MINIMIZATION IN SMARTCARDS AND OTHER CRYPTOSYSTEMS
    7.
    发明申请
    BALANCED CRYPTOGRAPHIC COMPUTATIONAL METHOD AND APPARATUS FOR LEAK MINIMIZATION IN SMARTCARDS AND OTHER CRYPTOSYSTEMS 审中-公开
    智能卡和其他CRYPTOSYSMS中的平均最小化平衡计算方法和装置

    公开(公告)号:WO9967766A8

    公开(公告)日:2000-07-27

    申请号:PCT/US9912739

    申请日:1999-06-03

    Abstract: Cryptographic devices that leak information about their secrets through externally monitorable characteristics (such as electromagnetic radiation and power consumption) may be vulnerable to attack, and previously-known methods that could address such leaking are inappropriate for smartcard and many other cryptographic applications. Methods and apparatuses are disclosed for performing computations in which the representation of data, the number of system state transitions at each computational step, and the Hamming weights of all operands are independent of computation inputs, intermediate values, or results. Exemplary embodiments (figure 6) implemented using conventional hardware elements such as electronic components (611, 613) and logic gates (610, 620, 630, 640) as well as software executing on conventional microprocessors are described.

    Abstract translation: 通过外部可监视特性(如电磁辐射和功耗)泄露其秘密信息的密码设备可能容易受到攻击,并且可能解决此类漏洞的先前已知的方法不适用于智能卡和许多其他密码应用。 公开了用于执行计算的方法和装置,其中数据的表示,每个计算步骤的系统状态转换的数量以及所有操作数的汉明权重与计算输入,中间值或结果无关。 描述了使用诸如电子部件(611,613)和逻辑门(610,620,630,640)的常规硬件元件实现的示例性实施例(图6)以及在常规微处理器上执行的软件。

    BACKSIDE SECURITY SHIELD
    8.
    发明申请

    公开(公告)号:WO2018106509A1

    公开(公告)日:2018-06-14

    申请号:PCT/US2017063949

    申请日:2017-11-30

    Inventor: BEST SCOTT C

    Abstract: A physically unclonable function circuit (PUF) is used to generate a fingerprint value based on the uniqueness of the physical characteristics (e.g., resistance, capacitance, connectivity, etc.) of a tamper prevention (i.e., shielding) structure that includes through-silicon vias and metallization on the backside of the integrated circuit. The physical characteristics depend on random physical factors introduced during manufacturing. This causes the chip-to-chip variations in these physical characteristics to be unpredictable and uncontrollable which makes more difficult to duplicate, clone, or modify the structure without changing the fingerprint value. By including the through-silicon vias and metallization on the backside of the integrated circuit as part of the PUF, the backside of the chip can be protected from modifications that can be used to help learn the secure cryptographic keys and/or circumvent the secure cryptographic (or other) circuitry.

Patent Agency Ranking