IMPROVED DES AND OTHER CRYPTOGRAPHIC PROCESSES WITH LEAK MINIMIZATION FOR SMARTCARDS AND OTHER CRYPTOSYSTEMS
    1.
    发明申请
    IMPROVED DES AND OTHER CRYPTOGRAPHIC PROCESSES WITH LEAK MINIMIZATION FOR SMARTCARDS AND OTHER CRYPTOSYSTEMS 审中-公开
    改进DES和其他用于智能卡和其他CRYPTOSYSMS的泄漏最小化的克隆过程

    公开(公告)号:WO9967919A3

    公开(公告)日:2000-03-23

    申请号:PCT/US9912734

    申请日:1999-06-03

    Abstract: Methods and apparatuses are disclosed for improving DES and other cryptographic protocols against external monitoring attacks by reducing the amount (and signal-to-noise ratio) of useful information leaked during processing. An improved DES implementation of the invention instead uses two 56-bit keys (K1 and K2) (100) and two 64-bit plaintext messages (M1 and M2), each associated with a permutation (i.e., K1P, K2P and M1P, M2P) such that K1P {K1} XOR K2P {K2} equals the "standard" DES key K (110), and M1P {M1} XOR M2P {M2} equals the "standard" message. During operation (145) of the device, the tables are preferably periodically updated, by introducing fresh entropy into the tables faster than information leaks out, so that attackers will not be able to obtain the table contents by analysis of measurements. The technique is implementable in cryptographic smartcards, tamper resistant chips, and secure processing systems of all kinds.

    Abstract translation: 公开了用于通过减少在处理期间泄露的有用信息的量(和信噪比)来改善DES和其他加密协议以抵抗外部监视攻击的方法和装置。 本发明改进的DES实现代替使用两个56位密钥(K1和K2)(100)和两个64位明文消息(M1和M2),每个与置换相关联(即,K1P,K2P和M1P,M2P ),使得K1P {K1} XOR K2P {K2}等于“标准”DES密钥K(110),并且M1P {M1} XOR M2P {M2}等于“标准”消息。 在设备的操作(145)期间,优选地通过将新鲜熵引入表中来快速地将信息泄漏出来,周期性地更新表,使得攻击者将不能通过分析测量获得表内容。 该技术可以在加密智能卡,防篡改芯片和各种安全处理系统中实现。

    BALANCED CRYPTOGRAPHIC COMPUTATIONAL METHOD AND APPARATUS FOR LEAK MINIMIZATION IN SMARTCARDS AND OTHER CRYPTOSYSTEMS
    2.
    发明申请
    BALANCED CRYPTOGRAPHIC COMPUTATIONAL METHOD AND APPARATUS FOR LEAK MINIMIZATION IN SMARTCARDS AND OTHER CRYPTOSYSTEMS 审中-公开
    智能卡和其他CRYPTOSYSMS中的平均最小化平衡计算方法和装置

    公开(公告)号:WO9967766A2

    公开(公告)日:1999-12-29

    申请号:PCT/US9912739

    申请日:1999-06-03

    Abstract: Cryptographic devices that leak information about their secrets through externally monitorable characteristics (such as electromagnetic radiation and power consumption) may be vulnerable to attack, and previously-known methods that could address such leaking are inappropriate for smartcards and many other cryptographic applications. Methods and apparatuses are disclosed for performing computations in which the representation of data, the number of system state transitions at each computational step, and the Hamming weights of all operands are independent of computation inputs, intermediate values, or results. Exemplary embodiments implemented using conventional (leaky) hardware elements (such as electronic components, logic gates, etc.) as well as software executing on conventional (leaky) microprocessors are described. Smartcards and other tamper-resistant devices of the invention provide greatly improved resistance to cryptographic attacks involving external monitoring.

    Abstract translation: 通过外部可监控特性(如电磁辐射和功耗)泄露其秘密信息的密码设备可能容易受到攻击,而可能解决此类漏洞的先前已知的方法不适用于智能卡和许多其他密码应用。 公开了用于执行计算的方法和装置,其中数据的表示,每个计算步骤的系统状态转换的数量以及所有操作数的汉明权重与计算输入,中间值或结果无关。 描述了使用常规(泄漏)硬件元件(例如电子元件,逻辑门等)实现的示例性实施例以及在常规(泄漏)微处理器上执行的软件。 本发明的智能卡和其他防篡改装置提供了大大提高的抵抗涉及外部监视的密码攻击的能力。

    BALANCED CRYPTOGRAPHIC COMPUTATIONAL METHOD AND APPARATUS FOR LEAK MINIMIZATION IN SMARTCARDS AND OTHER CRYPTOSYSTEMS
    3.
    发明申请
    BALANCED CRYPTOGRAPHIC COMPUTATIONAL METHOD AND APPARATUS FOR LEAK MINIMIZATION IN SMARTCARDS AND OTHER CRYPTOSYSTEMS 审中-公开
    智能卡和其他CRYPTOSYSMS中的平均最小化平衡计算方法和装置

    公开(公告)号:WO9967766A8

    公开(公告)日:2000-07-27

    申请号:PCT/US9912739

    申请日:1999-06-03

    Abstract: Cryptographic devices that leak information about their secrets through externally monitorable characteristics (such as electromagnetic radiation and power consumption) may be vulnerable to attack, and previously-known methods that could address such leaking are inappropriate for smartcard and many other cryptographic applications. Methods and apparatuses are disclosed for performing computations in which the representation of data, the number of system state transitions at each computational step, and the Hamming weights of all operands are independent of computation inputs, intermediate values, or results. Exemplary embodiments (figure 6) implemented using conventional hardware elements such as electronic components (611, 613) and logic gates (610, 620, 630, 640) as well as software executing on conventional microprocessors are described.

    Abstract translation: 通过外部可监视特性(如电磁辐射和功耗)泄露其秘密信息的密码设备可能容易受到攻击,并且可能解决此类漏洞的先前已知的方法不适用于智能卡和许多其他密码应用。 公开了用于执行计算的方法和装置,其中数据的表示,每个计算步骤的系统状态转换的数量以及所有操作数的汉明权重与计算输入,中间值或结果无关。 描述了使用诸如电子部件(611,613)和逻辑门(610,620,630,640)的常规硬件元件实现的示例性实施例(图6)以及在常规微处理器上执行的软件。

Patent Agency Ranking