FR3069993B1 - Dispositifs et procedes de masquage d'operations de chiffrement rsa - Google Patents
Dispositifs et procedes de masquage d'operations de chiffrement rsa Download PDFInfo
- Publication number
- FR3069993B1 FR3069993B1 FR1757555A FR1757555A FR3069993B1 FR 3069993 B1 FR3069993 B1 FR 3069993B1 FR 1757555 A FR1757555 A FR 1757555A FR 1757555 A FR1757555 A FR 1757555A FR 3069993 B1 FR3069993 B1 FR 3069993B1
- Authority
- FR
- France
- Prior art keywords
- memory
- erasable
- masking
- methods
- devices
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/78—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
- G06F21/79—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data in semiconductor storage media, e.g. directly-addressable memories
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G09—EDUCATION; CRYPTOGRAPHY; DISPLAY; ADVERTISING; SEALS
- G09C—CIPHERING OR DECIPHERING APPARATUS FOR CRYPTOGRAPHIC OR OTHER PURPOSES INVOLVING THE NEED FOR SECRECY
- G09C1/00—Apparatus or methods whereby a given sequence of signs, e.g. an intelligible text, is transformed into an unintelligible sequence of signs by transposing the signs or groups of signs or by replacing them by others according to a predetermined system
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/002—Countermeasures against attacks on cryptographic mechanisms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0869—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0894—Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
- H04L9/3006—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters
- H04L9/302—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters involving the integer factorization problem, e.g. RSA or quadratic sieve [QS] schemes
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2143—Clearing memory, e.g. to prevent the data from being stolen
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F7/00—Methods or arrangements for processing data by operating upon the order or content of the data handled
- G06F7/58—Random or pseudo-random number generators
- G06F7/588—Random number generators, i.e. based on natural stochastic processes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/04—Masking or blinding
- H04L2209/046—Masking or blinding of operations, operands or results of the operations
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Computing Systems (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- General Engineering & Computer Science (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Storage Device Security (AREA)
Abstract
Il est présenté des dispositifs et procédés destinés à protéger des données secrètes qui sont contenues dans une mémoire afin d'empêcher des accès et manipulation de données non autorisés. Différents modes de réalisation peuvent être appliqués afin de cacher ou masquer un exposant RSA utilisé pour la cryptographie à clef publique et mémorisé dans un bloc cryptographique matériel qui utilise une mémoire de travail ne pouvant être effacée pour des calculs. Dans certains modes de réalisation, le masquage d'exposants RSA est réalisé par un processus en deux étapes qui associe une valeur aléatoire et secrète, calculée de manière spécifique, à l'exposant secret. La valeur aléatoire est mémorisée dans une mémoire pouvant être effacée, de telle sorte qu'en cas d'attaque, à la fois la mémoire pouvant être effacée et la mémoire ne pouvant l'être ne laissent paraître aucun des secrets intégrés. Le sur-coût en ressources de mémoire n'affecte les performances du dispositif que seulement de manière insignifiante.
Priority Applications (3)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| FR1757555A FR3069993B1 (fr) | 2017-08-07 | 2017-08-07 | Dispositifs et procedes de masquage d'operations de chiffrement rsa |
| US16/039,014 US11115210B2 (en) | 2017-08-07 | 2018-07-18 | Systems and methods for masking RSA operations |
| CN201810889230.6A CN109388976B (zh) | 2017-08-07 | 2018-08-07 | 用于屏蔽rsa运算的系统和方法 |
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| FR1757555A FR3069993B1 (fr) | 2017-08-07 | 2017-08-07 | Dispositifs et procedes de masquage d'operations de chiffrement rsa |
| FR1757555 | 2017-08-07 |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| FR3069993A1 FR3069993A1 (fr) | 2019-02-08 |
| FR3069993B1 true FR3069993B1 (fr) | 2020-09-18 |
Family
ID=60923571
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| FR1757555A Active FR3069993B1 (fr) | 2017-08-07 | 2017-08-07 | Dispositifs et procedes de masquage d'operations de chiffrement rsa |
Country Status (3)
| Country | Link |
|---|---|
| US (1) | US11115210B2 (fr) |
| CN (1) | CN109388976B (fr) |
| FR (1) | FR3069993B1 (fr) |
Families Citing this family (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN110048840B (zh) * | 2019-04-28 | 2021-10-15 | 苏州国芯科技股份有限公司 | 一种基于rsa算法的信息处理方法、系统及相关组件 |
| CN111190733B (zh) * | 2019-12-27 | 2023-11-17 | 华为技术有限公司 | 用于进行rsa计算的计算资源调度方法及装置 |
| CN116522351A (zh) | 2022-01-20 | 2023-08-01 | 瑞昱半导体股份有限公司 | 降低成功率的方法、密码系统处理电路及电子装置 |
| US12200101B2 (en) * | 2023-06-14 | 2025-01-14 | Trustees Of Boston University | Semi-custom accelerator device for bootstrappable fully homomorphic encryption |
Family Cites Families (19)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| JPH1165439A (ja) * | 1996-08-09 | 1999-03-05 | Nippon Telegr & Teleph Corp <Ntt> | N進表現暗号による通信および認証方法、ならびにそれらの装置、およびn進表現暗号による通信および認証プログラムを格納した記憶媒体 |
| US7366305B2 (en) * | 2003-09-30 | 2008-04-29 | Intel Corporation | Platform and method for establishing trust without revealing identity |
| FR2867635B1 (fr) * | 2004-03-11 | 2006-09-22 | Oberthur Card Syst Sa | Procede de traitement de donnees securise, base notamment sur un algorithme cryptographique |
| US7590880B1 (en) * | 2004-09-13 | 2009-09-15 | National Semiconductor Corporation | Circuitry and method for detecting and protecting against over-clocking attacks |
| JP4962165B2 (ja) | 2007-06-22 | 2012-06-27 | 大日本印刷株式会社 | 暗号処理装置,暗号処理プログラム及び暗号処理方法 |
| US20090016523A1 (en) * | 2007-07-12 | 2009-01-15 | Atmel Corporation | Masking and Additive Decomposition Techniques for Cryptographic Field Operations |
| WO2009118795A1 (fr) * | 2008-03-28 | 2009-10-01 | 富士通株式会社 | Procédé de cryptage présentant une bonne résistance aux attaques du canal latéral |
| US20130265163A1 (en) * | 2010-06-09 | 2013-10-10 | Raytheon Company | Magnetic Field Activated Intrusion Detection |
| FR2966953B1 (fr) * | 2010-11-02 | 2015-08-28 | St Microelectronics Rousset | Procede de contremesure cryptographique par derivation d'une donnee secrete |
| EP2506176A1 (fr) * | 2011-03-30 | 2012-10-03 | Irdeto Corporate B.V. | Établissement de clé unique durant la fabrication de puce |
| GB2494731B (en) * | 2011-09-06 | 2013-11-20 | Nds Ltd | Preventing data extraction by sidechannel attack |
| JP5481455B2 (ja) * | 2011-09-27 | 2014-04-23 | 株式会社東芝 | 暗号処理装置 |
| US9335967B1 (en) * | 2013-06-13 | 2016-05-10 | Cadence Design Systems, Inc. | Accurate floating-point calculation method and device |
| FR3010210B1 (fr) * | 2013-08-29 | 2017-01-13 | Stmicroelectronics Rousset | Protection d'un calcul contre des attaques par canaux caches |
| US10263770B2 (en) * | 2013-11-06 | 2019-04-16 | Pure Storage, Inc. | Data protection in a storage system using external secrets |
| KR102279027B1 (ko) * | 2014-12-03 | 2021-07-19 | 삼성전자주식회사 | 멀티 스레드를 실행하는 방법 및 장치 |
| JP6058245B2 (ja) | 2015-01-15 | 2017-01-11 | 三菱電機株式会社 | 乱数拡大装置、乱数拡大方法及び乱数拡大プログラム |
| FR3033965B1 (fr) * | 2015-03-18 | 2018-12-07 | Maxim Integrated Products, Inc. | Systèmes et procédés de commande de dispositifs de cryptage sur courbe elliptique sécurisés |
| US10205598B2 (en) * | 2015-05-03 | 2019-02-12 | Ronald Francis Sulpizio, JR. | Temporal key generation and PKI gateway |
-
2017
- 2017-08-07 FR FR1757555A patent/FR3069993B1/fr active Active
-
2018
- 2018-07-18 US US16/039,014 patent/US11115210B2/en active Active
- 2018-08-07 CN CN201810889230.6A patent/CN109388976B/zh active Active
Also Published As
| Publication number | Publication date |
|---|---|
| US11115210B2 (en) | 2021-09-07 |
| FR3069993A1 (fr) | 2019-02-08 |
| US20190044717A1 (en) | 2019-02-07 |
| CN109388976A (zh) | 2019-02-26 |
| CN109388976B (zh) | 2023-12-05 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Wang et al. | An efficient double-image encryption and hiding algorithm using a newly designed chaotic system and parallel compressive sensing | |
| FR3069993B1 (fr) | Dispositifs et procedes de masquage d'operations de chiffrement rsa | |
| Franz et al. | CBMC-GC: an ANSI C compiler for secure two-party computations | |
| Zhu et al. | An image encryption scheme using generalized Arnold map and affine cipher | |
| EA201891822A1 (ru) | Безопасность персональных устройств с использованием криптографии на основе эллиптических кривых для разделения секрета | |
| RU2011148528A (ru) | Способ и система защиты криптографического устройства | |
| JP2011513787A (ja) | ホワイトボックス実装 | |
| DE112017007095T5 (de) | Verschlüsselungsvorrichtung und entschlüsselungsvorrichtung | |
| Zhu et al. | A novel iris and chaos-based random number generator | |
| CN106464483A (zh) | 用于电子部件实现椭圆曲线密码算法的应对方法 | |
| Wang et al. | A novel image encryption algorithm based on chaotic system and improved Gravity Model | |
| FR3085215B1 (fr) | Dispositifs et procedes de masquage d'operations de cryptographie ecc | |
| Saeed et al. | A gray-scale image encryption using Fisher-Yates chaotic shuffling in wavelet domain | |
| Mondal et al. | An improved cryptography scheme for secure image communication | |
| CN108021815A (zh) | 图像加密方法、装置及电子设备 | |
| US20180139038A1 (en) | Computing with encrypted values | |
| Chen et al. | An application-layer plausibly deniable encryption system for wearable devices | |
| BRPI0503226A (pt) | sistema e método para gerar um indicador de estado seguro em uma tela | |
| Lipp | Cache attacks and rowhammer on arm | |
| FR2814620A1 (fr) | Procede de transmission accelere de signature electronique | |
| US11102241B2 (en) | Apparatus and method for performing operation being secure against side channel attack | |
| FR3004042B1 (fr) | Procedes de generation et d'utilisation de cles cryptographiques privees pour le rsa-crt ou les variantes du rsa-crt | |
| Gebereselassie et al. | A Secured Audio Encryption Algorithm Based On Gauss and Henon Chaotic Maps | |
| Khushal Patil et al. | A Multilayered Encryption for the Robust Design and Implementation of Secure Audio Files | |
| NL2036232B1 (en) | Cryptographic method |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| PLSC | Publication of the preliminary search report |
Effective date: 20190208 |
|
| PLFP | Fee payment |
Year of fee payment: 3 |
|
| PLFP | Fee payment |
Year of fee payment: 4 |
|
| PLFP | Fee payment |
Year of fee payment: 5 |
|
| PLFP | Fee payment |
Year of fee payment: 6 |
|
| PLFP | Fee payment |
Year of fee payment: 7 |
|
| PLFP | Fee payment |
Year of fee payment: 8 |
|
| PLFP | Fee payment |
Year of fee payment: 9 |