[go: up one dir, main page]

FR3069993B1 - Dispositifs et procedes de masquage d'operations de chiffrement rsa - Google Patents

Dispositifs et procedes de masquage d'operations de chiffrement rsa Download PDF

Info

Publication number
FR3069993B1
FR3069993B1 FR1757555A FR1757555A FR3069993B1 FR 3069993 B1 FR3069993 B1 FR 3069993B1 FR 1757555 A FR1757555 A FR 1757555A FR 1757555 A FR1757555 A FR 1757555A FR 3069993 B1 FR3069993 B1 FR 3069993B1
Authority
FR
France
Prior art keywords
memory
erasable
masking
methods
devices
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
FR1757555A
Other languages
English (en)
Other versions
FR3069993A1 (fr
Inventor
Yann Yves Rene Loisel
Frank Lhermet
Jeremy Dubeuf
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Maxim Integrated Products Inc
Original Assignee
Maxim Integrated Products Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Maxim Integrated Products Inc filed Critical Maxim Integrated Products Inc
Priority to FR1757555A priority Critical patent/FR3069993B1/fr
Priority to US16/039,014 priority patent/US11115210B2/en
Priority to CN201810889230.6A priority patent/CN109388976B/zh
Publication of FR3069993A1 publication Critical patent/FR3069993A1/fr
Application granted granted Critical
Publication of FR3069993B1 publication Critical patent/FR3069993B1/fr
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/78Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
    • G06F21/79Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data in semiconductor storage media, e.g. directly-addressable memories
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G09EDUCATION; CRYPTOGRAPHY; DISPLAY; ADVERTISING; SEALS
    • G09CCIPHERING OR DECIPHERING APPARATUS FOR CRYPTOGRAPHIC OR OTHER PURPOSES INVOLVING THE NEED FOR SECRECY
    • G09C1/00Apparatus or methods whereby a given sequence of signs, e.g. an intelligible text, is transformed into an unintelligible sequence of signs by transposing the signs or groups of signs or by replacing them by others according to a predetermined system
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/002Countermeasures against attacks on cryptographic mechanisms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0869Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0894Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • H04L9/3006Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters
    • H04L9/302Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters involving the integer factorization problem, e.g. RSA or quadratic sieve [QS] schemes
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2143Clearing memory, e.g. to prevent the data from being stolen
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F7/00Methods or arrangements for processing data by operating upon the order or content of the data handled
    • G06F7/58Random or pseudo-random number generators
    • G06F7/588Random number generators, i.e. based on natural stochastic processes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/04Masking or blinding
    • H04L2209/046Masking or blinding of operations, operands or results of the operations

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computing Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Storage Device Security (AREA)

Abstract

Il est présenté des dispositifs et procédés destinés à protéger des données secrètes qui sont contenues dans une mémoire afin d'empêcher des accès et manipulation de données non autorisés. Différents modes de réalisation peuvent être appliqués afin de cacher ou masquer un exposant RSA utilisé pour la cryptographie à clef publique et mémorisé dans un bloc cryptographique matériel qui utilise une mémoire de travail ne pouvant être effacée pour des calculs. Dans certains modes de réalisation, le masquage d'exposants RSA est réalisé par un processus en deux étapes qui associe une valeur aléatoire et secrète, calculée de manière spécifique, à l'exposant secret. La valeur aléatoire est mémorisée dans une mémoire pouvant être effacée, de telle sorte qu'en cas d'attaque, à la fois la mémoire pouvant être effacée et la mémoire ne pouvant l'être ne laissent paraître aucun des secrets intégrés. Le sur-coût en ressources de mémoire n'affecte les performances du dispositif que seulement de manière insignifiante.
FR1757555A 2017-08-07 2017-08-07 Dispositifs et procedes de masquage d'operations de chiffrement rsa Active FR3069993B1 (fr)

Priority Applications (3)

Application Number Priority Date Filing Date Title
FR1757555A FR3069993B1 (fr) 2017-08-07 2017-08-07 Dispositifs et procedes de masquage d'operations de chiffrement rsa
US16/039,014 US11115210B2 (en) 2017-08-07 2018-07-18 Systems and methods for masking RSA operations
CN201810889230.6A CN109388976B (zh) 2017-08-07 2018-08-07 用于屏蔽rsa运算的系统和方法

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
FR1757555A FR3069993B1 (fr) 2017-08-07 2017-08-07 Dispositifs et procedes de masquage d'operations de chiffrement rsa
FR1757555 2017-08-07

Publications (2)

Publication Number Publication Date
FR3069993A1 FR3069993A1 (fr) 2019-02-08
FR3069993B1 true FR3069993B1 (fr) 2020-09-18

Family

ID=60923571

Family Applications (1)

Application Number Title Priority Date Filing Date
FR1757555A Active FR3069993B1 (fr) 2017-08-07 2017-08-07 Dispositifs et procedes de masquage d'operations de chiffrement rsa

Country Status (3)

Country Link
US (1) US11115210B2 (fr)
CN (1) CN109388976B (fr)
FR (1) FR3069993B1 (fr)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110048840B (zh) * 2019-04-28 2021-10-15 苏州国芯科技股份有限公司 一种基于rsa算法的信息处理方法、系统及相关组件
CN111190733B (zh) * 2019-12-27 2023-11-17 华为技术有限公司 用于进行rsa计算的计算资源调度方法及装置
CN116522351A (zh) 2022-01-20 2023-08-01 瑞昱半导体股份有限公司 降低成功率的方法、密码系统处理电路及电子装置
US12200101B2 (en) * 2023-06-14 2025-01-14 Trustees Of Boston University Semi-custom accelerator device for bootstrappable fully homomorphic encryption

Family Cites Families (19)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH1165439A (ja) * 1996-08-09 1999-03-05 Nippon Telegr & Teleph Corp <Ntt> N進表現暗号による通信および認証方法、ならびにそれらの装置、およびn進表現暗号による通信および認証プログラムを格納した記憶媒体
US7366305B2 (en) * 2003-09-30 2008-04-29 Intel Corporation Platform and method for establishing trust without revealing identity
FR2867635B1 (fr) * 2004-03-11 2006-09-22 Oberthur Card Syst Sa Procede de traitement de donnees securise, base notamment sur un algorithme cryptographique
US7590880B1 (en) * 2004-09-13 2009-09-15 National Semiconductor Corporation Circuitry and method for detecting and protecting against over-clocking attacks
JP4962165B2 (ja) 2007-06-22 2012-06-27 大日本印刷株式会社 暗号処理装置,暗号処理プログラム及び暗号処理方法
US20090016523A1 (en) * 2007-07-12 2009-01-15 Atmel Corporation Masking and Additive Decomposition Techniques for Cryptographic Field Operations
WO2009118795A1 (fr) * 2008-03-28 2009-10-01 富士通株式会社 Procédé de cryptage présentant une bonne résistance aux attaques du canal latéral
US20130265163A1 (en) * 2010-06-09 2013-10-10 Raytheon Company Magnetic Field Activated Intrusion Detection
FR2966953B1 (fr) * 2010-11-02 2015-08-28 St Microelectronics Rousset Procede de contremesure cryptographique par derivation d'une donnee secrete
EP2506176A1 (fr) * 2011-03-30 2012-10-03 Irdeto Corporate B.V. Établissement de clé unique durant la fabrication de puce
GB2494731B (en) * 2011-09-06 2013-11-20 Nds Ltd Preventing data extraction by sidechannel attack
JP5481455B2 (ja) * 2011-09-27 2014-04-23 株式会社東芝 暗号処理装置
US9335967B1 (en) * 2013-06-13 2016-05-10 Cadence Design Systems, Inc. Accurate floating-point calculation method and device
FR3010210B1 (fr) * 2013-08-29 2017-01-13 Stmicroelectronics Rousset Protection d'un calcul contre des attaques par canaux caches
US10263770B2 (en) * 2013-11-06 2019-04-16 Pure Storage, Inc. Data protection in a storage system using external secrets
KR102279027B1 (ko) * 2014-12-03 2021-07-19 삼성전자주식회사 멀티 스레드를 실행하는 방법 및 장치
JP6058245B2 (ja) 2015-01-15 2017-01-11 三菱電機株式会社 乱数拡大装置、乱数拡大方法及び乱数拡大プログラム
FR3033965B1 (fr) * 2015-03-18 2018-12-07 Maxim Integrated Products, Inc. Systèmes et procédés de commande de dispositifs de cryptage sur courbe elliptique sécurisés
US10205598B2 (en) * 2015-05-03 2019-02-12 Ronald Francis Sulpizio, JR. Temporal key generation and PKI gateway

Also Published As

Publication number Publication date
US11115210B2 (en) 2021-09-07
FR3069993A1 (fr) 2019-02-08
US20190044717A1 (en) 2019-02-07
CN109388976A (zh) 2019-02-26
CN109388976B (zh) 2023-12-05

Similar Documents

Publication Publication Date Title
Wang et al. An efficient double-image encryption and hiding algorithm using a newly designed chaotic system and parallel compressive sensing
FR3069993B1 (fr) Dispositifs et procedes de masquage d&#39;operations de chiffrement rsa
Franz et al. CBMC-GC: an ANSI C compiler for secure two-party computations
Zhu et al. An image encryption scheme using generalized Arnold map and affine cipher
EA201891822A1 (ru) Безопасность персональных устройств с использованием криптографии на основе эллиптических кривых для разделения секрета
RU2011148528A (ru) Способ и система защиты криптографического устройства
JP2011513787A (ja) ホワイトボックス実装
DE112017007095T5 (de) Verschlüsselungsvorrichtung und entschlüsselungsvorrichtung
Zhu et al. A novel iris and chaos-based random number generator
CN106464483A (zh) 用于电子部件实现椭圆曲线密码算法的应对方法
Wang et al. A novel image encryption algorithm based on chaotic system and improved Gravity Model
FR3085215B1 (fr) Dispositifs et procedes de masquage d&#39;operations de cryptographie ecc
Saeed et al. A gray-scale image encryption using Fisher-Yates chaotic shuffling in wavelet domain
Mondal et al. An improved cryptography scheme for secure image communication
CN108021815A (zh) 图像加密方法、装置及电子设备
US20180139038A1 (en) Computing with encrypted values
Chen et al. An application-layer plausibly deniable encryption system for wearable devices
BRPI0503226A (pt) sistema e método para gerar um indicador de estado seguro em uma tela
Lipp Cache attacks and rowhammer on arm
FR2814620A1 (fr) Procede de transmission accelere de signature electronique
US11102241B2 (en) Apparatus and method for performing operation being secure against side channel attack
FR3004042B1 (fr) Procedes de generation et d&#39;utilisation de cles cryptographiques privees pour le rsa-crt ou les variantes du rsa-crt
Gebereselassie et al. A Secured Audio Encryption Algorithm Based On Gauss and Henon Chaotic Maps
Khushal Patil et al. A Multilayered Encryption for the Robust Design and Implementation of Secure Audio Files
NL2036232B1 (en) Cryptographic method

Legal Events

Date Code Title Description
PLSC Publication of the preliminary search report

Effective date: 20190208

PLFP Fee payment

Year of fee payment: 3

PLFP Fee payment

Year of fee payment: 4

PLFP Fee payment

Year of fee payment: 5

PLFP Fee payment

Year of fee payment: 6

PLFP Fee payment

Year of fee payment: 7

PLFP Fee payment

Year of fee payment: 8

PLFP Fee payment

Year of fee payment: 9