会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 1. 发明申请
    • CRYPTOGRAPHIC TOKEN WITH LEAK-RESISTANT KEY DERIVATION
    • CRYPTOGRAPHIC TOKEN WITH LEAK-RESISTANT KEY DORIVATION
    • US20120017089A1
    • 2012-01-19
    • US13245054
    • 2011-09-26
    • PAUL C. KOCHER
    • PAUL C. KOCHER
    • H04L9/32
    • G07F7/1008G06F2207/7219G06Q20/341G06Q20/40975H04L9/003H04L9/0625H04L9/0891
    • Methods and apparatuses for increasing the leak-resistance of cryptographic systems are disclosed. A cryptographic token maintains secret key data based on a top-level key. The token can produce updated secret key data using an update process that makes partial information that might have previously leaked to attackers about the secret key data no longer usefully describe the new updated secret key data. By repeatedly applying the update process, information leaking during cryptographic operations that is collected by attackers rapidly becomes obsolete. Thus, such a system can remain secure against attacks involving analysis of measurements of the device's power consumption, electromagnetic characteristics, or other information leaked during transactions. Transactions with a server can be secured with the token.
    • 公开了增加密码系统的防漏性的方法和装置。 加密令牌基于顶级密钥来维护密钥数据。 令牌可以使用更新过程产生更新的秘密密钥数据,该更新过程使先前泄漏给攻击者的部分信息对于秘密密钥数据不再有用地描述新的更新的秘密密钥数据。 通过重复应用更新过程,攻击者收集的密码操作过程中信息泄露迅速变得过时。 因此,这种系统可以保持安全性,防止涉及分析设备的功耗,电磁特性或事务中泄露的其他信息的测量的攻击。 可以使用令牌来保护与服务器的事务。
    • 3. 发明授权
    • Payment smart cards with hierarchical session key derivation providing security against differential power analysis and other attacks
    • 支付智能卡,具有分级会话密钥导出,提供针对差分功率分析和其他攻击的安全性
    • US07941666B2
    • 2011-05-10
    • US10396975
    • 2003-03-24
    • Paul C. Kocher
    • Paul C. Kocher
    • H04L9/00
    • G07F7/1008G06F2207/7219G06Q20/341G06Q20/40975H04L9/003H04L9/0625H04L9/0891
    • Chip cards are used to secure credit and debit payment transactions. To prevent fraudulent transactions, the card must protect cryptographic keys used to authenticate transactions. In particular, cards should resist differential power analysis and/or other attacks. To address security risks posed by leakage of partial information about keys during cryptographic transactions, cards may be configured to perform periodic cryptographic key update operations. The key update transformation prevents adversaries from exploiting partial information that may have been leaked about the card's keys. Update operations based on a hierarchical structure can enable efficient transaction verification by allowing a verifying party (e.g., an issuer) to derive a card's current state from a transaction counter and its initial state by performing one operation per level in the hierarchy, instead of progressing through all update operations performed by the card.
    • 芯片卡用于确保信用卡和借记支付交易。 为防止欺诈性交易,该卡必须保护用于验证交易的加密密钥。 特别地,卡应该抵抗差分功率分析和/或其他攻击。 为了解决在加密事务期间泄漏关于密钥的部分信息所引起的安全隐患,卡可被配置为执行周期性加密密钥更新操作。 关键的更新转换防止对手利用可能已经泄露的卡的密钥的部分信息。 基于层次结构的更新操作可以通过允许验证方(例如,发行者)从事务计数器及其初始状态通过在层次结构中执行每个级别的一个操作来导出卡的当前状态来实现高效的事务验证,而不是进行 通过卡执行的所有更新操作。
    • 4. 发明授权
    • Prevention of side channel attacks against block cipher implementations and other cryptographic systems
    • 防止针对块密码实现和其他加密系统的侧信道攻击
    • US07787620B2
    • 2010-08-31
    • US11252898
    • 2005-10-18
    • Paul C. KocherJoshua M. JaffeBenjamin C. Jun
    • Paul C. KocherJoshua M. JaffeBenjamin C. Jun
    • H04L9/22
    • H04L9/0625G06F21/556G06F21/602G06F21/755G06F2207/7219H04L9/003H04L2209/046H04L2209/08H04L2209/127
    • Methods and apparatuses are disclosed for improving DES and other cryptographic protocols against external monitoring attacks by reducing the amount (and signal-to-noise ratio) of useful information leaked during processing. An improved DES implementation of the invention instead uses two 56-bit keys (K1 and K2) and two 64-bit plaintext messages (M1 and M2), each associated with a permutation (i.e., K1P, K2P and M1P, M2P) such that K1P{K1} XOR K2P{K2} equals the “standard” DES key K, and M1P{M1} XOR M2P{M2} equals the “standard” message. During operation of the device, the tables are preferably periodically updated, by introducing fresh entropy into the tables faster than information leaks out, so that attackers will not be able to obtain the table contents by analysis of measurements. The technique is implementable in cryptographic smartcards, tamper resistant chips, and secure processing systems of all kinds.
    • 公开了用于通过减少在处理期间泄露的有用信息的量(和信噪比)来改善DES和其他加密协议以防外部监视攻击的方法和装置。 本发明的改进的DES实施方案改为使用两个56位密钥(K1和K2)和两个64位明文消息(M1和M2),每个与排列相关联(即,K1P,K2P和M1P,M2P),使得 K1P {K1} XOR K2P {K2}等于“标准”DES密钥K,M1P {M1} XOR M2P {M2}等于“标准”消息。 在设备的操作期间,优选地通过将新鲜的熵引入到表中比信息泄漏出来更周期地更新表,使得攻击者将不能通过分析测量获得表内容。 该技术可在加密智能卡,防篡改芯片和各种安全处理系统中实现。
    • 5. 发明授权
    • Cryptographic computation using masking to prevent differential power analysis and other attacks
    • 使用掩码进行密码计算,以防止差分功率分析和其他攻击
    • US07668310B2
    • 2010-02-23
    • US09930836
    • 2001-08-15
    • Paul C. KocherJoshua M. JaffeBenjamin C. Jun
    • Paul C. KocherJoshua M. JaffeBenjamin C. Jun
    • H04L9/22
    • H04L9/0625G06F21/556G06F21/602G06F21/755G06F2207/7219H04L9/003H04L2209/046H04L2209/08H04L2209/127
    • Methods and apparatuses are disclosed for improving DES and other cryptographic protocols against external monitoring attacks by reducing the amount (and signal-to-noise ratio) of useful information leaked during processing. An improved DES implementation of the invention instead uses two 56-bit keys (K1 and K2) and two 64-bit plaintext messages (M1 and M2), each associated with a permutation (i.e., K1P, K2P and M1P, M2P) such that K1P{K1} XOR K2P {K2} equals the “standard” DES key K, and M1P{M1} XOR M2P{M2} equals the “standard” message. During operation of the device, the tables are preferably periodically updated, by introducing fresh entropy into the tables faster than information leaks out, so that attackers will not be able to obtain the table contents by analysis of measurements. The technique is implementable in cryptographic smartcards, tamper resistant chips, and secure processing systems of all kinds.
    • 公开了用于通过减少在处理期间泄露的有用信息的量(和信噪比)来改善DES和其他加密协议以防外部监视攻击的方法和装置。 本发明的改进的DES实施方案改为使用两个56位密钥(K1和K2)和两个64位明文消息(M1和M2),每个与排列相关联(即,K1P,K2P和M1P,M2P),使得 K1P {K1} XOR K2P {K2}等于“标准”DES密钥K,M1P {M1} XOR M2P {M2}等于“标准”消息。 在设备的操作期间,优选地通过将新鲜的熵引入到表中比信息泄漏出来更周期地更新表,使得攻击者将不能通过分析测量获得表内容。 该技术可在加密智能卡,防篡改芯片和各种安全处理系统中实现。
    • 10. 发明申请
    • Leak-Resistant Cryptographic Token
    • 防漏密码令牌
    • US20110113248A1
    • 2011-05-12
    • US13010034
    • 2011-01-20
    • Paul C. KOCHER
    • Paul C. KOCHER
    • H04L9/32
    • G07F7/1008G06F2207/7219G06Q20/341G06Q20/40975H04L9/003H04L9/0625H04L9/0891
    • Chip cards are used to secure credit and debit payment transaction. To prevent fraudulent transaction, the card must protect cryptographic keys used to authenticate transactions. In particular, cards should resist differential power analysis and/or other attacks. To address security risks posed by leakage of partial information about keys during cryptographic transactions, cards may be configured to perform periodic cryptographic key update operations. The key update transformation prevents adversaries from exploiting partial information that may have been leaked about the card's keys. Update operations based on a hierarchical structure can enable efficient transaction verification by allowing a verifying party (e.g., an issuer) to derive a card's current state from a transaction counter and its initial state by performing one operation per level in the hierarchy, instead of progressing through all update operations performed by the card.
    • 芯片卡用于确保信用卡和借记支付交易。 为了防止欺诈性交易,该卡必须保护用于验证交易的加密密钥。 特别地,卡应该抵抗差分功率分析和/或其他攻击。 为了解决在加密事务期间泄漏关于密钥的部分信息所引起的安全隐患,卡可被配置为执行周期性加密密钥更新操作。 关键的更新转换防止对手利用可能已经泄露的卡的密钥的部分信息。 基于层次结构的更新操作可以通过允许验证方(例如,发行者)从事务计数器及其初始状态通过在层次结构中执行每个级别的一个操作来导出卡的当前状态来实现高效的事务验证,而不是进行 通过卡执行的所有更新操作。