会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 6. 发明申请
    • SECURING A CRYPTOGRAPHIC DEVICE AGAINST IMPLEMENTATION ATTACKS
    • 保护实施违规行为的制裁手段
    • US20160072779A1
    • 2016-03-10
    • US14850886
    • 2015-09-10
    • NXP B.V.
    • Marcel MedwedMartin FeldhoferVentzislav Nikov
    • H04L29/06
    • H04L63/068H04L9/003H04L9/0618H04L63/062H04L2209/805
    • Methods of securing a cryptographic device against implementation attacks, are described. A disclosed method comprises the steps of obtaining a key (230) from memory of the cryptographic device; providing the key and a constant input (210) to an encryption module (240); deriving an output (250) of encrypted data bits using the encryption module (240); providing the output (250), the key (230) and an input vector (270) to a key update module (260); and using said key update module (260) to modify the key based on at least a part (270a) of the input vector (270) to derive an updated key (230a). This prevents the value of the key from being derived using the updated key or by using side-channel attacks because the input is constant for all keys. Additionally, by altering the input vector, the updated key is also altered.
    • 描述了保护加密设备免遭实施攻击的方法。 所公开的方法包括从密码装置的存储器获取密钥(230)的步骤; 向加密模块(240)提供密钥和恒定输入(210); 使用加密模块(240)导出加密数据比特的输出(250); 向密钥更新模块(260)提供输出(250),密钥(230)和输入向量(270); 以及使用所述密钥更新模块(260)基于所述输入向量(270)的至少一部分(270a)来修改所述密钥以导出更新的密钥(230a)。 这样可以防止使用更新的密钥或通过使用侧信道攻击来导出密钥的值,因为所有密钥的输入是不变的。 另外,通过改变输入向量,更新的密钥也被改变。
    • 10. 发明申请
    • SECURING A CRYPTOGRAPHIC DEVICE
    • 保护CRYPTOGRAPHIC设备
    • US20160323097A1
    • 2016-11-03
    • US15143259
    • 2016-04-29
    • NXP B.V.
    • Marcel MedwedVentzislav NikovMartin Feldhofer
    • H04L9/00H04L9/06H04L29/06H04L9/08G06F7/58
    • H04L9/002G06F7/582H04L9/003H04L9/0662H04L9/0869H04L9/0891H04L63/0457H04L63/08H04L63/123
    • Methods of securing a cryptographic device against implementation attacks are described. A disclosed method comprises the steps of: generating secret values (324) using a pseudorandom generator (510); providing a key (330), an input (324) having a number of chunks and the secret values to an encryption module (340); indexing the chunks and the secret values (324); processing the input chunk wise by encrypting the secret values (324) indexed by the chunks using the key (330) and the encryption module (340); generating for each chunk a pseudorandom output (330′) of the encryption module (340), providing the pseudorandom output as the key (330′) when processing the next chunk; and performing a final transformation on the last pseudorandom output (330′) from the previous step by using it as a key to encrypt a fixed plaintext.
    • 描述了保护加密设备免遭实施攻击的方法。 所公开的方法包括以下步骤:使用伪随机发生器(510)产生秘密值(324); 提供密钥(330),具有多个块的输入(324)和秘密值给加密模块(340); 索引大块和秘密值(324); 通过使用密钥(330)和加密模块(340)加密由块索引的秘密值(324)来处理输入块; 为每个块生成加密模块(340)的伪随机输出(330'),在处理下一个块时提供伪随机输出作为密钥(330'); 并且通过使用它作为加密固定明文的密钥,对前一步骤的最后伪随机输出(330')执行最终变换。