Low-complexity electronic circuit protected by customized masking

A circuit and unmasking technology, applied in the field of cryptographic circuits and electronic circuits, can solve the problems of increased circuit complexity and irresistibility, and achieve the effect of unique protection

Active Publication Date: 2012-08-22
法国电信教育集团-巴黎电信学院
View PDF3 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0016] This duplication implies a significant increase in circuit complexity compared to an unmasked implementation
[0017] Furthermore, these countermeasures cannot withstand attacks greater than or equal to the second order

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Low-complexity electronic circuit protected by customized masking
  • Low-complexity electronic circuit protected by customized masking
  • Low-complexity electronic circuit protected by customized masking

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0049] figure 1 An example of a Feistel function protected by masking is shown.

[0050] Masking principles known to those skilled in the art consist in modifying the representation of the sensitive variable x into a redundant representation. This representation consists of at least two parts, one corresponding to the masked sensitive data denoted by x⊕m and the other corresponding to the mask m. The sum of these two parts in the binary Galois field defining them makes it possible to obtain the variable x by using the following properties:

[0051] x=(x⊕m)⊕m (1)

[0052] As an example, in a block encryption algorithm such as DES or AES, the operation result for encrypting a data block is obtained through many rounds of repetition. A "round" is a computational cycle in which at least two types of transformations are performed, one linear and the other non-linear, also called substitution transformations.

[0053] A linear transformation aims to generate dif...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a masking-protected cryptographic circuit, said circuit comprising a means for encrypting binary words through the use of at least one key kr c, a means for applying linear processing (216) and nonlinear processing (226) to said words, and a means for masking said words. The binary words are unmasked (214) upstream from the nonlinear processing through the use of a mask kr i and are masked (215) downstream from said processing through the use of a mask kr+1 i, the masks kr i and kr+1 i being selected from within a set of masks that are specific to each instance of the circuit.

Description

technical field [0001] The present invention relates to electronic circuits protected by masking and utilizing circuit-specific customizations in order to reduce the observed attack range and reduce the cost of achieving the protection. The invention is particularly applicable in the field of protection of circuits dealing with confidential data, one example of which is cryptographic circuits. Background technique [0002] During the operation of an electronic circuit, the activity of the electronic circuit can be observed through physical quantities such as power consumption, computation time or electromagnetic radiation. [0003] These physical quantities depend on the computing architecture and the data processed within the circuit. Information about the processed data can thus be obtained indirectly outside the circuit by observing said quantities, called hidden or auxiliary channels. [0004] Dissipation of these physical quantities can compromise the security of syst...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/06
Inventor S·吉耶J-L·当热
Owner 法国电信教育集团-巴黎电信学院
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products