Low-complexity electronic circuit protected by customized masking

一种电路、解掩蔽的技术,应用在密码电路,电子电路领域,能够解决电路复杂度增加、不能抵挡等问题,达到独特保护的效果

Active Publication Date: 2014-12-24
FRANCE TELECOM EDUCATION GRP-PARIS TELECOM INST
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0016] This duplication implies a significant increase in circuit complexity compared to an unmasked implementation
[0017] Furthermore, these countermeasures cannot withstand attacks greater than or equal to the second order

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Low-complexity electronic circuit protected by customized masking
  • Low-complexity electronic circuit protected by customized masking
  • Low-complexity electronic circuit protected by customized masking

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0049] figure 1 An example of a Feistel function protected by masking is shown.

[0050] Masking principles known to those skilled in the art consist in modifying the representation of the sensitive variable x into a redundant representation. This representation consists of at least two parts, one corresponding to the masked sensitive data denoted by x⊕m and the other corresponding to the mask m. The sum of these two parts in the binary Galois field defining them makes it possible to obtain the variable x by using the following properties:

[0051] x=(x⊕m)⊕m (1)

[0052] As an example, in a block encryption algorithm such as DES or AES, the operation result for encrypting a data block is obtained through many rounds of repetition. A "round" is a computational cycle in which at least two types of transformations are performed, one linear and the other non-linear, also called substitution transformations.

[0053] A linear transformation aims to generate dif...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A cryptography circuit protected by masking, said circuit including means for encrypting binary words using at least one key krc, means for applying linear processing operations and nonlinear processing operations to said words and means for masking said words. The binary words are unmasked upstream of the nonlinear processing operations by using a mask kri and masked downstream of said processing operations by using a mask kr+1i, the masks kri and kr+1i being chosen from a set of masks that is specific to each instance of the circuit.

Description

technical field [0001] The present invention relates to electronic circuits protected by masking and utilizing circuit-specific customizations in order to reduce the observed attack range and reduce the cost of achieving the protection. The invention is particularly applicable in the field of protection of circuits dealing with confidential data, one example of which is cryptographic circuits. Background technique [0002] During the operation of an electronic circuit, the activity of the electronic circuit can be observed through physical quantities such as power consumption, computation time or electromagnetic radiation. [0003] These physical quantities depend on the computing architecture and the data processed within the circuit. Information about the processed data can thus be obtained indirectly outside the circuit by observing said quantities, called hidden or auxiliary channels. [0004] Dissipation of these physical quantities can compromise the security of syst...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/06
CPCH04L9/003H04L2209/046H04L9/28H04L2209/12H04L9/0618
Inventor S·吉耶J-L·当热
Owner FRANCE TELECOM EDUCATION GRP-PARIS TELECOM INST
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products