Unlock instant, AI-driven research and patent intelligence for your innovation.

Apparatus and method for generating message authentication code

A message verification code and message technology, which is applied in the field of message verification code generation based on the first message and the original key, can solve the problems of large calculation time, occupation, and large area

Active Publication Date: 2017-04-26
INFINEON TECH AG
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

For this purpose, such algorithms are protected, for example, by masking methods which either require a considerable amount of computing time when used in software or require a correspondingly large area when implemented in hardware

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Apparatus and method for generating message authentication code
  • Apparatus and method for generating message authentication code
  • Apparatus and method for generating message authentication code

Examples

Experimental program
Comparison scheme
Effect test

Embodiment approach

[0068] According to one embodiment, a device can be provided which is configured to replace the original key k with a generated key k' for generating a message authentication code, the generated key being generated by:

[0069] k':=k'(k,M):=AES k (H(M)).

[0070] Among them, M represents the message; H represents the hash operation applied to this message to obtain the hash value H(M); AES k denotes the AES encryption algorithm that utilizes the original key k for encrypting the hash value M; and k' denotes the generated key to be generated. Such a device automatically satisfies points a) to d).

[0071] Point e) is ensured by implementation. Point e) can be achieved eg with a masking scheme according to the prior art, eg a known technique for masking of the AES encryption algorithm.

[0072] Among other reasons, it is particularly advantageous to generate generated keys in this way because the hashing operation used does not necessarily have to be protected against side-c...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention relates to an apparatus for generating a message verification code based on a first message and an original key. The apparatus includes a key generator (110) for generating a generated key based on the original key and the first message. In addition, the apparatus includes a message verification code generator (120) for generating a message verification code based on the generated key and the first message.

Description

technical field [0001] The present invention relates to the generation of a message verification code and, in particular, a device and method for generating a message verification code based on a first message and an original key. Background technique [0002] Side-channel attacks, such as Simple Power Analysis (SPA) and Differential Power Analysis (DPA), have been used for more than a decade against implementations of symmetric block ciphers (Blockchiffren). Attack, the symmetric block encryption is used, for example, by the DES encryption algorithm (English: DES=Data Encryption Standard) or by the AES encryption algorithm (English: AES=Advanced Encryption Standard). Likewise, asymmetric encryption algorithms such as the RSA encryption algorithm (RSA=Rivest Shamir Adleman) and the Elliptic Curve Cryptosystem are also attacked using side-channel attacks such as SPA and DPA. "Attack" here means that the attacker extracts the secret key to run the encryption algorithm. [00...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32
CPCH04L9/003H04L9/0643H04L2209/046H04L9/0861
Inventor 威兰·费舍尔
Owner INFINEON TECH AG