Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!
Protection against passive sniffing
What is Al technical title?
Al technical title is built by PatSnap Al team. It summarizes the technical point description of the patent document.
A Linearly Independent, Encryption Algorithm Technology
Active Publication Date: 2013-11-20
MORPHO INC
View PDF4 Cites 2 Cited by
Summary
Abstract
Description
Claims
Application Information
AI Technical Summary
This helps you quickly interpret patents by identifying the three key elements:
Problems solved by technology
Method used
Benefits of technology
Problems solved by technology
[0016] However, sometimes attacks succeed in overcoming the difficulties posed by existing masking techniques
In particular, certain kinds of attacks, such as HO-DPA (High-Order Differential Power Analysis) attacks may be particularly difficult to avoid in certain situations
Method used
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more
Image
Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
Click on the blue label to locate the original text in one second.
Reading with bidirectional positioning of images and text.
Smart Image
Examples
Experimental program
Comparison scheme
Effect test
Embodiment Construction
[0033] Figure 1 shows a schematic overview of the method according to the invention. In this method, the processing starts with masked data CL_TXT (for "clear text"), e.g. in the MSK step for data items to be encrypted; then, the encryption algorithm ALG to be protected (e.g. encryption of AES algorithm); then, the result is finally unmasked (in step U_MSK, for "unmask") in order to recover the value CR_TXT (recovered from "ciphertext" or encrypted text), which is usually without The shielding case is generated by the algorithm ALG. In other words, if the two steps of masking MSK using a linear code and unmasking U_MSK (using the corresponding decoding) are eliminated, only the encryption algorithm ALG remains, and the same output CR_TXT can be obtained from the input CL_TXT, which means The algorithm is made more secure through shielding without compromising its interoperability. In the encryption algorithm, the masking operation MSK is combined with the unmasking operation...
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More
PUM
Login to View More
Abstract
The invention relates in particular to a method for securing the execution of a cryptographic algorithm (ALG) against passive sniffing, the method implementing masking (MSK) of data processed by the cryptographic algorithm. The masking (MSK) of said data includes a linear encoding step such as x'=x.L+c, in which x is the data to be masked, x' is the corresponding masked data, c is a code word included in a linear code C, and L is a matrix made up of linearly independent vectors not included in the linear code C. The invention also relates to a device (SC) implementing such a method.
Description
technical field [0001] The invention relates to the protection of encryption algorithms against passive interception. Background technique [0002] A cryptographic algorithm is an algorithm designed to protect information, for example, by applying mathematical methods to preserve its privacy, authenticity, or integrity. Typically, encryption algorithms are based on one or more keys, which can be secret, private, or public. Some encryption algorithms do not use a key, which is true for some hash functions (such as SHA-1, MD5, SHA-256, RIPEMD-160, etc.). Encryption algorithms include encoding algorithms (which can produce incomprehensible information) and decoding algorithms (which restore original information from encoded information), such as algorithms used for electronic signatures, signature verification, authentication, and verification of authentication. Some key-based encryption algorithms are called symmetric (for example, algorithms DES, 3DES, AES, RC4, HMAC, etc.)...
Claims
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More
Application Information
Patent Timeline
Application Date:The date an application was filed.
Publication Date:The date a patent or application was officially published.
First Publication Date:The earliest publication date of a patent with the same application number.
Issue Date:Publication date of the patent grant document.
PCT Entry Date:The Entry date of PCT National Phase.
Estimated Expiry Date:The statutory expiry date of a patent right according to the Patent Law, and it is the longest term of protection that the patent right can achieve without the termination of the patent right due to other reasons(Term extension factor has been taken into account ).
Invalid Date:Actual expiry date is based on effective date or publication date of legal transaction data of invalid patent.