Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Protection against passive sniffing

A Linearly Independent, Encryption Algorithm Technology

Active Publication Date: 2013-11-20
MORPHO INC
View PDF4 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0016] However, sometimes attacks succeed in overcoming the difficulties posed by existing masking techniques
In particular, certain kinds of attacks, such as HO-DPA (High-Order Differential Power Analysis) attacks may be particularly difficult to avoid in certain situations

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Protection against passive sniffing
  • Protection against passive sniffing

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0033] Figure 1 shows a schematic overview of the method according to the invention. In this method, the processing starts with masked data CL_TXT (for "clear text"), e.g. in the MSK step for data items to be encrypted; then, the encryption algorithm ALG to be protected (e.g. encryption of AES algorithm); then, the result is finally unmasked (in step U_MSK, for "unmask") in order to recover the value CR_TXT (recovered from "ciphertext" or encrypted text), which is usually without The shielding case is generated by the algorithm ALG. In other words, if the two steps of masking MSK using a linear code and unmasking U_MSK (using the corresponding decoding) are eliminated, only the encryption algorithm ALG remains, and the same output CR_TXT can be obtained from the input CL_TXT, which means The algorithm is made more secure through shielding without compromising its interoperability. In the encryption algorithm, the masking operation MSK is combined with the unmasking operation...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates in particular to a method for securing the execution of a cryptographic algorithm (ALG) against passive sniffing, the method implementing masking (MSK) of data processed by the cryptographic algorithm. The masking (MSK) of said data includes a linear encoding step such as x'=x.L+c, in which x is the data to be masked, x' is the corresponding masked data, c is a code word included in a linear code C, and L is a matrix made up of linearly independent vectors not included in the linear code C. The invention also relates to a device (SC) implementing such a method.

Description

technical field [0001] The invention relates to the protection of encryption algorithms against passive interception. Background technique [0002] A cryptographic algorithm is an algorithm designed to protect information, for example, by applying mathematical methods to preserve its privacy, authenticity, or integrity. Typically, encryption algorithms are based on one or more keys, which can be secret, private, or public. Some encryption algorithms do not use a key, which is true for some hash functions (such as SHA-1, MD5, SHA-256, RIPEMD-160, etc.). Encryption algorithms include encoding algorithms (which can produce incomprehensible information) and decoding algorithms (which restore original information from encoded information), such as algorithms used for electronic signatures, signature verification, authentication, and verification of authentication. Some key-based encryption algorithms are called symmetric (for example, algorithms DES, 3DES, AES, RC4, HMAC, etc.)...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/06
CPCH04L9/28H04L2209/04H04L9/003H04L2209/56H04L9/30H04L9/002H04L9/008H04L9/06H04L9/08H04L9/32
Inventor 赫弗·查巴内朱利恩·布林格桑赫哈·莱
Owner MORPHO INC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products