Unlock instant, AI-driven research and patent intelligence for your innovation.

Method for securely checking a code

A reliable and verifier technology, which is applied in the direction of response error generation, redundant code error detection, attack encryption mechanism countermeasures, etc., can solve the problem that the known code verifier does not resist attacks, etc., to improve protection and avoid The effect of false attacks

Inactive Publication Date: 2014-03-19
ROBERT BOSCH GMBH
View PDF5 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0017] A disadvantage in known code verifiers is that known code verifiers are not inherently resistant to attacks such as DPA

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for securely checking a code
  • Method for securely checking a code
  • Method for securely checking a code

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0037] The invention is schematically illustrated with the aid of an embodiment in the drawing and is described in detail below with reference to the drawing.

[0038] figure 1 An embodiment of a mask generator is shown schematically, which is denoted overall by the reference numeral 100 . The mask generator 100 is used to form a bit vector with 128 bits from the input signal 102 . To this end, circuit arrangement 100 includes four devices 104 , 106 , 108 and 110 , which each include 16 conversion elements TE_0 , TE_1 , TE_2 , . . . , TE_15 . For clarity, the figure 1 Only 4 of the 16 conversion elements TE_0, TE_1, TE_2, . . . , TE_15 are shown in each case. In this implementation, the mask generator 100 is configured such that each conversion element TE_0, TE_1, TE_2, . . . 102. Importantly, in each device 104, 106, 108 and 110 all transformation elements TE_0, TE_1, TE_2, . . . are different from each other.

[0039] Transformation elements TE_0 , TE_1 , TE_2 , . . ....

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a method and a circuit configuration for securely checking a first code word. The method uses at least one code checker and provides that the first code word to be checked is transferred into a second code word prior to entry in the code checker.

Description

technical field [0001] The invention relates to a method for securely checking codes and a circuit arrangement for carrying out the described method, which circuit arrangement is also called a tester or verifier and is secured against fault attacks. Background technique [0002] Redundant codes are used in safety-related systems in which faults are detected by code checkers if they exist and critical situations can thus be avoided. Here, m out of n codes also play a role. Furthermore, random generators are required for cryptographic applications according to the NIST (National Institute of Standards and Technology) recommendations (for this see the separate publication "Recommendation for Random Number Generation Using Deterministic Random Bit Generators", SP 800-90 , March 2007) should have a self-test. For any deterministic random generator, the implementation of the self-test can be expensive. If an m-of-n code is used for this implementation, the proposed self-test ca...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/00G06F11/08H03M13/51
CPCH04L9/004H04L9/003G06F21/60H03M13/51G06F11/08H04L9/00
Inventor E.贝尔
Owner ROBERT BOSCH GMBH