Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Security processor and operation method thereof, and method for encrypting or decrypting data

The technology of a security processor and operation method, which is applied in the field of security processors, can solve problems such as increase of circuit area or average power consumption of security processors, inability of SCA to provide sufficient protection, and influence on performance of security processors, etc.

Pending Publication Date: 2020-07-24
SAMSUNG ELECTRONICS CO LTD
View PDF1 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] Defensive techniques against SCA, including masking or hiding side-channel information, can affect security processor performance
For example, implementing defensive techniques may increase the circuit area or average power consumption of the secure processor
Also, these defensive techniques may not provide adequate protection against some SCAs such as template attacks and power analysis attacks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security processor and operation method thereof, and method for encrypting or decrypting data
  • Security processor and operation method thereof, and method for encrypting or decrypting data
  • Security processor and operation method thereof, and method for encrypting or decrypting data

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0027] figure 1 is a block diagram illustrating an electronic system 1 according to an example embodiment.

[0028] refer to figure 1 , the electronic system 1 may include a security processor 10 , a memory 20 and a central processing unit (CPU) 30 . The electronic system 1 may correspond to various types of systems including, for example, a laptop computer, a mobile phone, a smart phone, a tablet personal computer (PC), and a personal digital assistant (PDA).

[0029] The CPU 30 can output various control signals for controlling the security processor 10 and the memory 20 . In another embodiment, an application processor (AP) may perform the functions of the CPU 30 .

[0030] The memory 20 may store data under the control of the CPU 30 or the security processor 10 . In an embodiment of the present inventive concept, the memory 20 may record the input data ID received from an external source, provide the input data ID to the security processor 10 under the control of the C...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Provided are a security processor and an operation method thereof, and a method for encrypting or decrypting data. The security processor includes a random number generator configured to generate a first random number; a modular calculator configured to generate a first random operand based on first data and the first random number and generate output data through a remainder operation on the first random operand, wherein a result value of the remainder operation on the first input data is identical to a result value of the remainder operation on the first random operand.

Description

[0001] Cross References to Related Applications [0002] This application claims priority to Korean Patent Application No. 10-2019-0005855 filed at the Korean Intellectual Property Office on Jan. 16, 2019, the entire disclosure of which is incorporated herein by reference. technical field [0003] The concept of the present invention relates to a security processor, and more particularly, to a security processor capable of effectively protecting a computer system from side channel attacks (SCA (side channel attack)) and an operation method of the security processor. Background technique [0004] The security processor can execute security algorithms such as cryptographic operations by using security-required information such as keys. Leakage of confidential information based on a secure processor performing cryptographic operations may be called a side channel, and an attack method using the side channel may be called SCA. The security processor may employ countermeasures a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/60G06F21/71G06F21/75
CPCG06F21/602G06F21/71G06F21/755G06F7/722G06F7/586G06F21/72G06F21/50G06F7/588G06F7/544
Inventor 金栽赫申钟勋姜智守金贤镒李惠秀崔弘默
Owner SAMSUNG ELECTRONICS CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products