Unlock instant, AI-driven research and patent intelligence for your innovation.

Method for protecting secrete data in data storage medium

A technology for storage media and data protection, applied in data processing applications, electrical digital data processing, digital data processing components, etc.

Inactive Publication Date: 2004-12-15
GIESECKE & DEVRIENT MOBILE SECURITY GMBH
View PDF1 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] A further problem arises if, during current analysis, it is possible to identify whether the multiplication process is performed with the same factor (corresponding to the squaring operation on the intermediate result) or with a different factor (corresponding to the multiplication operation of the intermediate result with the message), because by It is also possible for this method to recognize the multiplication operation for (M+r*n)

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0016] In the following text, the invention will be explained with reference to an exemplary embodiment of exponentiation modulo. Without any restriction on generality, it is assumed that the exponentiation modulo process is computed to form the encrypted message Y=M d mod n, because if a "1" occurs in d, the intermediate result is squared and the message M is multiplied, and if a "0" occurs, the intermediate result is squared.

[0017] According to the invention, for the encryption process, first a random number r is selected and then the product r*n is formed. The exponentiation process then begins with a squaring operation, where the product r*n is added to the intermediate result Z to compute the expression (Z*(Z+r*n) mod k*n), where k is an integer rather than Evaluates the expression Z*Z mod n. In the case where the exponent, that is to say the key d, contains "1" at this point, a multiplication operation follows, in which (r i *n) added to message M, that is to say ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a data carrier comprising a semiconductor chip provided with at least one memory in which an operating program is stored. Said operating program contains a number of instructions, whereby each instruction is elicited by signals that can be detected outside of the semiconductor chip. According to the invention, the data carrier is designed in such a way that data which is repeatedly used for computation is rendered unfamiliar with different functions.

Description

technical field [0001] The invention relates to a data storage medium with a semiconductor chip and a method for protecting the stored data. In the chip, confidential data is stored and processed. Background technique [0002] Data storage media containing chips are used in a large number of different applications, for example, in order to carry out financial transactions for payment for goods or services, or as authentication means for controlling access checks. In all these applications, confidential data that must be protected from access by unauthorized third parties is usually processed on-chip in the data storage medium. This protection is also more assured due to the fact that the internal structures of the chip are very small in area, making it very difficult to access these structures in order to extract the data being processed in these structures. To make access more difficult, the chip could be embedded in a very fixed adhesive compound, whose forced movement wo...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G07F7/12G06F7/72G06F21/75G06F21/86G06K19/073G07F7/10G09C1/00H04L9/16H04L9/18
CPCG06F2207/7257G07F7/1016G06Q20/40975H04L9/0612G07F7/1008G06F7/723G06F2207/7247G06Q20/341G06F2207/7238H04L9/003G06F3/06
Inventor 赫曼·德雷克斯勒哈拉尔德·瓦特
Owner GIESECKE & DEVRIENT MOBILE SECURITY GMBH