Unlock instant, AI-driven research and patent intelligence for your innovation.

Countermeasure method in electronic component using secret key cryptographic algorithm and electronic component

A cryptographic algorithm and component technology, applied in countermeasures against encryption mechanisms, record carriers used by machines, electrical components, etc.

Inactive Publication Date: 2007-05-30
GEMPLU
View PDF1 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0009] However, in cryptographic algorithms, certain computational data items rely only on information applied in plain text to the input of the card and on the secret key contained in the card

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Countermeasure method in electronic component using secret key cryptographic algorithm and electronic component
  • Countermeasure method in electronic component using secret key cryptographic algorithm and electronic component
  • Countermeasure method in electronic component using secret key cryptographic algorithm and electronic component

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0068] The DES encryption algorithm (hereinafter referred to as DES or DES algorithm for short) includes 16 rounds of calculation, denoted as T1 to T16, as shown in FIGS. 3 and 4 .

[0069] DES starts with an initial permutation IP of input information M (Fig. 3). The input information is a 64-bit word f. After permutation, a 64-bit word e is obtained, which is cut in two to form the input parameters L0 to R0 of the first round (T1). L0 is a 32-bit word d including the 32 most significant bits of word e. R0 is a 32-bit word h including the 32 least significant bits of word e.

[0070] The key K is a 64-bit word q which itself is permuted and compressed to provide a 56-bit word r.

[0071] The first round consists of the operation EXP PERM on parameter R0, which includes an expansion and a permutation to provide word 1 of 48 bits.

[0072] The word 1 is combined with parameter K1 in an exclusive OR type operation denoted XOR to provide a 48-bit word b. Parameter K1 is a 48...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

In an electronic component using a secret key cryptographic algorithm, one operation utilizes a first table for supplying output data from input data. The output data, and / or derived data, is manipulated by critical instructions. A countermeasure method involves the use of other tables such that the output data and the derived data are unpredictable. The other tables are obtained from the first table by an exclusive-OR operation with a random value, or a derived random value, on one and / or the other of the input and output data of the first table.

Description

technical field [0001] The present invention relates to countermeasures using keyed cryptographic algorithms in electronic assemblies. These electronic components are used in applications where access to services or data is tightly controlled. They have structures formed around the microprocessor and memory, one of which contains the program memory keys. Background technique [0002] These components are mainly used in chip cards for some of their applications. For example, they are applications that access certain databases; applications for banking services; applications for remote payment, such as for television, dispensing gasoline, or toll stations on highways. [0003] Therefore these components or these cards will use key cryptographic algorithms, the most famous of which is the DES algorithm (abbreviation for Data Encryption Standard in British and American English) and also has another key cryptographic algorithm, such as RC5 algorithm or COMP128 algorithm. Of co...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/06G06F12/14G06F21/10G06F21/55G06F21/60G06F21/62G06F21/75G06F21/86G06K19/07G09C1/00
CPCH04L9/0625H04L9/003G06F2207/7219H04L2209/08
Inventor C·克拉维尔J·-S·科伦
Owner GEMPLU