Unlock instant, AI-driven research and patent intelligence for your innovation.

Method for protecting a cryptographic module and a device having cryptographic module protection capabilities

a cryptographic module and protection capability technology, applied in the direction of unauthorized memory use protection, instruments, error detection/correction, etc., can solve the problems of destroying the stored key, increasing the vulnerability of the cipher to cryptanalysis, and causing faults

Active Publication Date: 2014-03-18
NXP USA INC
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Hardware faults can increase a cipher's vulnerability to cryptanalysis.
Faults can be induced by various manners, including but not limited to subjecting the device to abnormal conditions (high temperature, very low temperatures, supplying a supply voltage level that does not correspond to the frequency of clock signal that is provided to the device, and the like).
Accordingly, an erasure of the stored key (e.g. stored in the cryptographic module) will not necessarily protect the key as the output already contains key related information.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0018]The following figures illustrate exemplary embodiments of the invention. They are not intended to limit the scope of the invention but rather assist in understanding some of the embodiments of the invention. It is further noted that all the figures are out of scale.

[0019]Because the embodiments of are, for the most part, composed of electronic components and circuits known to those skilled in the art, circuit details will not be explained in any greater extent than that considered necessary as illustrated above, for the understanding and appreciation of the underlying concepts of the present invention and in order not to obfuscate or distract from the teachings of the present invention.

[0020]The functionality of a cryptographic module is estimated based upon a functionality of a circuit that is expected to malfunction before (at a lower frequency than) the cryptographic module malfunctions. If a circuit malfunction is detected then a cryptographic module protective measure can...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A device and a method for protecting a cryptographic module of which the method includes: estimating a functionality of a circuit that is adapted to malfunction when a physical parameter has a first value different from a nominal parameter value at which the cryptographic module functions correctly. The cryptographic module malfunctions when the physical parameter has a second value different from the nominal parameter value and a difference between the first value and the nominal parameter value being smaller than a difference between the second value and the nominal parameter value. A cryptographic module protective measure is applied if estimating that the circuit malfunctions.

Description

FIELD OF THE INVENTION[0001]The present invention relates to a method for protecting a cryptographic module and a device having cryptographic module protection capabilities.BACKGROUND OF THE INVENTION[0002]Modern mobile and stationary devices apply security measures for various purposes. These security measures can include encrypting or decrypting information. A module (otherwise known as a cryptographic module) can execute these security measures. A cryptographic module can include hardware, software, firmware, or a combination thereof. The cryptographic module is expected to encrypt (or decrypt) information using one or more encryption keys. Typically, a sequence of input signals (an input vector) is encrypted by a cryptographic key to provide an encrypted output (an output vector).[0003]A cryptographic module is usually subjected to various types of attacks. These attacks are aimed to detect how the cryptographic module works and especially to determine the value of an encryption...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(United States)
IPC IPC(8): G06F12/14G08B29/00
Inventor PRIEL, MICHAELASHKENAZI, ASAFKUZMIN, DANROZEN, ANTON
Owner NXP USA INC