WO2008027089A3 - Security attack countermeasures - Google Patents
Security attack countermeasures Download PDFInfo
- Publication number
- WO2008027089A3 WO2008027089A3 PCT/US2007/011264 US2007011264W WO2008027089A3 WO 2008027089 A3 WO2008027089 A3 WO 2008027089A3 US 2007011264 W US2007011264 W US 2007011264W WO 2008027089 A3 WO2008027089 A3 WO 2008027089A3
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- integer
- value
- program
- attack countermeasures
- fault
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/556—Detecting local intrusion or implementing counter-measures involving covert channels, i.e. data leakage between processes
Abstract
One embodiment is a method including selecting a first integer which is substantially random over the set {0, 1, 2,..., 2s- 1} where s is a positive security integer, selecting a second integer which is substantially random over the set {0, 1, 2,..., 2s-1}, combining the first integer, the second integer and a key, and determining a scalar multiple of the combination of the first integer, the second integer, and the key. Other embodiments include unique apparatuses, systems and methods relating to hardware fault attack countermeasures. Another embodiment includes a computer readable medium storing a program executable to randomize a CRT calculation, calculate a value which is a function of the CRT calculation, the value being a pseudo-random number if a fault has been induced in the program, the value being a predetermined value if a fault has not been induced in the program, and generate a signature which is a function of the value. Other embodiments include unique apparatuses, systems, computer accessible media, and methods relating to hardware fault attack countermeasures.
Applications Claiming Priority (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US80437906P | 2006-06-09 | 2006-06-09 | |
US60/804,379 | 2006-06-09 | ||
US90641107P | 2007-03-12 | 2007-03-12 | |
US60/906,411 | 2007-03-12 |
Publications (2)
Publication Number | Publication Date |
---|---|
WO2008027089A2 WO2008027089A2 (en) | 2008-03-06 |
WO2008027089A3 true WO2008027089A3 (en) | 2008-08-28 |
Family
ID=39136413
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/US2007/011264 WO2008027089A2 (en) | 2006-06-09 | 2007-05-11 | Security attack countermeasures |
Country Status (1)
Country | Link |
---|---|
WO (1) | WO2008027089A2 (en) |
Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5313530A (en) * | 1991-03-05 | 1994-05-17 | Canon Kabushiki Kaisha | Calculating apparatus and method of encrypting/decrypting communication data by using the same |
-
2007
- 2007-05-11 WO PCT/US2007/011264 patent/WO2008027089A2/en active Application Filing
Patent Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5313530A (en) * | 1991-03-05 | 1994-05-17 | Canon Kabushiki Kaisha | Calculating apparatus and method of encrypting/decrypting communication data by using the same |
Also Published As
Publication number | Publication date |
---|---|
WO2008027089A2 (en) | 2008-03-06 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Fan et al. | An updated survey on secure ECC implementations: Attacks, countermeasures and cost | |
Faust et al. | Practical leakage-resilient symmetric cryptography | |
Yu et al. | Practical leakage-resilient pseudorandom generators | |
CA2594670C (en) | Elliptic curve random number generation | |
US8165286B2 (en) | Combination white box/black box cryptographic processes and apparatus | |
WO2003081397A3 (en) | A method of protecting the integrity of a computer program | |
US20070266434A1 (en) | Protecting Applications Software Against Unauthorized Access, Reverse Engineering or Tampering | |
Zhao et al. | MDASCA: an enhanced algebraic side-channel attack for error tolerance and new leakage model exploitation | |
WO2006114684A3 (en) | Method and apparatus for group key generation | |
CN101925875A (en) | Countermeasure method and devices for asymmetric cryptography | |
Patil et al. | An explication of multifarious secret sharing schemes | |
Marchand et al. | IP watermark verification based on power consumption analysis | |
Seifert | On authenticated computing and RSA-based authentication | |
Coron et al. | On the use of shamir’s secret sharing against side-channel analysis | |
CN104751042B (en) | Creditability detection method based on cryptographic hash and living things feature recognition | |
Saarinen | SP 800–22 and GM/T 0005–2012 Tests: Clearly Obsolete, Possibly Harmful | |
WO2008027089A3 (en) | Security attack countermeasures | |
WO2011061263A1 (en) | Countermeasures against power attacks for the randomization of the exponent | |
WO2006070120A3 (en) | Method and device for executing a cryptographic calculation | |
Breunesse et al. | Towards fully automated analysis of whiteboxes: perfect dimensionality reduction for perfect leakage | |
WO2007055729A2 (en) | Protecting applications software against unauthorized access, reverse engineering or tampering | |
WO2004111831A3 (en) | Method for countermeasuring by masking the accumulator | |
Barbu et al. | Combined attack on CRT-RSA: why public verification must not be public? | |
Dedić et al. | A graph game model for software tamper protection | |
Luo et al. | A chaotic block cryptographic system resistant to power analysis attack |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 07852362 Country of ref document: EP Kind code of ref document: A2 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
NENP | Non-entry into the national phase |
Ref country code: RU |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 07852362 Country of ref document: EP Kind code of ref document: A2 |