WO2008027089A3 - Security attack countermeasures - Google Patents

Security attack countermeasures Download PDF

Info

Publication number
WO2008027089A3
WO2008027089A3 PCT/US2007/011264 US2007011264W WO2008027089A3 WO 2008027089 A3 WO2008027089 A3 WO 2008027089A3 US 2007011264 W US2007011264 W US 2007011264W WO 2008027089 A3 WO2008027089 A3 WO 2008027089A3
Authority
WO
WIPO (PCT)
Prior art keywords
integer
value
program
attack countermeasures
fault
Prior art date
Application number
PCT/US2007/011264
Other languages
French (fr)
Other versions
WO2008027089A2 (en
Inventor
Brian S King
Wei Wang
Sining Liu
Original Assignee
Univ Indiana Res & Tech Corp
Brian S King
Wei Wang
Sining Liu
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Univ Indiana Res & Tech Corp, Brian S King, Wei Wang, Sining Liu filed Critical Univ Indiana Res & Tech Corp
Publication of WO2008027089A2 publication Critical patent/WO2008027089A2/en
Publication of WO2008027089A3 publication Critical patent/WO2008027089A3/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/556Detecting local intrusion or implementing counter-measures involving covert channels, i.e. data leakage between processes

Abstract

One embodiment is a method including selecting a first integer which is substantially random over the set {0, 1, 2,..., 2s- 1} where s is a positive security integer, selecting a second integer which is substantially random over the set {0, 1, 2,..., 2s-1}, combining the first integer, the second integer and a key, and determining a scalar multiple of the combination of the first integer, the second integer, and the key. Other embodiments include unique apparatuses, systems and methods relating to hardware fault attack countermeasures. Another embodiment includes a computer readable medium storing a program executable to randomize a CRT calculation, calculate a value which is a function of the CRT calculation, the value being a pseudo-random number if a fault has been induced in the program, the value being a predetermined value if a fault has not been induced in the program, and generate a signature which is a function of the value. Other embodiments include unique apparatuses, systems, computer accessible media, and methods relating to hardware fault attack countermeasures.
PCT/US2007/011264 2006-06-09 2007-05-11 Security attack countermeasures WO2008027089A2 (en)

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
US80437906P 2006-06-09 2006-06-09
US60/804,379 2006-06-09
US90641107P 2007-03-12 2007-03-12
US60/906,411 2007-03-12

Publications (2)

Publication Number Publication Date
WO2008027089A2 WO2008027089A2 (en) 2008-03-06
WO2008027089A3 true WO2008027089A3 (en) 2008-08-28

Family

ID=39136413

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2007/011264 WO2008027089A2 (en) 2006-06-09 2007-05-11 Security attack countermeasures

Country Status (1)

Country Link
WO (1) WO2008027089A2 (en)

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5313530A (en) * 1991-03-05 1994-05-17 Canon Kabushiki Kaisha Calculating apparatus and method of encrypting/decrypting communication data by using the same

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5313530A (en) * 1991-03-05 1994-05-17 Canon Kabushiki Kaisha Calculating apparatus and method of encrypting/decrypting communication data by using the same

Also Published As

Publication number Publication date
WO2008027089A2 (en) 2008-03-06

Similar Documents

Publication Publication Date Title
Fan et al. An updated survey on secure ECC implementations: Attacks, countermeasures and cost
Faust et al. Practical leakage-resilient symmetric cryptography
Yu et al. Practical leakage-resilient pseudorandom generators
CA2594670C (en) Elliptic curve random number generation
US8165286B2 (en) Combination white box/black box cryptographic processes and apparatus
WO2003081397A3 (en) A method of protecting the integrity of a computer program
US20070266434A1 (en) Protecting Applications Software Against Unauthorized Access, Reverse Engineering or Tampering
Zhao et al. MDASCA: an enhanced algebraic side-channel attack for error tolerance and new leakage model exploitation
WO2006114684A3 (en) Method and apparatus for group key generation
CN101925875A (en) Countermeasure method and devices for asymmetric cryptography
Patil et al. An explication of multifarious secret sharing schemes
Marchand et al. IP watermark verification based on power consumption analysis
Seifert On authenticated computing and RSA-based authentication
Coron et al. On the use of shamir’s secret sharing against side-channel analysis
CN104751042B (en) Creditability detection method based on cryptographic hash and living things feature recognition
Saarinen SP 800–22 and GM/T 0005–2012 Tests: Clearly Obsolete, Possibly Harmful
WO2008027089A3 (en) Security attack countermeasures
WO2011061263A1 (en) Countermeasures against power attacks for the randomization of the exponent
WO2006070120A3 (en) Method and device for executing a cryptographic calculation
Breunesse et al. Towards fully automated analysis of whiteboxes: perfect dimensionality reduction for perfect leakage
WO2007055729A2 (en) Protecting applications software against unauthorized access, reverse engineering or tampering
WO2004111831A3 (en) Method for countermeasuring by masking the accumulator
Barbu et al. Combined attack on CRT-RSA: why public verification must not be public?
Dedić et al. A graph game model for software tamper protection
Luo et al. A chaotic block cryptographic system resistant to power analysis attack

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 07852362

Country of ref document: EP

Kind code of ref document: A2

NENP Non-entry into the national phase

Ref country code: DE

NENP Non-entry into the national phase

Ref country code: RU

122 Ep: pct application non-entry in european phase

Ref document number: 07852362

Country of ref document: EP

Kind code of ref document: A2