Abstract:
PROBLEM TO BE SOLVED: To provide a method to secure an electronic assembly implementing any arbitrary algorithm against attacks by error introduction. SOLUTION: The method consists in performing an additional calculation using a verification function on at least one intermediate result in order to obtain a calculation signature and in performing at least once more all or part of the calculation in order to recalculate the signature and compare them in order to detect a possible error. COPYRIGHT: (C)2011,JPO&INPIT
Abstract:
PROBLEM TO BE SOLVED: To eliminate a risk of an "n-order DPA (Differential Power Analysis)" attack for all values of n of a cryptographic electronic assembly or a system having a secret key or a private key. SOLUTION: A securing process for an electronic system includes a processor and a memory for packaging a cryptographic calculation procedure stored in a memory by use of the secret key. An intermediate result during an input or an output of at least one critical function about the procedure is masked. COPYRIGHT: (C)2011,JPO&INPIT
Abstract:
The method involves performing an additional calculation by a verification function on an intermediate result to obtain a calculation signature. A part of the calculation is performed to recalculate the signature and compare them to detect a possible error. An elementary operation using another super-function operation is performed from a larger set. Independent claims are also included for the following: (a) an electronic assembly comprising storage unit of a calculation process (b) a computer program including program code instructions to execute the steps of securing an electronic assembly (c) a smart card comprising a storage unit of a calculation process.
Abstract:
The method involves performing an additional calculation by a verification function on an intermediate result to obtain a calculation signature. A part of the calculation is performed to recalculate the signature and compare them to detect a possible error. An elementary operation using another super-function operation is performed from a larger set. Independent claims are also included for the following: (a) an electronic assembly comprising storage unit of a calculation process (b) a computer program including program code instructions to execute the steps of securing an electronic assembly (c) a smart card comprising a storage unit of a calculation process.