Abstract:
PROBLEM TO BE SOLVED: To provide a method that blocks an integrated circuit when detecting unauthorized access to information included in the integrated circuit. SOLUTION: A first program is executed to generate a second program executed in a random access memory of an integrated circuit. The second program includes a plurality of instruction sequences, which each end with a branch to another sequence. The second program is next executed. COPYRIGHT: (C)2003,JPO
Abstract:
PROBLEM TO BE SOLVED: To provide a method for scrambling a calculation involving at least one operation taking into account a secret quantity with less resources than heretofore, and to reduce or minimize the storage duration of a random quantity used for the scrambling or unnecessitate the storage of the random quantity. SOLUTION: In the method, at least one intermediary result takes into account at least one secret quantity, modifies the intermediary result with a random quantity, carries on the calculation with the modified result, and restores an expected result at the end of the calculation. COPYRIGHT: (C)2003,JPO
Abstract:
The invention relates to a method and feed circuit for an asynchronous calculation element (1) of an integrated circuit, wherein the instantaneous power supply of the calculation element is randomly varied .
Abstract:
The invention concerns a method and a system for making secure a secret quantity, contained in an electronic device, and used at least partly in an encryption algorithm of at least part of an input data executing a predetermined number (N) of successive iterations of a common function and producing at least part of an output data, which consists in: storing (14), after a first number (X) of iterations, an intermediate result; applying, to the output data, a function inverse to that of the encryption for a number (N-X) of iterations corresponding to the difference between the total number of iterations and the first number; comparing (18) the intermediate result with the result of iterations of the inverse function; and validating the encryption only if the two results are identical.
Abstract:
The invention relates to a method and a circuit for extracting a secret datum from an integrated circuit involved in an authentication procedure. The secret datum is obtained at least partially from a network of physical parameters that are linked to the production of the integrated circuit chip. Said secret datum is generated upon request and made ephemeral.
Abstract:
The method involves triggering a temporary counter (TIMER), which counts a data account based on instructions following a main program (Pg), during an execution of instruction of the main program. An instruction of a secondary program, depending on the result of the main program, is executed if the counter reaches its account, where the result of the main program is an arithmetic result. An independent claim is also included for an integrated circuit for implementing a protection execution method.
Abstract:
A program stored in a non-volatile memory (2) is executed to generate a jump table containing available addresses of an executable RAM (6). A blocking program including sequence of instructions such as RD JUMP, RD INST to proceed with the loop operation of the blocking program, is executed in the executable RAM. An Independent claim is also included for integrated circuit card.
Abstract:
The digital data is factorized by a residue number system based on finite base of numbers or polynomials prime to one another. An Independent claim is also included for circuit of algorithm processing of data factorized by residue number system.
Abstract:
A circuit to detect the use of an element of an integrated circuit may include a non-volatile electrically programmable storage circuit and a programming circuit. The programming circuit may be used to partially program the storage circuit and gradually modify its programming level as the element is used so that the level represents the number of uses of the element.