Abstract:
A processor for executing a Rijndeal algorithm which applies a plurality of encryption rounds to a data block array in order to obtain an array of identical size, each round involving a key block array and a data block substitution table, wherein said processor comprises: a first input register (102) containing an input data block column; an output register (111) containing an output data block column or an intermediate block column; a second input register (101) containing a key block column or the intermediate data blocks; a block substitution element (104) receiving the data one block at a time following the selection (103) thereof in the first register and providing, for each block, a column of blocks; an element (109) applying a cyclic permutation to the substitution circuit column blocks; and an Exclusive-OR combination element (110) combining the permutation circuit column blocks with the content of the second register, the result of said combination being loaded into the output register.
Abstract:
PROBLEM TO BE SOLVED: To provide a method that blocks an integrated circuit when detecting unauthorized access to information included in the integrated circuit. SOLUTION: A first program is executed to generate a second program executed in a random access memory of an integrated circuit. The second program includes a plurality of instruction sequences, which each end with a branch to another sequence. The second program is next executed. COPYRIGHT: (C)2003,JPO
Abstract:
PROBLEM TO BE SOLVED: To provide a method for scrambling a calculation involving at least one operation taking into account a secret quantity with less resources than heretofore, and to reduce or minimize the storage duration of a random quantity used for the scrambling or unnecessitate the storage of the random quantity. SOLUTION: In the method, at least one intermediary result takes into account at least one secret quantity, modifies the intermediary result with a random quantity, carries on the calculation with the modified result, and restores an expected result at the end of the calculation. COPYRIGHT: (C)2003,JPO
Abstract:
The invention relates to a method and feed circuit for an asynchronous calculation element (1) of an integrated circuit, wherein the instantaneous power supply of the calculation element is randomly varied .
Abstract:
The invention concerns a method and a system for making secure a secret quantity, contained in an electronic device, and used at least partly in an encryption algorithm of at least part of an input data executing a predetermined number (N) of successive iterations of a common function and producing at least part of an output data, which consists in: storing (14), after a first number (X) of iterations, an intermediate result; applying, to the output data, a function inverse to that of the encryption for a number (N-X) of iterations corresponding to the difference between the total number of iterations and the first number; comparing (18) the intermediate result with the result of iterations of the inverse function; and validating the encryption only if the two results are identical.
Abstract:
The invention relates to a method and a circuit for extracting a secret datum from an integrated circuit involved in an authentication procedure. The secret datum is obtained at least partially from a network of physical parameters that are linked to the production of the integrated circuit chip. Said secret datum is generated upon request and made ephemeral.
Abstract:
The method involves triggering a temporary counter (TIMER), which counts a data account based on instructions following a main program (Pg), during an execution of instruction of the main program. An instruction of a secondary program, depending on the result of the main program, is executed if the counter reaches its account, where the result of the main program is an arithmetic result. An independent claim is also included for an integrated circuit for implementing a protection execution method.
Abstract:
A program stored in a non-volatile memory (2) is executed to generate a jump table containing available addresses of an executable RAM (6). A blocking program including sequence of instructions such as RD JUMP, RD INST to proceed with the loop operation of the blocking program, is executed in the executable RAM. An Independent claim is also included for integrated circuit card.
Abstract:
The digital data is factorized by a residue number system based on finite base of numbers or polynomials prime to one another. An Independent claim is also included for circuit of algorithm processing of data factorized by residue number system.