Cryptography – Particular algorithmic function encoding
Reexamination Certificate
2003-07-07
2010-11-02
Vu, Kimyen (Department: 2435)
Cryptography
Particular algorithmic function encoding
C380S001000, C380S252000, C713S189000, C713S194000
Reexamination Certificate
active
07826610
ABSTRACT:
The invention concerns a method to secure an electronic assembly implementing any algorithm against attacks by error introduction. The method according to the invention consists in performing an additional calculation using a verification function on at least one intermediate result in order to obtain a calculation signature and in performing a least once more all or part of the calculation in order to recalculate said signature and compare them in order to detect a possible error.
REFERENCES:
patent: 6539092 (2003-03-01), Kocher
patent: 6658569 (2003-12-01), Patarin et al.
patent: 6832316 (2004-12-01), Sibert
patent: 2002/0003876 (2002-01-01), Lim
patent: 2002/0101986 (2002-08-01), Roelse
patent: 2005/0021990 (2005-01-01), Liardet et al.
patent: 02-252027 (1990-09-01), None
Borst, Johan et al. “Cryptography on Smart Cards.” Computer Networks, 2001, pp. 423-435.
Cheng, D.Y. “‘Defensive Programming’ in the Rapid Development of a Parallelscientific Program,” Jun. 1990, pp. 665-669.
Hein, James L. “Discrete Mathematics,” 1996, Jones and Barlett Publishers Inc, pp. 91-95.
Borst J. et al: “Cryptography on smart cards” Computer Networks, Elsevier Science Publishers B. V., Amsterdam, NL, vol. 36, No. 4, (Jul. 16, 2001), pp. 423-425, XP004304907 ISSN: 1389-1286 p. 429, right-hand colums -p. 430, left-hand colums p. 431, right-hand colums, line 8.
Karri R, et al: “Concurrent Error Detection of Fault-Based Side-channel Cryptanalysis of 128-Bit Symmetric Block Ciphers” Proceedings of the 38th. Annual Design Automation Conference. (DAC). Las Vegas, NV, Jun. 18-22, 2001, Proceedings of the Design Automation Conference, New York, NY: ACM, US, vol. CONF. 38, (Jun. 18, 2001), pp. 579-584, XP002190412 ISBN: 1-58113-297-2 p. 579, right-hand column, paragraph 2-p. 581, left-hand column, paragraph 2 p. 581, right-hand column, paragraph 3-p. 583, right-hand column, paragraph 1.
Menezes, Oorschot, Vanstone: “handbook of applied cryptography, Passage” Handbook of Applied Cryptography, CRC Press Series on Discrete Mathematics and its applications, CRC Press, 1997, pp. 334-335, XP002239694 Boca Raton, FL, USA ISBN: 0-8493-8523-7 p. 334, paragraph 9.28-p. 335, paragraph 9.32.
Akkar Mehdi-Laurent
Goubin Louis
Gemalto SA
Jansson Pehr B.
Schwartz Darren
The Jansson Firm
Vu Kimyen
LandOfFree
Method to secure an electronic assembly against attacks by... does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Method to secure an electronic assembly against attacks by..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method to secure an electronic assembly against attacks by... will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-4234156