Processing apparatus, program, or system of secret information

Cryptography – Particular algorithmic function encoding – Public key

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C380S001000, C380S028000, C380S277000, C380S286000, C713S180000, C713S181000, C713S189000, C713S193000, C713S194000, C713S152000, C713S152000

Reexamination Certificate

active

06873706

ABSTRACT:
To provide a secure cryptographic device such as an IC card which can endure TA (Timing Attack), DPA (Differential Power Analysis), SPA (Simple Power Analysis), or the like as an attaching method of presuming secret information held therein, when the secret information held in the card or another information which is used in the secret information or an arithmetic operation using such secret information when such an arithmetic operation is performed is shown by a plurality of expressing methods and the arithmetic operation is performed, thereby making an arithmetic operation processing method different each time the arithmetic operation is performed and making each of an arithmetic operation time, an intensity of a generated electromagnetic wave, and a current consumption different.

REFERENCES:
patent: 5768389 (1998-06-01), Ishii
patent: 5825880 (1998-10-01), Sudia et al.
patent: 5937066 (1999-08-01), Gennaro et al.
patent: 6411715 (2002-06-01), Liskov et al.
patent: 20020080970 (2002-06-01), Scheidt et al.
patent: 99973813 (1999-08-01), None
patent: 3-76447 (1991-04-01), None
patent: 10282881 (1998-10-01), None
patent: 11316542 (1999-11-01), None
patent: 9836520 (1998-08-01), None
Schneier B; “Applied Cryptography”, Applied Cryptography, Protocols, Algorithms, and Source Code in C, New York, John Wiley & Sons, U.S., Page(s) 70-73, XP002141258, ISBN: 0-471-11709-9, p. 70, line 1-p. 72, line 12.
Kaji Y et al: “Declare-Next Authentication Method—Secure Use Of Insecure Magnetic Cards”, Denshi Joho Tsushin Gakkai Gijutsu Kunkyu Hokoku—IEICE Technical Report, Denshi Joho Tsushin Gakkai, Tokyo, JP, Dec. 1995, pp. 21-28, XP002945865, ISSN: 0913-5685, 2. Formal description of DN-Method.
B. Schneider, “Applied Cryptography (Second Edition),” John Wiley & Sons, Inc. (1996), pp. 71-73.
K. Takaragi, et al, “Current Cards Society and Security Technology,” The Japanese Society of Printing Science and Technology, vol. 29, No. 3 (113rd volume), pp. 288-295.
Yuichi Kaji, et al, Personal Authentication by Password declare-next authentication-Secure Personal Authentication by Magnetic Card Technical Report of the Institute of Electronics, Information and Communication Engineers (ISEC 95-39 to 44) vol. 95, No. 423, pp. 21-28.
Smart Card Handbook, John Wiley & Sons, 1997, R. Effing.
Banking- Secure Cryptographic Devices (Retail)—Part 1: Concepts, Requirements and evaluation methods, First Edition, Jun. 15, 1998, ISO13491, ISO13491-1.
DPA, Introduction to Differential Power Analysis and Related Attacks, 1998, P. Kocher et al.
Timing Attacks on Implementation of Diffie—Hellman, RSA, DSS, and Other Systems, CRYPTO'96, 1996, P. Kocher.
Working Draft: American National Standard X.9.63-199x Public Key Cryptography for the Financial Services Industry: Key Agreement and Key Transport Using Elliptic Curve Cryptography, American National Standards Institute, Jan. 9, 1999.
Standard Specifications for Public Key Cryptography (Draft Version 9), IEEE P1363 Standard, IEEE, Feb. 8, 1999.
Speeding up the computations on an elliptic curve using addition-subtraction chains, Theoretical Informatics and Applications, vol. 24, No. 6, 1990, F. Morain et al.
Applied Cryptography, John Wiley & Sons, Inc., 1996, B. Schneier, pp. 466-469.
How to Share A Secret, Communications of the ACM, vol. 22, No. 11, 1979, A. Shamir, pp. 612-613.
Working Draft American National Standard, X9.62-1998, Public Key Cryptography for the Financial Services Industry: The Elliptic Curve Digital Signature Algorithm (ECDSA), American National Standards Institute, Sep. 20, 1998.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Processing apparatus, program, or system of secret information does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Processing apparatus, program, or system of secret information, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Processing apparatus, program, or system of secret information will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-3456840

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.