CRYPTOGRAPHIC TOKEN WITH LEAK-RESISTANT KEY DERIVATION
    1.
    发明申请
    CRYPTOGRAPHIC TOKEN WITH LEAK-RESISTANT KEY DERIVATION 审中-公开
    CRYPTOGRAPHIC TOKEN WITH LEAK-RESISTANT KEY DORIVATION

    公开(公告)号:US20120017089A1

    公开(公告)日:2012-01-19

    申请号:US13245054

    申请日:2011-09-26

    申请人: PAUL C. KOCHER

    发明人: PAUL C. KOCHER

    IPC分类号: H04L9/32

    摘要: Methods and apparatuses for increasing the leak-resistance of cryptographic systems are disclosed. A cryptographic token maintains secret key data based on a top-level key. The token can produce updated secret key data using an update process that makes partial information that might have previously leaked to attackers about the secret key data no longer usefully describe the new updated secret key data. By repeatedly applying the update process, information leaking during cryptographic operations that is collected by attackers rapidly becomes obsolete. Thus, such a system can remain secure against attacks involving analysis of measurements of the device's power consumption, electromagnetic characteristics, or other information leaked during transactions. Transactions with a server can be secured with the token.

    摘要翻译: 公开了增加密码系统的防漏性的方法和装置。 加密令牌基于顶级密钥来维护密钥数据。 令牌可以使用更新过程产生更新的秘密密钥数据,该更新过程使先前泄漏给攻击者的部分信息对于秘密密钥数据不再有用地描述新的更新的秘密密钥数据。 通过重复应用更新过程,攻击者收集的密码操作过程中信息泄露迅速变得过时。 因此,这种系统可以保持安全性,防止涉及分析设备的功耗,电磁特性或事务中泄露的其他信息的测量的攻击。 可以使用令牌来保护与服务器的事务。

    Payment smart cards with hierarchical session key derivation providing security against differential power analysis and other attacks
    3.
    发明授权
    Payment smart cards with hierarchical session key derivation providing security against differential power analysis and other attacks 有权
    支付智能卡,具有分级会话密钥导出,提供针对差分功率分析和其他攻击的安全性

    公开(公告)号:US07941666B2

    公开(公告)日:2011-05-10

    申请号:US10396975

    申请日:2003-03-24

    申请人: Paul C. Kocher

    发明人: Paul C. Kocher

    IPC分类号: H04L9/00

    摘要: Chip cards are used to secure credit and debit payment transactions. To prevent fraudulent transactions, the card must protect cryptographic keys used to authenticate transactions. In particular, cards should resist differential power analysis and/or other attacks. To address security risks posed by leakage of partial information about keys during cryptographic transactions, cards may be configured to perform periodic cryptographic key update operations. The key update transformation prevents adversaries from exploiting partial information that may have been leaked about the card's keys. Update operations based on a hierarchical structure can enable efficient transaction verification by allowing a verifying party (e.g., an issuer) to derive a card's current state from a transaction counter and its initial state by performing one operation per level in the hierarchy, instead of progressing through all update operations performed by the card.

    摘要翻译: 芯片卡用于确保信用卡和借记支付交易。 为防止欺诈性交易,该卡必须保护用于验证交易的加密密钥。 特别地,卡应该抵抗差分功率分析和/或其他攻击。 为了解决在加密事务期间泄漏关于密钥的部分信息所引起的安全隐患,卡可被配置为执行周期性加密密钥更新操作。 关键的更新转换防止对手利用可能已经泄露的卡的密钥的部分信息。 基于层次结构的更新操作可以通过允许验证方(例如,发行者)从事务计数器及其初始状态通过在层次结构中执行每个级别的一个操作来导出卡的当前状态来实现高效的事务验证,而不是进行 通过卡执行的所有更新操作。

    Prevention of side channel attacks against block cipher implementations and other cryptographic systems
    4.
    发明授权
    Prevention of side channel attacks against block cipher implementations and other cryptographic systems 有权
    防止针对块密码实现和其他加密系统的侧信道攻击

    公开(公告)号:US07787620B2

    公开(公告)日:2010-08-31

    申请号:US11252898

    申请日:2005-10-18

    IPC分类号: H04L9/22

    摘要: Methods and apparatuses are disclosed for improving DES and other cryptographic protocols against external monitoring attacks by reducing the amount (and signal-to-noise ratio) of useful information leaked during processing. An improved DES implementation of the invention instead uses two 56-bit keys (K1 and K2) and two 64-bit plaintext messages (M1 and M2), each associated with a permutation (i.e., K1P, K2P and M1P, M2P) such that K1P{K1} XOR K2P{K2} equals the “standard” DES key K, and M1P{M1} XOR M2P{M2} equals the “standard” message. During operation of the device, the tables are preferably periodically updated, by introducing fresh entropy into the tables faster than information leaks out, so that attackers will not be able to obtain the table contents by analysis of measurements. The technique is implementable in cryptographic smartcards, tamper resistant chips, and secure processing systems of all kinds.

    摘要翻译: 公开了用于通过减少在处理期间泄露的有用信息的量(和信噪比)来改善DES和其他加密协议以防外部监视攻击的方法和装置。 本发明的改进的DES实施方案改为使用两个56位密钥(K1和K2)和两个64位明文消息(M1和M2),每个与排列相关联(即,K1P,K2P和M1P,M2P),使得 K1P {K1} XOR K2P {K2}等于“标准”DES密钥K,M1P {M1} XOR M2P {M2}等于“标准”消息。 在设备的操作期间,优选地通过将新鲜的熵引入到表中比信息泄漏出来更周期地更新表,使得攻击者将不能通过分析测量获得表内容。 该技术可在加密智能卡,防篡改芯片和各种安全处理系统中实现。

    Cryptographic computation using masking to prevent differential power analysis and other attacks
    5.
    发明授权
    Cryptographic computation using masking to prevent differential power analysis and other attacks 有权
    使用掩码进行密码计算,以防止差分功率分析和其他攻击

    公开(公告)号:US07668310B2

    公开(公告)日:2010-02-23

    申请号:US09930836

    申请日:2001-08-15

    IPC分类号: H04L9/22

    摘要: Methods and apparatuses are disclosed for improving DES and other cryptographic protocols against external monitoring attacks by reducing the amount (and signal-to-noise ratio) of useful information leaked during processing. An improved DES implementation of the invention instead uses two 56-bit keys (K1 and K2) and two 64-bit plaintext messages (M1 and M2), each associated with a permutation (i.e., K1P, K2P and M1P, M2P) such that K1P{K1} XOR K2P {K2} equals the “standard” DES key K, and M1P{M1} XOR M2P{M2} equals the “standard” message. During operation of the device, the tables are preferably periodically updated, by introducing fresh entropy into the tables faster than information leaks out, so that attackers will not be able to obtain the table contents by analysis of measurements. The technique is implementable in cryptographic smartcards, tamper resistant chips, and secure processing systems of all kinds.

    摘要翻译: 公开了用于通过减少在处理期间泄露的有用信息的量(和信噪比)来改善DES和其他加密协议以防外部监视攻击的方法和装置。 本发明的改进的DES实施方案改为使用两个56位密钥(K1和K2)和两个64位明文消息(M1和M2),每个与排列相关联(即,K1P,K2P和M1P,M2P),使得 K1P {K1} XOR K2P {K2}等于“标准”DES密钥K,M1P {M1} XOR M2P {M2}等于“标准”消息。 在设备的操作期间,优选地通过将新鲜的熵引入到表中比信息泄漏出来更周期地更新表,使得攻击者将不能通过分析测量获得表内容。 该技术可在加密智能卡,防篡改芯片和各种安全处理系统中实现。

    Verifiable, Leak-Resistant Encryption and Decryption
    9.
    发明申请
    Verifiable, Leak-Resistant Encryption and Decryption 有权
    可验证的,防泄漏的加密和解密

    公开(公告)号:US20110138192A1

    公开(公告)日:2011-06-09

    申请号:US12958570

    申请日:2010-12-02

    IPC分类号: G06F21/24 G06F21/00

    摘要: This patent describes techniques usable by devices to encrypt and decrypt sensitive data to in a manner that provides security from external monitoring attacks. The encrypting device has access to a base secret cryptographic value (key) that is also known to the decrypting device. The sensitive data are decomposed into segments, and each segment is encrypted with a separate encryption key derived from the base key and a message identifier to create a set of encrypted segments. The encrypting device uses the base secret cryptographic value to create validators that prove that the encrypted segments for this message identifier were created by a device with access to the base key. The decrypting device, upon receiving an encrypted segments and validator(s), uses the validator to verify the message identifier and that the encrypted segment are unmodified, then uses a cryptographic key derived from the base key and message identifier to decrypt the segments. Derived keys and validators are produced using methods designed to preserve security even if cipher and hashing operations leak information. Embodiments for systems including SoCs, firmware loading, FPGAs and network communications are described.

    摘要翻译: 本专利描述了可以通过设备加密和解密敏感数据的技术,以提供来自外部监视攻击的安全性的方式。 加密设备可以访问解密设备也是已知的基本密钥加密值(密钥)。 敏感数据被分解为段,并且每个段用来自基本密钥的单独的加密密钥和消息标识符加密,以创建一组加密的段。 加密设备使用基本秘密加密值来创建验证器,证明该消息标识符的加密段由具有访问基本密钥的设备创建。 解密装置在接收到加密的段和验证器时,使用验证器来验证消息标识符,并且加密段未被修改,然后使用从基本密钥和消息标识符导出的加密密钥来解密段。 派生密钥和验证器使用旨在保护安全性的方法生成,即使加密和散列操作泄漏信息。 描述了包括SoC,固件加载,FPGA和网络通信的系统的实施例。

    Leak-Resistant Cryptographic Token
    10.
    发明申请
    Leak-Resistant Cryptographic Token 审中-公开
    防漏密码令牌

    公开(公告)号:US20110113248A1

    公开(公告)日:2011-05-12

    申请号:US13010034

    申请日:2011-01-20

    申请人: Paul C. KOCHER

    发明人: Paul C. KOCHER

    IPC分类号: H04L9/32

    摘要: Chip cards are used to secure credit and debit payment transaction. To prevent fraudulent transaction, the card must protect cryptographic keys used to authenticate transactions. In particular, cards should resist differential power analysis and/or other attacks. To address security risks posed by leakage of partial information about keys during cryptographic transactions, cards may be configured to perform periodic cryptographic key update operations. The key update transformation prevents adversaries from exploiting partial information that may have been leaked about the card's keys. Update operations based on a hierarchical structure can enable efficient transaction verification by allowing a verifying party (e.g., an issuer) to derive a card's current state from a transaction counter and its initial state by performing one operation per level in the hierarchy, instead of progressing through all update operations performed by the card.

    摘要翻译: 芯片卡用于确保信用卡和借记支付交易。 为了防止欺诈性交易,该卡必须保护用于验证交易的加密密钥。 特别地,卡应该抵抗差分功率分析和/或其他攻击。 为了解决在加密事务期间泄漏关于密钥的部分信息所引起的安全隐患,卡可被配置为执行周期性加密密钥更新操作。 关键的更新转换防止对手利用可能已经泄露的卡的密钥的部分信息。 基于层次结构的更新操作可以通过允许验证方(例如,发行者)从事务计数器及其初始状态通过在层次结构中执行每个级别的一个操作来导出卡的当前状态来实现高效的事务验证,而不是进行 通过卡执行的所有更新操作。