Key agreement using a key derivation key
    1.
    发明授权
    Key agreement using a key derivation key 有权
    使用密钥推导密钥的密钥协商

    公开(公告)号:US09088408B2

    公开(公告)日:2015-07-21

    申请号:US13536686

    申请日:2012-06-28

    摘要: Methods, systems, and computer programs for performing key agreement operations in a communication system are described. In some aspects, a wireless network operator accesses a secret key associated with a mobile device. A key derivation function (KDF) is evaluated based on the secret key to produce a key derivation key, and the KDF is evaluated based on the key derivation key to produce an output value. A session key and a challenge value are obtained based on the output value. In some aspects, the mobile device receives the challenge value and accesses a secret key. A KDF is evaluated based on the secret key to produce a key derivation key, and the KDF is evaluated based on the key derivation key to produce an output value. A response value and a session key are obtained based on the output value. The response value is transmitted to the wireless network operator.

    摘要翻译: 描述用于在通信系统中执行密钥协商操作的方法,系统和计算机程序。 在一些方面,无线网络运营商访问与移动设备相关联的秘密密钥。 基于秘密密钥来计算密钥导出函数(KDF)以产生密钥导出密钥,并且基于密钥导出密钥来评估KDF以产生输出值。 基于输出值获得会话密钥和质询值。 在一些方面,移动设备接收挑战值并访问秘密密钥。 基于秘密密钥来评估KDF以产生密钥导出密钥,并且基于密钥导出密钥来评估KDF以产生输出值。 基于输出值获得响应值和会话密钥。 响应值被发送到无线网络运营商。

    Power analysis attack countermeasure for the ECDSA
    2.
    发明授权
    Power analysis attack countermeasure for the ECDSA 有权
    ECDSA的功率分析攻击对策

    公开(公告)号:US08660263B2

    公开(公告)日:2014-02-25

    申请号:US13615854

    申请日:2012-09-14

    IPC分类号: H04L9/28

    摘要: Execution of the Elliptic Curve Digital Signature Algorithm (ECDSA) requires determination of a signature, which determination involves arithmetic operations. Some of the arithmetic operations employ a long term cryptographic key. It is the execution of these arithmetic operations that can make the execution of the ECDSA vulnerable to a power analysis attack. In particular, an attacker using a power analysis attack may determine the long term cryptographic key. By modifying the sequence of operations involved in the determination of the signature and the inputs to those operations, power analysis attacks may no longer be applied to determine the long term cryptographic key.

    摘要翻译: 执行椭圆曲线数字签名算法(ECDSA)需要确定签名,该确定涉及算术运算。 一些算术运算采用长期加密密钥。 这些算术运算的执行可以使ECDSA的执行易受力分析攻击。 特别地,使用功率分析攻击的攻击者可以确定长期密码密钥。 通过修改签名确定和与这些操作的输入有关的操作顺序,功率分析攻击可能不再适用于确定长期加密密钥。

    Power analysis countermeasure for the ECMQV key agreement algorithm
    3.
    发明授权
    Power analysis countermeasure for the ECMQV key agreement algorithm 有权
    ECMQV密钥协商算法的功率分析对策

    公开(公告)号:US08645703B2

    公开(公告)日:2014-02-04

    申请号:US13489690

    申请日:2012-06-06

    IPC分类号: H04L9/32 H04K1/00

    摘要: Execution of the ECMQV key agreement algorithm requires determination of an implicit signature, which determination involves arithmetic operations. Some of the arithmetic operations employ a long-term cryptographic key. It is the execution of these arithmetic operations that can make the execution of the ECMQV key agreement algorithm vulnerable to a power analysis attack. In particular, an attacker using a power analysis attack may determine the long-term cryptographic key. By modifying the sequence of operations involved in the determination of the implicit signature and the inputs to those operations, power analysis attacks may no longer be applied to determine the long-term cryptographic key.

    摘要翻译: 执行ECMQV密钥协商算法需要确定隐式签名,该确定涉及算术运算。 一些算术运算采用长期加密密钥。 这些算术运算的执行可以使得ECMQV密钥协商算法的执行容易受到功率分析攻击。 特别地,使用功率分析攻击的攻击者可以确定长期加密密钥。 通过修改确定隐式签名所涉及的操作顺序和对这些操作的输入,功率分析攻击可能不再适用于确定长期加密密钥。

    Power analysis countermeasure for the ECMQV key agreement algorithm
    4.
    发明授权
    Power analysis countermeasure for the ECMQV key agreement algorithm 有权
    ECMQV密钥协商算法的功率分析对策

    公开(公告)号:US08219820B2

    公开(公告)日:2012-07-10

    申请号:US12040212

    申请日:2008-02-29

    IPC分类号: H04K9/32 H04K1/00

    摘要: Execution of the ECMQV key agreement algorithm requires determination of an implicit signature, which determination involves arithmetic operations. Some of the arithmetic operations employ a long-term cryptographic key. It is the execution of these arithmetic operations that can make the execution of the ECMQV key agreement algorithm vulnerable to a power analysis attack. In particular, an attacker using a power analysis attack may determine the long-term cryptographic key. By modifying the sequence of operations involved in the determination of the implicit signature and the inputs to those operations, power analysis attacks may no longer be applied to determine the long-term cryptographic key.

    摘要翻译: 执行ECMQV密钥协商算法需要确定隐式签名,该确定涉及算术运算。 一些算术运算采用长期加密密钥。 这些算术运算的执行可以使得ECMQV密钥协商算法的执行容易受到功率分析攻击。 特别地,使用功率分析攻击的攻击者可以确定长期加密密钥。 通过修改确定隐式签名所涉及的操作顺序和对这些操作的输入,功率分析攻击可能不再适用于确定长期加密密钥。

    Method and apparatus for generating a public key in a manner that counters power analysis attacks
    5.
    发明授权
    Method and apparatus for generating a public key in a manner that counters power analysis attacks 有权
    以计数器功率分析攻击的方式产生公钥的方法和装置

    公开(公告)号:US08050403B2

    公开(公告)日:2011-11-01

    申请号:US12039998

    申请日:2008-02-29

    IPC分类号: H04K1/00

    摘要: A public key for an Elliptic Curve Cryptosystem is generated in a manner that acts as a countermeasure to power analysis attacks. In particular, a known scalar multiplication method is enhanced by, in one aspect, performing a right shift on the private key. The fixed-sequence window method includes creation and handling of a translated private key. Conveniently, as a result of the right shift, the handling of the translated private key is made easier and more efficient.

    摘要翻译: 产生椭圆曲线加密系统的公钥是作为功率分析攻击的对策。 特别地,在一个方面,通过在私钥上执行右移,增强了已知的标量乘法方法。 固定顺序窗口方法包括创建和处理翻译的私钥。 方便地,由于正确的转变,翻译的私钥的处理变得更容易和更有效率。

    Efficient Implementation of Hash Algorithm on a Processor
    6.
    发明申请
    Efficient Implementation of Hash Algorithm on a Processor 有权
    在处理器上有效地实现散列算法

    公开(公告)号:US20120257742A1

    公开(公告)日:2012-10-11

    申请号:US13440264

    申请日:2012-04-05

    IPC分类号: G06F21/24

    摘要: An efficient implementation of SHA-512, and similarly SHA-384, on an ARM processor. The implementation maximizes reuse of the register values between iterations so as to minimize the need to load these values from memory. This is achieved by categorizing the iterations into even and odd ones such that the sequence of computation in the even iteration is reversed in the odd iteration and the register values at the end of one iteration are consumed at the beginning of the following one.

    摘要翻译: 在ARM处理器上SHA-512和类似SHA-384的高效实现。 该实现最大化了迭代之间的寄存器值的重用,以便最小化从存储器加载这些值的需要。 这通过将迭代分类为偶数和奇数来实现,使得偶数迭代中的计算序列在奇数迭代中反转,并且在一次迭代结束时的寄存器值在下一个开始处被消耗。

    Method and apparatus for performing elliptic curve scalar multiplication in a manner that counters power analysis attacks
    7.
    发明授权
    Method and apparatus for performing elliptic curve scalar multiplication in a manner that counters power analysis attacks 有权
    以计数器功率分析攻击的方式执行椭圆曲线标量乘法的方法和装置

    公开(公告)号:US08243919B2

    公开(公告)日:2012-08-14

    申请号:US12039996

    申请日:2008-02-29

    IPC分类号: H04K1/00

    摘要: When multiplicative splitting is used to hide a scalar in an Elliptic Curve scalar Multiplication ECSM operation, the associated modular division operation employs the known Almost Montgomery Inversion algorithm. By including dummy operations in some of the branches of the main iteration loop of the Almost Montgomery Inversion algorithm, all branches of the algorithm may be viewed, from the perspective of a Power Analysis-based attack, as equivalent and, accordingly, devoid of information useful in determining the value of the scalar, which may be a cryptographic private key.

    摘要翻译: 当乘法分割用于隐藏椭圆曲线乘法ECSM操作中的标量时,相关联的模块划分操作采用已知的几乎蒙哥马利反演算法。 通过在几乎蒙哥马利反转算法的主迭代循环的一些分支中包括虚拟操作,从基于功率分析的攻击的角度来看,该算法的所有分支可以等效,因此没有信息 可用于确定标量的值,其可以是密码私钥。

    Methods And Apparatus For Performing An Elliptic Curve Scalar Multiplication Operation Using Splitting
    8.
    发明申请
    Methods And Apparatus For Performing An Elliptic Curve Scalar Multiplication Operation Using Splitting 有权
    使用分割进行椭圆曲线标量乘法运算的方法和装置

    公开(公告)号:US20120114117A1

    公开(公告)日:2012-05-10

    申请号:US13354710

    申请日:2012-01-20

    IPC分类号: H04L9/30

    摘要: For an Elliptic Curve Scalar Multiplication (ECSM) operation to be performed on a scalar and a base point, a given previous set of parameters that was used to split the scalar for a previous ECSM operation and a selected random integer are used to determine a new set of parameters for splitting the scalar. By basing the new set of parameters on the previous set of parameters, repeated use of the scalar to determine key-splitting parameters is avoided and susceptibility to a Differential Power Analysis Side Channel attack is minimized.

    摘要翻译: 对于要在标量和基点执行的椭圆曲线标量乘法(ECSM)操作,使用用于拆分先前ECSM操作的标量和所选随机整数的给定先前参数集合来确定新的 用于分割标量的一组参数。 通过将新参数集合基于前一组参数,避免了重复使用标量来确定密钥分解参数,并且使差分功率分析侧信道攻击的敏感性最小化。

    POWER ANALYSIS ATTACK COUNTERMEASURE FOR THE ECDSA
    9.
    发明申请
    POWER ANALYSIS ATTACK COUNTERMEASURE FOR THE ECDSA 有权
    ECDSA的功率分析攻击计数器

    公开(公告)号:US20110314292A1

    公开(公告)日:2011-12-22

    申请号:US13222104

    申请日:2011-08-31

    IPC分类号: H04L9/32

    摘要: Execution of the Elliptic Curve Digital Signature Algorithm (ECDSA) requires determination of a signature, which determination involves arithmetic operations. Some of the arithmetic operations employ a long term cryptographic key. It is the execution of these arithmetic operations that can make the execution of the ECDSA vulnerable to a power analysis attack. In particular, an attacker using a power analysis attack may determine the long term cryptographic key. By modifying the sequence of operations involved in the determination of the signature and the inputs to those operations, power analysis attacks may no longer be applied to determine the long term cryptographic key.

    摘要翻译: 执行椭圆曲线数字签名算法(ECDSA)需要确定签名,该确定涉及算术运算。 一些算术运算采用长期加密密钥。 这些算术运算的执行可以使ECDSA的执行易受力分析攻击。 特别地,使用功率分析攻击的攻击者可以确定长期加密密钥。 通过修改签名确定和与这些操作的输入有关的操作顺序,功率分析攻击可能不再适用于确定长期加密密钥。

    Power Analysis Countermeasure for the ECMQV Key Agreement Algorithm
    10.
    发明申请
    Power Analysis Countermeasure for the ECMQV Key Agreement Algorithm 有权
    ECMQV密钥协商算法的功率分析对策

    公开(公告)号:US20080301459A1

    公开(公告)日:2008-12-04

    申请号:US12040212

    申请日:2008-02-29

    IPC分类号: H04L9/06

    摘要: Execution of the ECMQV key agreement algorithm requires determination of an implicit signature, which determination involves arithmetic operations. Some of the arithmetic operations employ a long-term cryptographic key. It is the execution of these arithmetic operations that can make the execution of the ECMQV key agreement algorithm vulnerable to a power analysis attack. In particular, an attacker using a power analysis attack may determine the long-term cryptographic key. By modifying the sequence of operations involved in the determination of the implicit signature and the inputs to those operations, power analysis attacks may no longer be applied to determine the long-term cryptographic key.

    摘要翻译: 执行ECMQV密钥协商算法需要确定隐式签名,该确定涉及算术运算。 一些算术运算采用长期加密密钥。 这些算术运算的执行可以使得ECMQV密钥协商算法的执行容易受到功率分析攻击。 特别地,使用功率分析攻击的攻击者可以确定长期加密密钥。 通过修改确定隐式签名所涉及的操作顺序和对这些操作的输入,功率分析攻击可能不再适用于确定长期加密密钥。