-
公开(公告)号:US20240211551A1
公开(公告)日:2024-06-27
申请号:US18555543
申请日:2022-04-15
发明人: David VIGILANT , Jean-Roch COULON , Jerome VASSEUR
CPC分类号: G06F21/14 , G06F21/125
摘要: Provided is a method for protecting a program in an integrated circuit product. The method includes creating one or more opcode blocs to respectively replace one or more original opcodes of said program, said opcode bloc comprising a number of fictional opcodes and the corresponding original opcode, said fictional opcodes being to be executed without taking into account their results and without impacting an expected result of said program, said number and a position of the original opcode in said opcode bloc being randomly determined by a random or pseudo random number generator of said integrated circuit product, and executing said one or more opcode blocs.
-
2.
公开(公告)号:US20240313942A1
公开(公告)日:2024-09-19
申请号:US18260793
申请日:2022-01-11
发明人: David VIGILANT , Steven MADEC , Mylène ROUSSELLET
CPC分类号: H04L9/003 , H04L9/3066 , H04L2209/046
摘要: Provided is a method for securing against side channel attacks. An elliptic curve cryptographic process comprises a multiple points multiplication operation using predetermined scalar values, Pi being points of an elliptic curve over a finite field defined by parameters (F, E, G, N) together with the point addition law where F is a field over which is defined the curve, E is an equation of the curve, G is a base point in E over F and N is the order of the base point G. The method comprises generating (S1) a masking value iRand, multiplicatively masking (S2) each predetermined scalar value di with said generated masking value iRand to obtain masked scalars di′, computing (S3) a masked multiple points multiplication operation result, and obtaining (S4) said multiple points multiplication operation result R by unmasking said masked multiple points multiplication operation result R′.
-
3.
公开(公告)号:US20240031130A1
公开(公告)日:2024-01-25
申请号:US18265980
申请日:2021-12-14
CPC分类号: H04L9/0631 , H04L9/003
摘要: Provided is a method for securing against high-order side-channel attacks wherein a substep of field inversion is performed by a cryptographic device. The method includes computing (S1) a Dirac output value, adding (S2) said Dirac output value to one of said shares of the first set of shares to obtain a second set of shares, performing a conversion of the second set of shares (S3) from said (n+1) additive sharing to a (n+1)-multiplicative sharing, performing an inversion of each share of the (n+1)-multiplicative sharing (S4), performing a conversion of the inverted shares (S5) from said multiplicative sharing to a (n+1)-additive sharing to obtain a third set of shares, and adding (S6) said Dirac output value to one of said shares of the third set of shares. Other embodiments disclosed.
-
公开(公告)号:US20220237287A1
公开(公告)日:2022-07-28
申请号:US17612295
申请日:2020-04-07
发明人: David VIGILANT , Xun LI , Sami HOKUNI , Janne RANTALA
摘要: Provided is a method for securing against fault attacks during verification a digital signature of a message on a client device. It performs (S1) at least one check on intermediate parameters that are generated for one that is different from 0 modulo n. It checks that values computed by several executions of the verification algorithm are the same, and checks that at least one mathematical relationship is verified. It performs a signature comparison final step to test equality between one of the intermediate parameters and a part of the digital signature. It triggers (S2) a fault attack countermeasure when at least one of the performed checks has failed.
-
-
-