G06F2207/7266

ENHANCING SECURITY FOR CRYPTOGRAPHIC COMPONENTS

Systems and techniques for securely performing cryptographic operations are described herein. For example, a process can include obtaining a public data and a security information asset. The process can include performing, by a first computation module, a Boolean operation on the public data and the security information asset to generate an output. The process can include obtaining the public data and the security information asset. The process can include performing, by a second computation module, the Boolean operation on the public data and the security information asset to generate the output. The first computation module has a first configuration and the second computation module has a second configuration, different from the first configuration.

Protection of a cryptographic operation
12250303 · 2025-03-11 · ·

The present disclosure relates to a cryptographic method comprising: multiplying a point belonging to a mathematical set with a group structure by a scalar by performing: the division of a scalar into a plurality of groups formed of a same number w of digits, w being greater than or equal to 2; and the execution, by a cryptographic circuit and for each group of digits, of a sequence of operations on point, the sequence of operations being identical for each group of digits, at least one of the operations executed for each of the groups of digits being a dummy operation.

Triplication-based fault attack countermeasure

Systems and techniques are provided for secure processing. For instance, a process can include: providing an input value to generate a first output value; obtaining a plurality of first intermediate output values based on a function of the first output value and a tweak value; embedding the plurality of first intermediate output values into a mathematical structure; obtaining a plurality of second intermediate output values, wherein the plurality of second intermediate output values are a function of the plurality of first intermediate output values, a random number, and an inverse of the tweak value; determining a most common value of the plurality of second intermediate output values; obtaining a third intermediate value, the third intermediate value based on a function of the most common value and an inverse of the random number; projecting the third intermediate value from the mathematical structure to obtain a second output value for output.