Method of executing a cryptographic protocol between two electronic entities
First Claim
1. Method of generating a cryptographic protocol between a first electronic entity (A) and a second electronic entity (B) subject to attack, according to which any message (M) is generated, on the basis of which a chain of operations is carried by the said second entity resulting in the generation of a resultant or response message (R), the said response being compared with the result of another similar processing applied to the said message and carried out by the said first entity, characterised in that, at least in certain stages of the said chain of operations, the said second entity carries out either an operation of a chosen type (O1, O2, O3 . . . On) or the same operation complemented ({overscore (O)}1, {overscore (O)}2, {overscore (O)}3 . . . On), the choice depending on a random decision and in that the said response is constituted by the result of the last operation of the said chain, possibly complemented.
1 Assignment
0 Petitions
Accused Products
Abstract
Perfected cryptographic protocol making it possible to counter attacks based on the analysis of the current consumption during the execution of a DES or similar.
According to the invention, a message (M) is processed by two entities (A and B) and the entity (B) subject to attack executes a chain of operations known as DES in which it is chosen to carry out a given operation (O1, O2, O3 . . . On)
or the same operation complemented ({overscore (O)}1, {overscore (O)}2, {overscore (O)}3 . . . {overscore (O)}n), the choice being random.
-
Citations
13 Claims
- 1. Method of generating a cryptographic protocol between a first electronic entity (A) and a second electronic entity (B) subject to attack, according to which any message (M) is generated, on the basis of which a chain of operations is carried by the said second entity resulting in the generation of a resultant or response message (R), the said response being compared with the result of another similar processing applied to the said message and carried out by the said first entity, characterised in that, at least in certain stages of the said chain of operations, the said second entity carries out either an operation of a chosen type (O1, O2, O3 . . . On) or the same operation complemented ({overscore (O)}1, {overscore (O)}2, {overscore (O)}3 . . . On), the choice depending on a random decision and in that the said response is constituted by the result of the last operation of the said chain, possibly complemented.
Specification