Method and system for resistance to statiscal power analysis
First Claim
1. A method of processing a message using a cryptographic algorithm in a manner resistant to external detection of secret information, comprising the steps of:
- receiving input data;
generating a random value; and
substantively altering the observable operation of said cryptographic algorithm while processing said input data, in accordance with said random value, frustrating the correlation of output power emissions with any meaningful internal processing.
2 Assignments
0 Petitions
Accused Products
Abstract
New techniques for cracking sealed platforms have recently been discovered which observe power modulation during execution of a software encryption program on a computer processor. Particularly vulnerable to such simple power analysis and differential power analysis attacks are smart cards which employ Data Encryption Standard (DES) protection. The invention protects against such attacks by substantively altering the observable operation of the cryptographic algorithm while it is processing input data. The alterations are generated in a random way and may include average neutral execution, permuted execution or code padding of the cryptographic algorithm.
71 Citations
24 Claims
-
1. A method of processing a message using a cryptographic algorithm in a manner resistant to external detection of secret information, comprising the steps of:
-
receiving input data;
generating a random value; and
substantively altering the observable operation of said cryptographic algorithm while processing said input data, in accordance with said random value, frustrating the correlation of output power emissions with any meaningful internal processing. - View Dependent Claims (2, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21)
-
-
3. A method of increasing the resistance to external detection of secret information, of a cryptographic key-based algorithm, comprising the steps of:
removing differences between averaged power profiles. - View Dependent Claims (4)
-
22. An apparatus for processing a message using a cryptographic algorithm in a manner resistant to external detection of secret information, comprising:
-
means for receiving input data;
means for generating a random value; and
means for substantively altering the observable operation of said cryptographic algorithm while processing said input data, in accordance with said random value, frustrating the correlation of output power emissions with any meaningful internal processing.
-
-
23. A computer readable memory medium for storing software code executable to perform the method steps of:
-
receiving input data;
generating a random value; and
substantively altering the observable operation of said cryptographic algorithm while processing said input data, in accordance with said random value, frustrating the correlation of output power emissions with any meaningful internal processing.
-
-
24. A carrier signal incorporating software code executable to perform the method steps of:
-
receiving input data;
generating a random value; and
substantively altering the observable operation of said cryptographic algorithm while processing said input data, in accordance with said random value, frustrating the correlation of output power emissions with any meaningful internal processing.
-
Specification