Method of obscuring cryptographic computations
First Claim
Patent Images
1. A method of obscuring cryptographic computations comprising:
- performing modular exponentiation in a cryptographic computation such that memory accesses are independent of the numerical value of the exponent.
1 Assignment
0 Petitions
Accused Products
Abstract
Obscuring cryptographic computations may be accomplished by performing modular exponentiation of an exponent in a cryptographic computation such that memory accesses are independent of the exponent bit pattern, thereby deterring timing attacks.
123 Citations
32 Claims
-
1. A method of obscuring cryptographic computations comprising:
performing modular exponentiation in a cryptographic computation such that memory accesses are independent of the numerical value of the exponent. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
10. A method of obscuring cryptographic computations by performing modular exponentiation of an exponent in a cryptographic computation such that memory accesses are independent of the exponent bit pattern comprising:
-
setting an intermediate value to a message; and
for each bit i in the exponent, setting the intermediate value to the intermediate value multiplied by the intermediate value mod a modulus, wherein the modulus comprises a product of two prime numbers, determining a current obscuring factor using the i'"'"'th bit of the exponent, and setting the intermediate value to the intermediate value multiplied by the current obscuring factor mod the modulus. - View Dependent Claims (11, 12, 13)
-
-
14. A method of obscuring cryptographic computations by performing modular exponentiation of an exponent in a cryptographic computation such that memory accesses are independent of the exponent bit pattern comprising:
-
picking a random number between one and a modulus minus one, the modulus comprising a product of two prime numbers;
determining an intermediate value based at least in part on the random number and a message;
determining a first obscuring factor and a second obscuring factor using the message and the inverse of the random number;
for each bit i in the exponent, setting the intermediate value to the intermediate value multiplied by the intermediate value mod the modulus, determining a third obscuring factor using the i'"'"'th bit of the exponent and the first and second obscuring factors, and setting the intermediate value to the intermediate value multiplied by the third obscuring factor mod the modulus; and
setting a new message to the intermediate value multiplied by the second obscuring factor mod the modulus. - View Dependent Claims (15, 16, 17, 18, 19, 20, 21, 22, 23)
-
-
24. An article comprising:
- a storage medium having a plurality of machine readable instructions, wherein when the instructions are executed by a processor, the instructions provide for obscuring cryptographic computations by performing modular exponentiation of an exponent in a cryptographic computation such that memory accesses are independent of the numerical value of the exponent.
- View Dependent Claims (25, 26)
-
27. An article comprising:
- a storage medium having a plurality of machine readable instructions, wherein when the instructions are executed by a processor, the instructions provide for obscuring cryptographic computations by performing modular exponentiation of an exponent in a cryptographic computation such that memory accesses are independent of the exponent bit pattern, the instructions causing
setting an intermediate value to a message; and
for each bit i in the exponent, setting the intermediate value to the intermediate value multiplied by the intermediate value mod a modulus, wherein the modulus comprises a product of two prime numbers, determining a current obscuring factor using the i'"'"'th bit of the exponent, and setting the intermediate value to the intermediate value multiplied by the current obscuring factor mod the modulus. - View Dependent Claims (28, 29, 30)
- a storage medium having a plurality of machine readable instructions, wherein when the instructions are executed by a processor, the instructions provide for obscuring cryptographic computations by performing modular exponentiation of an exponent in a cryptographic computation such that memory accesses are independent of the exponent bit pattern, the instructions causing
-
31. An article comprising:
- a storage medium having a plurality of machine readable instructions, wherein when the instructions are executed by a processor, the instructions provide for obscuring cryptographic computations by performing modular exponentiation of an exponent in a cryptographic computation such that memory accesses are independent of the exponent bit pattern, the instructions causing picking a random number between one and a modulus minus one, the modulus comprising a product of two prime numbers;
determining an intermediate value based at least in part on the random number and a message;
determining a first obscuring factor and a second obscuring factor using the message and the inverse of the random number;
for each bit i in the exponent, setting the intermediate value to the intermediate value multiplied by the intermediate value mod the modulus, determining a third obscuring factor using the i'"'"'th bit of the exponent, and the first and second obscuring factors, and setting the intermediate value to the intermediate value multiplied by the third obscuring factor mod the modulus; and
setting a new message to the intermediate value multiplied by the second obscuring factor mod the modulus. - View Dependent Claims (32)
- a storage medium having a plurality of machine readable instructions, wherein when the instructions are executed by a processor, the instructions provide for obscuring cryptographic computations by performing modular exponentiation of an exponent in a cryptographic computation such that memory accesses are independent of the exponent bit pattern, the instructions causing picking a random number between one and a modulus minus one, the modulus comprising a product of two prime numbers;
Specification