Method of protecting cryptographic operations from side channel attacks
First Claim
1. A method of deterring side channel attacks on cryptographic computations using an exponent value e and a modulus value n to determine a result value comprising:
- picking a first value;
picking a second value;
computing a third value as a product of the first and second values mod n;
computing a first intermediate value as the first value to the exponent e mod n;
computing a second intermediate value as the second value to the exponent e mod n; and
computing a result value equal to the third value to the exponent e mod n as the product of the first intermediate value and the second intermediate value mod n.
1 Assignment
0 Petitions
Accused Products
Abstract
Deterring side channel attacks on cryptographic computations using an exponent value e and a modulus value n to determine a result value may be accomplished by picking a first value, picking a second value, computing a third value as a product of the first and second values mod n, computing a first intermediate value as the first value to the exponent e mod n, computing a second intermediate value as the second value to the exponent e mod n, and computing a result value equal to the third value to the exponent e mod n as the product of the first intermediate value and the second intermediate value mod n. The result value ye mod n may be determined in this manner without using a modular inverse operation.
-
Citations
14 Claims
-
1. A method of deterring side channel attacks on cryptographic computations using an exponent value e and a modulus value n to determine a result value comprising:
-
picking a first value;
picking a second value;
computing a third value as a product of the first and second values mod n;
computing a first intermediate value as the first value to the exponent e mod n;
computing a second intermediate value as the second value to the exponent e mod n; and
computing a result value equal to the third value to the exponent e mod n as the product of the first intermediate value and the second intermediate value mod n. - View Dependent Claims (2, 3, 4)
-
-
5. An article comprising:
- a storage medium having a plurality of machine readable instructions, wherein when the instructions are executed by a processor, the instructions provide for deterring side channel attacks on cryptographic computations using an exponent value e and a modulus value n to determine a result value by picking a first value, picking a second value, computing a third value as a product of the first and second values mod n, computing a first intermediate value as the first value to the exponent e mod n, computing a second intermediate value as the second value to the exponent e mod n, and computing a result value equal to the third value to the exponent e mod n as the product of the first intermediate value and the second intermediate value mod n.
- View Dependent Claims (6, 7, 8)
-
9. A method of deterring side channel attacks on cryptographic computations using an exponent value e and a modulus value n to determine a result value comprising:
-
picking a first value;
picking a second value;
computing a first intermediate value as the first value to the exponent e mod n;
computing a second intermediate value as the second value to the exponent e mod n; and
computing a result value as the product of the first intermediate value and the second intermediate value mod n. - View Dependent Claims (10, 11)
-
-
12. An article comprising:
- a storage medium having a plurality of machine readable instructions, wherein when the instructions are executed by a processor, the instructions provide for deterring side channel attacks on cryptographic computations using an exponent value e and a modulus value n to determine a result value by picking a first value, picking a second value, computing a first intermediate value as the first value to the exponent e mod n, computing a second intermediate value as the second value to the exponent e mod n, and computing a result value as the product of the first intermediate value and the second intermediate value mod n.
- View Dependent Claims (13, 14)
Specification