DIFFERENTIAL POWER ANALYSIS - RESISTANT CRYPTOGRAPHIC PROCESSING
First Claim
1. A cryptographic processing device for securely performing a cryptographic processing operation in a manner resistant to discovery of a secret by external monitoring of variations in the amount of power consumed, comprising:
- (a) an input interface for receiving a quantity to be cryptographically processed;
(b) a source of unpredictable information;
(c) a processor for performing said cryptographic processing in a manner decorrelated from externally-monitorable signals produced by said device, by using outputs from said source to select between operating on an instruction and inserting a delay before operating on said instruction;
(d) an output interface for providing said cryptographically processed quantity to a recipient thereof.
1 Assignment
0 Petitions
Accused Products
Abstract
Information leaked from smart cards and other tamper resistant cryptographic devices can be statistically analyzed to determine keys or other secret data. A data collection and analysis system is configured with an analog-to-digital converter connected to measure the device'"'"'s consumption of electrical power, or some other property of the target device, that varies during the device'"'"'s processing. As the target device performs cryptographic operations, data from the A/D converter are recorded for each cryptographic operation. The stored data are then processed using statistical analysis, yielding the entire key, or partial information about the key that can be used to accelerate a brute force search or other attack.
-
Citations
7 Claims
-
1. A cryptographic processing device for securely performing a cryptographic processing operation in a manner resistant to discovery of a secret by external monitoring of variations in the amount of power consumed, comprising:
-
(a) an input interface for receiving a quantity to be cryptographically processed; (b) a source of unpredictable information; (c) a processor for performing said cryptographic processing in a manner decorrelated from externally-monitorable signals produced by said device, by using outputs from said source to select between operating on an instruction and inserting a delay before operating on said instruction; (d) an output interface for providing said cryptographically processed quantity to a recipient thereof. - View Dependent Claims (2, 3, 4)
-
-
5. A method of securely performing a cryptographic processing operation in a manner resistant to information leakage attacks, using a cryptographic processing device that consumes power and produces externally monitorable signals, comprising:
-
(a) receiving a quantity to be cryptographically processed; (b) generating unpredictable information; (c) cryptographically processing said quantity, including using said unpredictable information to conceal a correlation between externally-monitorable signals produced by said device and said processing by selecting between operating on an instruction and inserting a delay before operating on said instruction. - View Dependent Claims (6, 7)
-
Specification