CRYPTOGRAPHIC DEVICE AND SECRET KEY PROTECTION METHOD
First Claim
Patent Images
1. A cryptographic device, that protects a secret key of the cryptographic device when processing a message, comprising:
- a secret key protection circuit, configured to generate an indecipherable signal according to the message and the secret key by a hash calculation circuit; and
a cryptographic circuit, configured to process the message and the secret key according to the indecipherable signal to generate an encrypted signal.
2 Assignments
0 Petitions
Accused Products
Abstract
A cryptographic device and a secret key protection method are provided. The cryptographic device protects a secret key of the cryptographic device when processing a message. The cryptographic device includes: a secret key protection circuit, configured to generate an indecipherable signal according to the message and the secret key by a hash calculation circuit; and a cryptographic processor, configured to process the message and the secret key according to the indecipherable signal to generate an encrypted message.
24 Citations
20 Claims
-
1. A cryptographic device, that protects a secret key of the cryptographic device when processing a message, comprising:
-
a secret key protection circuit, configured to generate an indecipherable signal according to the message and the secret key by a hash calculation circuit; and a cryptographic circuit, configured to process the message and the secret key according to the indecipherable signal to generate an encrypted signal. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A secret key protection method, applied to a cryptographic device, for protecting a secret key of the cryptographic device when the cryptographic device processes a message, the secret key protection method comprising:
-
generating a hash value according to the message and the secret key; generating an indecipherable signal according to the hash value; and processing the message and the secret key according to the indecipherable signal to generate an encrypted signal. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19, 20)
-
Specification