Method and apparatus for preventing information leakage attacks on a microelectronic assembly
First Claim
1. A method for preventing information leakage attacks on a microelectronic assembly performing a cryptographic algorithm by transforming a first function, used by the cryptographic algorithm, into a second function, the comprising the steps of:
- receiving a masked input data having n number of bits that is masked with an input mask, wherein n is a first predetermined integer;
processing the masked input data using a second function based on a predetermined masking scheme;
producing a masked output data having m number of bits that is masked with an output mask, wherein m is a second predetermined integer.
4 Assignments
0 Petitions
Accused Products
Abstract
An apparatus and method for preventing information leakage attacks on a microelectronic assembly is described for performing a cryptographic algorithm by transforming a first function, used by the cryptographic algorithm, into a second function. The method includes receiving (1102) a masked input data having n number of bits that is masked with an input mask, wherein n is a first predetermined integer. The method also includes processing (1104) the masked input data using a second function based on a predetermined masking scheme, and producing (1106) a masked output data having m number of bits that is masked with an output mask, wherein m is a second predetermined integer.
-
Citations
12 Claims
-
1. A method for preventing information leakage attacks on a microelectronic assembly performing a cryptographic algorithm by transforming a first function, used by the cryptographic algorithm, into a second function, the comprising the steps of:
-
receiving a masked input data having n number of bits that is masked with an input mask, wherein n is a first predetermined integer;
processing the masked input data using a second function based on a predetermined masking scheme;
producing a masked output data having m number of bits that is masked with an output mask, wherein m is a second predetermined integer. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. An apparatus for preventing information leakage attacks on a microelectronic assembly, comprising:
-
a crossbar switch responsive to a first masked input and a second masked input that are masked based on a first mask, a control input based on a second mask, the crossbar switch providing a first output and a second output;
a multiplexer coupled to the first output and the second output of the crossbar switch, the multiplexer having an output, and a control input responsive to a control signal that is based on the second mask and an input to a first function. - View Dependent Claims (10, 11, 12)
-
Specification