×

Balanced cryptographic computational method and apparatus for leak minimizational in smartcards and other cryptosystems

DC
  • US 6,510,518 B1
  • Filed: 06/03/1999
  • Issued: 01/21/2003
  • Est. Priority Date: 06/03/1998
  • Status: Expired due to Term
First Claim
Patent Images

1. A method for using a secret key to cryptographically process a message, comprising:

  • (a) receiving a message to be cryptographically processed;

    (b) in a hardware device, cryptographically processing said message by performing a plurality of cryptographic suboperations thereon, each said suboperation;

    (i) taking an input, via at least one intermediate, to an output, (ii) including a number of computational state transformations, said number being independent of said message and of said key, and (iii) characterized such that the Hamming weights of said message, said intermediate, and said output are independent of said message and of said key; and

    (c) outputting said cryptographically processed message;

    whereby external monitoring of said hardware device does not reveal useful information about said secret key.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×