×

Leak-resistant cryptographic indexed key update

DC
  • US 6,539,092 B1
  • Filed: 07/02/1999
  • Issued: 03/25/2003
  • Est. Priority Date: 07/02/1998
  • Status: Expired due to Term
First Claim
Patent Images

1. A computer-implemented process for securing a first device while performing transactions with at least one second device, wherein said first device includes a computer-readable memory having an internal secret state, and wherein said at least one second device has access to a base secret cryptographic value corresponding to said internal secret state, comprising the steps of:

  • (a) using an index parameter associated with said internal secret state to select at least one state transformation operation;

    (b) applying at least said selected transformation operation to said internal secret state to produce an updated secret state;

    (i) having associated therewith an updated secret cryptographic value derivable from said secret state, and (ii) in a manner inhibiting leaked partial statistical information about said internal secret state from usefully describing said updated secret state;

    (c) replacing in said memory;

    (i) said internal secret state with said updated secret state, and (ii) said index parameter with an updated index parameter;

    (d) performing a cryptographic transaction with said at least one second device by transmitting said updated index parameter and at least one datum secured using said updated cryptographic value to said at least one second device configured to;

    (i) regenerate said updated cryptographic value from said base cryptographic value, and (ii) use said updated cryptographic value to process said secured datum;

    (e) said steps (a) through (d) being repeated a plurality of times, and said regeneration in (d)(i) being performable in substantially fewer applications of state transformations than a total number of repetitions of said steps (a) through (d).

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×