×

Attack-resistant implementation method

  • US 6,986,054 B2
  • Filed: 12/19/2001
  • Issued: 01/10/2006
  • Est. Priority Date: 03/30/2001
  • Status: Expired due to Fees
First Claim
Patent Images

1. A method for countering unauthorized decryption comprising a step of scrambling at least one correlation between a data decryption processing in a hardware and at least one respective hardware operational phenomenon by randomly changing at least one arithmetic operation order in the data decryption processing, wherein the correlation is scrambled by an arithmetic operation method implemented by an information processing apparatus comprising the steps of:

  • for two integers K1 and K2, when finding a value F(K, A) of a function F satisfying F(K1+K2,A)=F(K1, A) ◯

    F(K2, A) (◯

    denotes an arithmetic operation in a communtative semigroup S. K designates an integer and A designates an element of S), decomposing the K to the sum of m integers K[0]+K[1]+. . . K[m−

    1];

    using T(0), T(1), . . . T(m−

    1) resulted from rearranging a string of integers 0, 1, . . . m−

    1 by permutation T; and

    operating on terms F(K[T(0)], A) to F(K[T(m−

    1)], A) on the right side of F(K, A)=F(K[T(0)], A) ◯

    F(K[T(1)], A) ◯

    . . . F(K[T(m−

    1)], A) . . . (“

    expression 1”

    ) in an order of F(K[T(0)], A), F(K[T(1)], A), . . . F(K[T(m−

    1)], A) to find F(K, A).

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×