Method for making secure one or several computer installations using a common secret key algorithm, use of the method and a computer system utilizing the method
First Claim
Patent Images
1. A method for protecting one or more computer systems using the same secret key (Ks) cryptographic algorithm, each computer system having storage means for storing the secret key (Ks) and processing means for executing the cryptographic algorithm, the method comprising:
- storing a secret data (Ds) in a secret area of the storage means;
separating a standard cryptographic algorithm into a plurality of simultaneous calculation processes based on the secret data (Ds);
creating a plurality of partial intermediate variables corresponding to each intermediate variable of the standard cryptographic algorithm;
applying nonlinear transformations to each of the plurality of partial intermediate variables to create a plurality of partial results; and
reconstituting a final result, corresponding to a result of the standard cryptographic algorithm, from the plurality of partial results.
2 Assignments
0 Petitions
Accused Products
Abstract
The invention relates to a method for protecting one or more computer systems using the same secret key (Ks) cryptographic algorithm, characterized in that the way in which said calculation is performed depends, for each computer system and for each secret key, on secret data (Ds) stored in a secret area of the computer system or systems.
-
Citations
21 Claims
-
1. A method for protecting one or more computer systems using the same secret key (Ks) cryptographic algorithm, each computer system having storage means for storing the secret key (Ks) and processing means for executing the cryptographic algorithm, the method comprising:
-
storing a secret data (Ds) in a secret area of the storage means; separating a standard cryptographic algorithm into a plurality of simultaneous calculation processes based on the secret data (Ds); creating a plurality of partial intermediate variables corresponding to each intermediate variable of the standard cryptographic algorithm; applying nonlinear transformations to each of the plurality of partial intermediate variables to create a plurality of partial results; and reconstituting a final result, corresponding to a result of the standard cryptographic algorithm, from the plurality of partial results. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A computer system, comprising:
-
storage means for storing a secret encryption key and secret data in a secret area of the storage means; and at least one processor, coupled to the storage means, for modifying a standard secret key cryptographic algorithm into calculation processes based on the secret data, the processor operating to; separate the standard secret key cryptographic algorithm into a plurality of simultaneous calculation processes based on the secret data, replace each intermediate variable of the standard secret key cryptographic algorithm with a plurality of partial intermediate variables, apply nonlinear transformations to each of the plurality of partial intermediate variables to create a plurality of partial results, and reconstitute a final result, corresponding to a result of the standard secret key cryptographic algorithm, from the plurality of partial results. - View Dependent Claims (9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21)
-
Specification