×

Cryptographic computation using masking to prevent differential power analysis and other attacks

  • US 7,668,310 B2
  • Filed: 08/15/2001
  • Issued: 02/23/2010
  • Est. Priority Date: 06/03/1998
  • Status: Expired due to Fees
First Claim
Patent Images

1. A method for performing a cryptographic operation with resistance to external monitoring attacks, where said cryptographic operation includes performing a substitution operation using a predefined substitution table, said method comprising:

  • (a) obtaining a representation of a predefined substitution table specifying a corresponding table value for each of a plurality of possible table index values;

    (b) using random information, transforming said representation of said predefined substitution table into a new randomized representation of said substitution table;

    (c) receiving a datum to be cryptographically processed;

    (d) computing a blinded representation of a table index value from at least said datum;

    (e) using said new randomized representation of said table, performing a substitution on said blinded table index value to derive a blinded representation of the table value corresponding to an unblinded version of said table index value in step (d); and

    (f) using said blinded table value to compute a cryptographic result for use in securing a cryptographic protocol.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×