×

Key masking for cryptographic processes

  • US 7,778,419 B2
  • Filed: 05/13/2005
  • Issued: 08/17/2010
  • Est. Priority Date: 05/10/2005
  • Status: Active Grant
First Claim
Patent Images

1. A computing device-implemented method for improving the resistance, to power analysis attacks, of a processing unit performing iterative cryptographic operations utilizing key values and substitution tables, the method utilizing masking of the key values and the substitution tables, the method comprising the steps of:

  • a) initially masking an initial key value,b) initially defining a set of non-uniform key encryption masks,c) initially defining a set of masked substitution tables, each masked substitution table being derived from an initial substitution table so as to correspond to one of the key encryption masks from the set of non-uniform key encryption masks,d) iteratively carrying out the cryptographic operations, such thateach iteration of the cryptographic operations comprises the step of defining a successive masked key value by masking the previous masked key value using a key encryption mask selected from the set of non-uniform key encryption masks, andeach iteration of the cryptographic operations utilizes the successively defined masked key value and the corresponding table from the set of masked substitution tables that corresponds to the selected key encryption mask.

View all claims
  • 4 Assignments
Timeline View
Assignment View
    ×
    ×