Differential power analysis—resistant cryptographic processing
First Claim
1. A cryptographic processing device for securely performing a cryptographic processing operation in a manner resistant to discovery of a secret by external monitoring of variations in the amount of power consumed, comprising:
- (a) an input interface for receiving a quantity to be processed;
(b) a source of unpredictable information;
(c) a processor for performing said cryptographic processing operation in a manner decorrelated from externally-monitorable signals produced by said device, by using outputs from said source to select between operating on an instruction and inserting a delay before operating on said instruction, wherein inserting said delay includes performing a no-operation processor instruction prior to said cryptographic processing operation, said selection being based on a determination of whether the received quantity is to be processed cryptographically; and
(d) an output interface for providing said processed quantity to a recipient thereof.
1 Assignment
0 Petitions
Accused Products
Abstract
Information leaked from smart cards and other tamper resistant cryptographic devices can be statistically analyzed to determine keys or other secret data. A data collection and analysis system is configured with an analog-to-digital converter connected to measure the device'"'"'s consumption of electrical power, or some other property of the target device, that varies during the device'"'"'s processing. As the target device performs cryptographic operations, data from the A/D converter are recorded for each cryptographic operation. The stored data are then processed using statistical analysis, yielding the entire key, or partial information about the key that can be used to accelerate a brute force search or other attack.
-
Citations
5 Claims
-
1. A cryptographic processing device for securely performing a cryptographic processing operation in a manner resistant to discovery of a secret by external monitoring of variations in the amount of power consumed, comprising:
-
(a) an input interface for receiving a quantity to be processed; (b) a source of unpredictable information; (c) a processor for performing said cryptographic processing operation in a manner decorrelated from externally-monitorable signals produced by said device, by using outputs from said source to select between operating on an instruction and inserting a delay before operating on said instruction, wherein inserting said delay includes performing a no-operation processor instruction prior to said cryptographic processing operation, said selection being based on a determination of whether the received quantity is to be processed cryptographically; and (d) an output interface for providing said processed quantity to a recipient thereof. - View Dependent Claims (2, 3)
-
-
4. A method of securely performing a cryptographic processing operation in a manner resistant to information leakage attacks, using a cryptographic processing device that consumes power and produces externally monitorable signals, comprising:
-
(a) receiving a quantity to be processed; (b) generating unpredictable information; (c) determining whether to process the received quantity cryptographically; and (d) based on the determination, cryptographically processing said quantity, including using said unpredictable information to conceal a correlation between externally-monitorable signals produced by said device and said processing by selecting between operating on an instruction and inserting a delay before operating on said instruction, wherein said delay insertion includes a no-operation processor instruction. - View Dependent Claims (5)
-
Specification