Supercharge Your Innovation With Domain-Expert AI Agents!

Method and computing device for executing cryptographic processes for resisting cipher attack

A computing device, technology for masking data, applied in the field of computing systems

Active Publication Date: 2013-09-04
RES IN MOTION LTD
View PDF2 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, there is no disclosure of the permutation table splitting step prior to masking the table, which produces a split set of masked tables

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and computing device for executing cryptographic processes for resisting cipher attack
  • Method and computing device for executing cryptographic processes for resisting cipher attack
  • Method and computing device for executing cryptographic processes for resisting cipher attack

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032] Advantages of the preferred embodiments include increased resistance to DPA attacks or other similar cryptographic attacks for devices implementing the preferred embodiments due to the parallelism of the encryption performed in accordance with the preferred embodiments. Additionally, using table splitting as described in the preferred embodiment makes higher level cryptographic attacks (eg, DPA attacks) more difficult due to the reduced number of available samples. For example, a single power sample reflecting data including random mask bits and mask table output bits may be available, but this single available sample may not be sufficient to enable higher order DPA attacks.

[0033] Advantages include the use of varying masks for the permutation table, which reduces energy, performance and program code overhead costs. This limited overhead allows such countermeasures to be used by devices such as wireless mobile devices that perform operations that require security but...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

For a defined cryptographic process including an original substitution table, split masked substitution tables are provided to resist cryptographic attacks. The split masked substitution tables are defined with reference to a set of random value data words and a mask value. An entry in the split masked substitution tables is defined by selecting bits from the corresponding entry in the original masked substitution table, as masked by the corresponding one of the set of random value data words and by selecting bits from the corresponding one of the set of random value data words as masked by the mask value. The split masked substitution tables are usable in a modified cryptographic process based on the defined cryptographic process to permit a masked output to be generated. The split masked substitution tables are refreshed by each entry in the tables being refreshed upon access during execution of the modified cryptographic process.

Description

technical field [0001] The present invention relates generally to computing systems, and more particularly, the present invention relates to computing systems implementing cryptographic operations and countermeasures against attacks on cryptographic operations, such as power analysis attacks. Background technique [0002] Computing systems are often required to perform operations in a secure manner. Operational security is often of paramount importance for embedded computing devices and pervasive systems. To ensure security of operation and communication, these systems employ cryptographic methods. The implementation of this cryptographic method must itself be secure. However, cryptographic methods are under attack. One type of non-invasive attack on computing devices implementing cryptographic methods is known as a power analysis attack. Another attack is based on electromagnetic analysis of the device performing the cryptographic process. Although described below wit...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/06H04L29/06
CPCH04L9/003H04L2209/046H04L9/0631H04L2209/08H04L2209/043G09C1/00
Inventor 凯瑟琳·海伦·盖博苔斯
Owner RES IN MOTION LTD
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More