Protecting modular exponentiation in cryptographic operations
A modular exponentiation and modular protection technology, applied in the field of hiding the intermediate results of modular exponentiation, can solve problems such as poor environment
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0042] The invention describes a protection method for modular exponentiation using the so-called window method in an open software environment. By opening the software environment, we assume a binary code executed on said PC system and accessible by an attacker.
[0043] like figure 1 As shown, the invention may be implemented in a processing unit dedicated to performing cryptographic operations. This unit includes at least: a processor CPU capable of executing a software core; and a memory MEM1 for storing the code and providing necessary space for storing temporary data MEM2. An interface INT is provided in order to receive messages for encrypted processing encrypted (or decrypted) for storage in the temporary memory MEM2. This interface INT also sends decrypted (or encrypted) messages to other components of the receiving device in the same way.
[0044] According to a preferred embodiment, we consider a PC system or a processing unit performing said modular exponentiati...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 