Method for protecting a cryptographic module and a device having cryptographic module protection capabilities
a cryptographic module and protection capability technology, applied in the direction of unauthorized memory use protection, instruments, error detection/correction, etc., can solve the problems of destroying the stored key, increasing the vulnerability of the cipher to cryptanalysis, and causing faults
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Examples
Embodiment Construction
[0018]The following figures illustrate exemplary embodiments of the invention. They are not intended to limit the scope of the invention but rather assist in understanding some of the embodiments of the invention. It is further noted that all the figures are out of scale.
[0019]Because the embodiments of are, for the most part, composed of electronic components and circuits known to those skilled in the art, circuit details will not be explained in any greater extent than that considered necessary as illustrated above, for the understanding and appreciation of the underlying concepts of the present invention and in order not to obfuscate or distract from the teachings of the present invention.
[0020]The functionality of a cryptographic module is estimated based upon a functionality of a circuit that is expected to malfunction before (at a lower frequency than) the cryptographic module malfunctions. If a circuit malfunction is detected then a cryptographic module protective measure can...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More