Electrical computers and digital processing systems: support – Computer program modification detection by cryptography
Reexamination Certificate
2007-02-15
2011-11-22
Laforgia, Christian (Department: 2439)
Electrical computers and digital processing systems: support
Computer program modification detection by cryptography
C708S164000
Reexamination Certificate
active
08065531
ABSTRACT:
The invention relates to a method of determining a plaintext M on the basis of a cipher C and using a secret key d, wherein the secret key d is used in binary form, wherein the plaintext M is determined in each iteration step i for the corresponding bit diand a security variable Mnis determined in parallel therewith, and then a verification variable x is determined by means of a bit-compatible exponent of the secret key d.
REFERENCES:
patent: 6212277 (2001-04-01), Miyaji
patent: 6298135 (2001-10-01), Messerges et al.
patent: 6738478 (2004-05-01), Vanstone et al.
patent: 6832316 (2004-12-01), Sibert
patent: 7359508 (2008-04-01), Villegas et al.
patent: 7404089 (2008-07-01), Campagna et al.
patent: 7826610 (2010-11-01), Akkar et al.
patent: 7940928 (2011-05-01), Sibert
patent: 2001/0033655 (2001-10-01), Vadekar et al.
patent: 2002/0061104 (2002-05-01), Knudsen
patent: 2003/0128842 (2003-07-01), Nakano et al.
patent: 2005/0060560 (2005-03-01), Sibert
patent: 2005/0108555 (2005-05-01), Sibert
patent: 2005/0163312 (2005-07-01), Joye et al.
patent: 2007/0177721 (2007-08-01), Itoh et al.
patent: 2008/0205639 (2008-08-01), Braun et al.
patent: 2009/0052657 (2009-02-01), Golic
patent: 2010/0077225 (2010-03-01), Salgado et al.
patent: 1443393 (2004-08-01), None
patent: WO 2007/028669 (2007-03-01), None
patent: WO 2007/048430 (2007-05-01), None
patent: WO 2008/044113 (2008-04-01), None
Benoit Chevallier-Mames. Self-Randomized Exponentiation Algorithms. 2004. Springer-Verlag. p. 236-249.
Hideyo Mamiya et al. Efficient Countermeasures Against RPA, DPA, and SPA. 2004. CHES 2004, LNCS 3156. p. 343-356.
Fauzan Mizra. Block Ciphers and Cryptanalysis. 1998. p. 1-27.
Oswald E et al; “Randomized Addition-Subtraction Chains as a Countermeasure Against Power Attacks”. Cryptographic Hardware and Embedded Systems. 3rd International Workshop, CHES 2001, Paris, France. May 14-16, 2001. Proceedings, Lecture Notes in Computer Science, Berlin: Springer, DE. vol. 2162, pp. 39-50.
Changkyun Kim et al; “A Secure and Practical CRT-Based RSA to Resist Side Channel Attacks”. International Conference, Assisi, Italy, May 14-17, 2004. Proceedings, Part I. Computational Science and Its Applications – ICCSA 2004 Lecture Notes in Computer Science. vol. 3043, pp. 150-158.
Guillaume Fumaroli et al; “Blinded Fault Resistant Exponentiation”. Third International Workshop, FDTC 2006. Proceedings: Fault Diagnosis and Tolerance in Cryptography Lecture Notes in Computer Science; LNCS. vol. 4236, Oct. 10, 2006, pp. 62-70.
Laforgia Christian
NXP B.V.
LandOfFree
Decryption method does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Decryption method, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Decryption method will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-4304731