Encryption protection method

Cryptography – Particular algorithmic function encoding

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C380S029000, C380S255000

Reexamination Certificate

active

07848515

ABSTRACT:
A deterministic blinding method for cipher algorithms that employ key-mixing and substitution (S-box) operations uses a masking table constructed with a true mask and a plurality of dummy masks corresponding to every possible S-box input. Each mask is applied in the key-mixing operation (e.g., bitwise XOR) to the cipher key or to round subkeys to generate true and dummy keys or subkeys that are applied to the data blocks within the overall cipher algorithm or within individual cipher rounds. The mask values prevent side-channel statistical analyses from determining the true from the dummy keys or subkeys. The true mask is identifiable to the cipher but not by external observers.

REFERENCES:
patent: 6028939 (2000-02-01), Yin
patent: 6278783 (2001-08-01), Kocher et al.
patent: 6724894 (2004-04-01), Singer
patent: 6738478 (2004-05-01), Vanstone et al.
patent: 6754190 (2004-06-01), Gurney et al.
patent: 7043017 (2006-05-01), Swindlehurst et al.
patent: 2003/0044003 (2003-03-01), Chari et al.
patent: 2003/0093684 (2003-05-01), Kaiserswerth et al.
patent: 2004/0139340 (2004-07-01), Johnson et al.
patent: 2005/0076228 (2005-04-01), Davis et al.
patent: 2005/0169463 (2005-08-01), Ahn et al.
patent: 2005/0283714 (2005-12-01), Korkishko et al.
patent: 1 587 237 (2005-10-01), None
patent: 2 832 739 (2003-05-01), None
patent: WO-2007102898 (2007-09-01), None
patent: WO-2007102898 (2007-09-01), None
“International Application No. PCT/US2006/061165 Search Report”, (Oct. 25, 2007),2 pgs.
“International Application No. PCT/US2006/061165 Written Opinion”, (Oct. 25, 2007),5 pgs.
Wu, L. , et al., “CryptoManiac: A Fast Flexible Architecture for Secure Communication”,In 28th Annual International Symposium on Computer Architecture(ISCA'01), Retrived from the Internet: <URL:http://hpc.serc.iisc.ernet.in/-govind/TiCA-04/ISCA01-WuEtAl.pdf>,(2001),110-119.
Federal Information Processing Standards Publication, “Data Encryption Standard (DES)”, FIPS Pub 46-3, U.S. Dept. of Commerce, Oct. 25, 1999, 24 Pages.
Nist, “Recommendation for the Triple Data Encryption Algorithm (TDEA) Block Cipher”, Spec. Pub. 800-67, Version 1, May 2004, 39 Pages.
J. Kilian, P. Rogaway, “How to Protect DES Against Exhaustive Key Search”, Proceedings of Crypto 96, (DESX), Jul. 28, 1997, 19 Pages.
D. Page, F. Vercauteren, “Fault and Side-Channel Attacks on Pairing Based Cryptography”, 19 Pages.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Encryption protection method does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Encryption protection method, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Encryption protection method will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-4185948

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.