Cryptography – Particular algorithmic function encoding
Reexamination Certificate
2006-02-22
2010-12-07
Parthasarathy, Pramila (Department: 2436)
Cryptography
Particular algorithmic function encoding
C380S029000, C380S255000
Reexamination Certificate
active
07848515
ABSTRACT:
A deterministic blinding method for cipher algorithms that employ key-mixing and substitution (S-box) operations uses a masking table constructed with a true mask and a plurality of dummy masks corresponding to every possible S-box input. Each mask is applied in the key-mixing operation (e.g., bitwise XOR) to the cipher key or to round subkeys to generate true and dummy keys or subkeys that are applied to the data blocks within the overall cipher algorithm or within individual cipher rounds. The mask values prevent side-channel statistical analyses from determining the true from the dummy keys or subkeys. The true mask is identifiable to the cipher but not by external observers.
REFERENCES:
patent: 6028939 (2000-02-01), Yin
patent: 6278783 (2001-08-01), Kocher et al.
patent: 6724894 (2004-04-01), Singer
patent: 6738478 (2004-05-01), Vanstone et al.
patent: 6754190 (2004-06-01), Gurney et al.
patent: 7043017 (2006-05-01), Swindlehurst et al.
patent: 2003/0044003 (2003-03-01), Chari et al.
patent: 2003/0093684 (2003-05-01), Kaiserswerth et al.
patent: 2004/0139340 (2004-07-01), Johnson et al.
patent: 2005/0076228 (2005-04-01), Davis et al.
patent: 2005/0169463 (2005-08-01), Ahn et al.
patent: 2005/0283714 (2005-12-01), Korkishko et al.
patent: 1 587 237 (2005-10-01), None
patent: 2 832 739 (2003-05-01), None
patent: WO-2007102898 (2007-09-01), None
patent: WO-2007102898 (2007-09-01), None
“International Application No. PCT/US2006/061165 Search Report”, (Oct. 25, 2007),2 pgs.
“International Application No. PCT/US2006/061165 Written Opinion”, (Oct. 25, 2007),5 pgs.
Wu, L. , et al., “CryptoManiac: A Fast Flexible Architecture for Secure Communication”,In 28th Annual International Symposium on Computer Architecture(ISCA'01), Retrived from the Internet: <URL:http://hpc.serc.iisc.ernet.in/-govind/TiCA-04/ISCA01-WuEtAl.pdf>,(2001),110-119.
Federal Information Processing Standards Publication, “Data Encryption Standard (DES)”, FIPS Pub 46-3, U.S. Dept. of Commerce, Oct. 25, 1999, 24 Pages.
Nist, “Recommendation for the Triple Data Encryption Algorithm (TDEA) Block Cipher”, Spec. Pub. 800-67, Version 1, May 2004, 39 Pages.
J. Kilian, P. Rogaway, “How to Protect DES Against Exhaustive Key Search”, Proceedings of Crypto 96, (DESX), Jul. 28, 1997, 19 Pages.
D. Page, F. Vercauteren, “Fault and Side-Channel Attacks on Pairing Based Cryptography”, 19 Pages.
Douguet Michel
Dupaquis Vincent
Atmel Rousset S.A.S.
Parthasarathy Pramila
Schwegman Lundberg & Woessner, P.A.
LandOfFree
Encryption protection method does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Encryption protection method, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Encryption protection method will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-4185948