Cryptography – Particular algorithmic function encoding – Public key
Reexamination Certificate
2002-04-11
2009-10-06
Sheikh, Ayaz R. (Department: 2431)
Cryptography
Particular algorithmic function encoding
Public key
C380S028000, C726S036000
Reexamination Certificate
active
07599491
ABSTRACT:
A method of inhibiting the disclosure of confidential information through power analysis attacks on processors in cryptographic systems. The method masks a cryptographic operation using a generator G. A secret value, which may be combined with the generator G to form a secret generator is generated. The secret value is divided into a plurality of parts. A random value is generated for association with the plurality of parts. Each of the plurality of parts is combined with the random value to derive a plurality of new values such that the new values when combined are equivalent to the secret value. Each of the new values is used in the cryptographic operation, thereby using the secret generator in place of the generator G in the cryptographic operation. The introduction of randomness facilitates the introduction of noise into algorithms used by cryptographic systems so as to mask the secret value and provide protection against power analysis attacks.
REFERENCES:
patent: 4519036 (1985-05-01), Green
patent: 5202995 (1993-04-01), O'Brien
patent: 5511198 (1996-04-01), Hotta
patent: 5524222 (1996-06-01), Hervin
patent: 5627893 (1997-05-01), Demytko
patent: 5650948 (1997-07-01), Gafter
patent: 5675645 (1997-10-01), Schwartz et al.
patent: 5757918 (1998-05-01), Hopkins
patent: 5764772 (1998-06-01), Kaufman et al.
patent: 5768389 (1998-06-01), Ishii
patent: 5778069 (1998-07-01), Thomlinson et al.
patent: 5825880 (1998-10-01), Sudia et al.
patent: 5892899 (1999-04-01), Aucsmith et al.
patent: 5937066 (1999-08-01), Gennaro et al.
patent: 6279110 (2001-08-01), Johnson et al.
patent: 6298135 (2001-10-01), Messerges et al.
patent: 6304658 (2001-10-01), Kocher et al.
patent: 6334189 (2001-12-01), Granger et al.
patent: 6411715 (2002-06-01), Liskov et al.
patent: 6419159 (2002-07-01), Odinak
patent: 6446207 (2002-09-01), Vanstone et al.
patent: 6496929 (2002-12-01), Lenstra
patent: 6724894 (2004-04-01), Singer
patent: 6873706 (2005-03-01), Miyazaki et al.
patent: 7421074 (2008-09-01), Jin et al.
patent: 2001/0053220 (2001-12-01), Kocher et al.
patent: 2002/0166058 (2002-11-01), Fueki
patent: 2003/0044003 (2003-03-01), Chari et al.
patent: 2003/0048903 (2003-03-01), Ito et al.
patent: 2003/0061498 (2003-03-01), Drexler et al.
patent: 2672402 (1992-08-01), None
patent: WO 98/00771 (1998-01-01), None
patent: WO 98/52319 (1998-11-01), None
patent: WO 00/42733 (2000-07-01), None
patent: WO 0042733 (2000-07-01), None
Johnson, Don, Menezes, Alfred, Vanstone, Scott, “The Elliptic Curve Digital Signature Algorithm (ECDSA)”, Certicom Corporation White Paper, 2001, pp. 25-26.
Kelsey, John, Schneier, Bruce, Wagner, David, Hall, Chris, “Side Channel Cryptanalysis of Product Ciphers,” Journal of Computer Security, 2000, pp. 141-158, vol. 8, No. 2-3, IOS Press, Amsterdam, The Netherlands.
Kocher, Paul C., “Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems,” Advances in Cryptology CRYPTO'96, Proceedings of the 16th Annual International Cryptology Conference, Aug. 18-22, 1996, vol. 1109, Springer.
Kocher, Paul, Jaffe, Joshua, Jun, Benjamin, “Differential Power Analysis,” Advances in Cryptology CRYPTO'99, Proceeding of the 19th Annual International Cryptology Conference, Aug. 1999, Springer-Verlag, Berlin, Germany.
Wharton, John; An introduction to the IntelIR MCS-s1 TM Single-Chip Microcomputer Family; Intel Application Note AP-69; May 1980; U.S.A.
Kocher, Paul; Jaffe, Joshua, Jun, Benjamin; “Introduction to Differential Power Attack Analysis and Related Attacks”; 1998; http://www.cryptography.com/dpa/technical.
Deitel, Harvey M.; Deitel, P.J.; C++ How to Program++; 1994; pp. 58-62; Prentice-Hall.
Shreih, Raghid; Examiner's Report issued in respect of Canadian Patent Application No. 2,259,089; Feb. 2, 2009; received by applicant's agent Feb. 9, 2009.
Blake Cassels & Graydon LLP
Certicom Corp.
Doan Trang
Orange John R. S.
Sheikh Ayaz R.
LandOfFree
Method for strengthening the implementation of ECDSA against... does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Method for strengthening the implementation of ECDSA against..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method for strengthening the implementation of ECDSA against... will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-4114188