Electrical computers and digital processing systems: support – Data processing protection using cryptography
Reexamination Certificate
2005-05-11
2011-12-06
Srivastava, Vivek (Department: 2433)
Electrical computers and digital processing systems: support
Data processing protection using cryptography
C380S263000, C380S277000, C380S286000
Reexamination Certificate
active
08074076
ABSTRACT:
This invention relates to a method to protect an assembly implementing a cryptographic calculation process which uses a homographic function f of type:in-line-formulae description="In-line Formulae" end="lead"?f(z)=(az+b)/(cz+d) when (cz+d) is not equal to 0 andin-line-formulae description="In-line Formulae" end="tail"?in-line-formulae description="In-line Formulae" end="lead"?f(−d/c)=a/cin-line-formulae description="In-line Formulae" end="tail"?the function f operating on masked variables, wherein, for any k, if x is an input and y=f(x+k) is an output of the function f, to pass directly from a masked value x+m_i (additive masking of type XOR) to a masked value y+m_j, the method consists in comprises of performing this operation using a composition of several transformations operating on GF(2^k) with addition of the infinite, defined as (ax+b)/(cx+d), and of transformations which exchange two points.
REFERENCES:
patent: 2004/0168063 (2004-08-01), Revital et al.
patent: 2006/0193471 (2006-08-01), Stehle
Elena Trichina et al., “Simplified Adaptive Multiplicative Masking for AES”, CHES 2002, LNCS 2523, pp. 187-197, 2003.
Hughes at el., “Admissible Digit Sets and a Modified Stern-Brocot Representation”, pp. 11-19, http://phiwumbda.org/˜jesse/papers/NIII-R0401.pdf, Feb. 2004.
Sanchez-Avila et al., “The Rijndael Block Cipher (AES Proposal): A Comparison with DES”, pp. 229-234, IEEE, 2001.
Trichina E et al: “Simplified Adaptive Multiplicative Masking for AES” Lecture Notes in Computer Science, Springer Verlag, New York, NY, US, vol. 2523, 2002, pp. 187-197, XP001176599 ISSN: 0302-9743 abstract.
Golic J et al: “Multiplicative Masking and Power Analysis of AES” Cryptographic Hardware and Embedded Systems (CHES 2002), Aug. 13, 2002-Aug. 15, 2002 pp. 198-212, XP002344149 Berlin Heidelberg the whole document.
Oswald E et al: “Secure and Efficient Masking of AES- A Mission Impossible? (version 1.0)” SCA-Lab Technical Report Series, Jun. 4, 2004, XP002315432 p. 1-p. 6.
Courtois N et al: An Algebraic Masking Methof to Protect AES Agaist Power Attacks, ‘Online! XP002344150 Retrieved from the Internet: URL:eprint.iacr.org/20051204.pdf> ’retrieved on Sep. 8, 2005!.
Gemalto SA
Jansson Pehr B.
Song Hee
Srivastava Vivek
The Jansson Firm
LandOfFree
Method to protect a cryptographic assembly by homographic... does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Method to protect a cryptographic assembly by homographic..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method to protect a cryptographic assembly by homographic... will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-4263248