Table masking for resistance to power analysis attacks

Cryptography – Particular algorithmic function encoding

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C380S042000, C380S044000, C380S268000, C713S162000, C713S168000, C713S190000

Reexamination Certificate

active

07848514

ABSTRACT:
Tables are defined to permit output masking for table look-ups to be carried out to resist power analysis attacks on cryptographic operations. A set of individually defined random values is used to mask each entry in a substitution table, defining a masked substitution table. A mask table is also defined such that the values of each entry, masked with the corresponding random value, is the value of a fixed mask. The masked substitution tables and the mask tables may be used in cryptographic operations to permit the output of table look-ups to be masked, without directly using the fixed mask value in the computations of the cryptographic operations.

REFERENCES:
patent: 5623548 (1997-04-01), Akiyama et al.
patent: 6278783 (2001-08-01), Kocher et al.
patent: 6295606 (2001-09-01), Messerges et al.
patent: 6658569 (2003-12-01), Patarin et al.
patent: 2003/0048903 (2003-03-01), Ito et al.
patent: 2004/0028224 (2004-02-01), Liardet et al.
patent: 2004/0071288 (2004-04-01), Romain et al.
patent: 0 981 223 (2000-02-01), None
patent: 1 267 514 (2002-12-01), None
Golic et al Multiplicative Masking and Power Analysis of AES, Oct. 30-31, 2001, CHES 2202, LNCS 2523, pp. 198-212.
Itoh et al , DPA Countermeasure Based on the“Masking Method”,ICICS 2001, LNCS 2288, pp. 440-456, 2002.
Kouichi Itoh, Masahiko Takenaka, and Naoya Torii, DPA Contermeasure Based on the “Masking Method”, Springer-Verlag Berlin Heidelberg, ICICS 2001 LNCS 2288, pp. 440-456, 2002, Springer-Verlag Berlin Heidelberg 2002.
(Mehdi-Laurent Akkar and Christophe Giraud, An Implementation of DES and AES, Secure against Some Attacks, CHES 2001, LNCS 2162, pp. 309-318, 2001, Springer-Verlag Berlin Heidelberg 2001.
Kocher et al., “Differential Power Analysis” CRYPTO'99, Lecture Notes in Computer Science, 1666, p. 388-397, Springer-Verlag 1999.
Messerges, “Securing the AES Finalists Against Power Analysis Attacks”, FSE 2000, Lecture Notes in Computer Science, 1978, p. 150-164, Springer-Verlag 2001.
Itoh et al., “DPA Countermeasure Based on the ‘Masking Method’”, ICICS 2001, Lecture Notes in Computer Science, 2288, p. 440-456, Springer-Verlag 2001.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Table masking for resistance to power analysis attacks does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Table masking for resistance to power analysis attacks, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Table masking for resistance to power analysis attacks will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-4185052

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.