US20010002486A1  Leakresistant cryptographic method and apparatus  Google Patents
Leakresistant cryptographic method and apparatus Download PDFInfo
 Publication number
 US20010002486A1 US20010002486A1 US09737182 US73718200A US2001002486A1 US 20010002486 A1 US20010002486 A1 US 20010002486A1 US 09737182 US09737182 US 09737182 US 73718200 A US73718200 A US 73718200A US 2001002486 A1 US2001002486 A1 US 2001002486A1
 Authority
 US
 Grant status
 Application
 Patent type
 Prior art keywords
 key
 mod
 leak
 information
 cryptographic
 Prior art date
 Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
 Granted
Links
Images
Classifications

 H—ELECTRICITY
 H04—ELECTRIC COMMUNICATION TECHNIQUE
 H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
 H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
 H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, nonrepudiation, key authentication or verification of credentials
 H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, nonrepudiation, key authentication or verification of credentials involving digital signatures

 G—PHYSICS
 G06—COMPUTING; CALCULATING; COUNTING
 G06F—ELECTRIC DIGITAL DATA PROCESSING
 G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
 G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
 G06F21/55—Detecting local intrusion or implementing countermeasures
 G06F21/556—Detecting local intrusion or implementing countermeasures involving covert channels, i.e. data leakage between processes

 G—PHYSICS
 G06—COMPUTING; CALCULATING; COUNTING
 G06F—ELECTRIC DIGITAL DATA PROCESSING
 G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
 G06F21/60—Protecting data
 G06F21/602—Providing cryptographic facilities or services

 G—PHYSICS
 G06—COMPUTING; CALCULATING; COUNTING
 G06F—ELECTRIC DIGITAL DATA PROCESSING
 G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
 G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
 G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
 G06F21/75—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information by inhibiting the analysis of circuitry or operation
 G06F21/755—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information by inhibiting the analysis of circuitry or operation with measures against power attack

 G—PHYSICS
 G06—COMPUTING; CALCULATING; COUNTING
 G06F—ELECTRIC DIGITAL DATA PROCESSING
 G06F7/00—Methods or arrangements for processing data by operating upon the order or content of the data handled
 G06F7/60—Methods or arrangements for performing computations using a digital nondenominational number representation, i.e. number representation without radix; Computing devices using combinations of denominational and nondenominational quantity representations, e.g. using difunction pulse trains, STEELE computers, phase computers
 G06F7/72—Methods or arrangements for performing computations using a digital nondenominational number representation, i.e. number representation without radix; Computing devices using combinations of denominational and nondenominational quantity representations, e.g. using difunction pulse trains, STEELE computers, phase computers using residue arithmetic
 G06F7/723—Modular exponentiation

 G—PHYSICS
 G06—COMPUTING; CALCULATING; COUNTING
 G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
 G06Q20/00—Payment architectures, schemes or protocols
 G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices
 G06Q20/36—Payment architectures, schemes or protocols characterised by the use of specific devices using electronic wallets or electronic money safes
 G06Q20/367—Payment architectures, schemes or protocols characterised by the use of specific devices using electronic wallets or electronic money safes involving intelligent token, e.g. electronic purse

 G—PHYSICS
 G06—COMPUTING; CALCULATING; COUNTING
 G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
 G06Q20/00—Payment architectures, schemes or protocols
 G06Q20/38—Payment protocols; Details thereof
 G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
 G06Q20/401—Transaction verification

 H—ELECTRICITY
 H04—ELECTRIC COMMUNICATION TECHNIQUE
 H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
 H04L63/00—Network architectures or network communication protocols for network security
 H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
 H04L63/1441—Countermeasures against malicious traffic

 H—ELECTRICITY
 H04—ELECTRIC COMMUNICATION TECHNIQUE
 H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
 H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
 H04L9/002—Countermeasures against attacks on cryptographic mechanisms

 H—ELECTRICITY
 H04—ELECTRIC COMMUNICATION TECHNIQUE
 H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
 H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
 H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
 H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
 H04L9/0838—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
 H04L9/0841—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving DiffieHellman or related key agreement protocols

 H—ELECTRICITY
 H04—ELECTRIC COMMUNICATION TECHNIQUE
 H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
 H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
 H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
 H04L9/0891—Revocation or update of secret information, e.g. encryption key update or rekeying

 H—ELECTRICITY
 H04—ELECTRIC COMMUNICATION TECHNIQUE
 H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
 H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
 H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
 H04L9/3006—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or publickey parameters
 H04L9/3013—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or publickey parameters involving the discrete logarithm problem, e.g. ElGamal or DiffieHellman systems

 H—ELECTRICITY
 H04—ELECTRIC COMMUNICATION TECHNIQUE
 H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
 H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
 H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
 H04L9/3006—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or publickey parameters
 H04L9/302—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or publickey parameters involving the integer factorization problem, e.g. RSA or quadratic sieve [QS] schemes

 G—PHYSICS
 G06—COMPUTING; CALCULATING; COUNTING
 G06F—ELECTRIC DIGITAL DATA PROCESSING
 G06F2207/00—Indexing scheme relating to methods or arrangements for processing data by operating upon the order or content of the data handled
 G06F2207/72—Indexing scheme relating to groups G06F7/72  G06F7/729
 G06F2207/7219—Countermeasures against side channel or fault attacks

 G—PHYSICS
 G06—COMPUTING; CALCULATING; COUNTING
 G06F—ELECTRIC DIGITAL DATA PROCESSING
 G06F2207/00—Indexing scheme relating to methods or arrangements for processing data by operating upon the order or content of the data handled
 G06F2207/72—Indexing scheme relating to groups G06F7/72  G06F7/729
 G06F2207/7219—Countermeasures against side channel or fault attacks
 G06F2207/7223—Randomisation as countermeasure against side channel attacks
 G06F2207/7257—Random modification not requiring correction

 H—ELECTRICITY
 H04—ELECTRIC COMMUNICATION TECHNIQUE
 H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
 H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
 H04L2209/56—Financial cryptography, e.g. electronic payment or ecash
Abstract
The present invention provides a method and apparatus for securing cryptographic devices against attacks involving external monitoring and analysis. A “selfhealing” property is introduced, enabling security to be continually reestablished following partial compromises. In addition to producing useful cryptographic results, a typical leakresistant cryptographic operation modifies or updates secret key material in a manner designed to render useless any information about the secrets that may have previously leaked from the system. Exemplary leakproof and leakresistant implementations of the invention are shown for symmetric authentication, certified DiffieHellman (when either one or both users have certificates), RSA, ElGamal public key decryption, ElGamal digital signing, and the Digital Signature Algorithm.
Description
 [0001]This application claims the benefit of U.S. Provisional application Ser. No. 60/070,344 filed Jan. 2, 1998, and U.S. Provisional application Ser. No. 60/089,529 filed June 15, 1998.
 [0002]The method and apparatus of the present invention relate generally to cryptographic systems and, more specifically, to securing cryptographic tokens that must maintain the security of secret information in hostile environments.
 [0003]Most cryptosystems require secure key management. In publickey based security systems, private keys must be protected so that attackers cannot use the keys to forge digital signatures, modify data, or decrypt sensitive information. Systems employing symmetric cryptography similarly require that keys be kept secret. Welldesigned cryptographic algorithms and protocols should prevent attackers who eavesdrop on communications from breaking systems. However, cryptographic algorithms and protocols traditionally require that tamperresistant hardware or other implementationspecific measures prevent attackers from accessing or finding the keys.
 [0004]If the cryptosystem designer can safely assume that the key management system is completely tamperproof and will not reveal any information relating to the keys except via the messages and operations defined in the protocol, then previously known cryptographic techniques are often sufficient for good security. It is currently extremely difficult, however, to make hardware key management systems that provide good security, particularly in lowcost unshielded cryptographic devices for use in applications where attackers will have physical control over the device. For example, cryptographic tokens (such as smartcards used in electronic cash and copy protection schemes) must protect their keys even in potentially hostile environments. (A token is a device that contains or manipulates cryptographic keys that need to be protected from attackers. Forms in which tokens may be manufactured include, without limitation, smartcards, specialized encryption and key management devices, secure telephones, secure picture phones, secure web servers, consumer electronics devices using cryptography, secure microprocessors, and other tamperresistant cryptographic systems.)
 [0005]A variety of physical techniques for protecting cryptographic devices are known, including enclosing key management systems in physically durable enclosures, coating integrated circuits with special coatings that destroy the chip when removed, and wrapping devices with fine wires that detect tampering. However, these approaches are expensive, difficult to use in singlechip solutions (such as smartcards), and difficult to evaluate since there is no mathematical basis for their security. Physical tamper resistance techniques are also ineffective against some attacks. For example, recent work by Cryptography Research has shown that attackers can noninvasively extract secret keys using careful measurement and analysis of many devices' power consumption. Analysis of timing measurements or electromagnetic radiation can also be used to find secret keys.
 [0006]Some techniques for hindering external monitoring of cryptographic secrets are known, such as using power supplies with large capacitors to mask fluctuations in power consumption, enclosing devices in wellshielded cases to prevent electromagnetic radiation, message blinding to prevent timing attacks, and buffering of inputs/outputs to prevent signals from leaking out on I/O lines. Shielding, introduction of noise, and other such countermeasures are often, however, of limited value, since skilled attackers can still find keys by amplifying signals and filtering out noise by averaging data collected from many operations. Further, in smartcards and other tamperresistant chips, these countermeasures are often inapplicable or insufficient due to reliance on external power sources, impracticality of shielding, and other physical constraints. The use of blinding and constanttime mathematical algorithms to prevent timing attacks is also known, but does not prevent more complex attacks such as power consumption analysis (particularly if the system designer cannot perfectly predict what information will be available to an attacker, as is often the case before a device has been physically manufactured and characterized).
 [0007]The present invention makes use of previouslyknown cryptographic primitives and operations. For example: U.S. Pat. 5,136,646 to Haber et al. and the pseudorandom number generator used in the RSAREF cryptographic library use repeated application of hash functions; anonymous digital cash schemes use blinding techniques; zero knowledge protocols use hash functions to mask information; and key splitting and threshold schemes store secrets in multiple parts.
 [0008]The present invention introduces leakproof and leakresistant cryptography, mathematical approaches to tamper resistance that support many existing cryptographic primitives, are inexpensive, can be implemented on existing hardware (whether by itself or via software capable of running on such hardware), and can solve problems involving secrets leaking out of cryptographic devices. Rather than assuming that physical devices will provide perfect security, leakproof and leakresistant cryptographic systems may be designed to remain secure even if attackers are able to gather some information about the system and its secrets. This invention describes leakproof and leakresistant systems that implement symmetric authentication, DiffieHellman exponential key agreement, ElGamal public key encryption, ElGamal signatures, the Digital Signature Standard, RSA, and other algorithms.
 [0009]One of the characteristic attributes of a typical leakproof or leakresistant cryptosystem is that it is “selfhealing” such that the value of information leaked to an attacker decreases or vanishes with time. Leakproof cryptosystems are able to withstand leaks of up to L_{MAX }bits of information per transaction, where L_{MAX }is a security factor chosen by the system designer to exceed to the maximum anticipated leak rate. The more general class of leakresistant cryptosystems includes leakproof cryptosystems, and others that can withstand leaks but are not necessarily defined to withstand any defined maximum information leakage rate. Therefore, any leakproof system shall also be understood to be leakresistant. The leakresistant systems of the present invention can survive a variety of monitoring and eavesdropping attacks that would break traditional (nonleakresistant) cryptosystems.
 [0010]A typical leakresistant cryptosystem of the present invention consists of three general parts. The initialization or key generation step produces secure keying material appropriate for the scheme. The update process cryptographically modifies the secret key material in a manner designed to render useless any information about the secrets that may have previously leaked from the system, thus providing security advantages over systems of the background art. The final process performs cryptographic operations, such as producing digital signatures or decrypting messages.
 [0011][0011]FIG. 1 shows an exemplary leakresistant symmetric authentication method.
 [0012][0012]FIG. 2 shows an exemplary leakresistant DiffieHellman exponential key exchange operation.
 [0013][0013]FIG. 3 shows an exemplary leakresistant RSA private key operation.
 [0014][0014]FIG. 4 shows an exemplary leakresistant ElGamal signing operation.
 [0015]The sections following will describe an introduction to leakproof/leakresistant cryptography, followed by various embodiments of the general techniques of the invention as applied to improve the security of common cryptographic protocols.
 [0016]I. Introduction and Terminology
 [0017]The leakage rate L is defined as the number of bits of useful information about a cryptosystem's secrets that are revealed per operation, where an operation is a cryptographic transaction. Although an attacker may be able to collect more than L bits worth of measurement data, by definition this data yields no more than L bits of useful information about the system's secrets.
 [0018]The implementer of a leakproof system chooses a design parameter L_{MAX}, the maximum amount of leakage per operation the system may allow if it is to remain uncompromised. L_{MAX }should be chosen conservatively, and normally should significantly exceed the amount of useful information known to be leaked to attackers about the system's secrets during each transaction. Designers do not necessarily need to know accurately or completely the quantity and type of information that may leak from their systems; the choice of L_{MAX }may be made using estimates and models for the system's behavior. General factors affecting the choice of L_{MAX }include the types of monitoring potentially available to attackers, the amount of error in attacker3 measurements, and engineering constraints that limit L_{MAX}. (Larger values of L_{MAX }increase memory and performance requirements of the device, and in some cases may increase L.) To estimate the amount of useful information an attacker could collect by monitoring a device's power consumption, for example, a designer might consider the amount of noise in the device's power usage, the power line capacitance, the useful time resolution for power consumption measurements, as well as the strength of the signals being monitored. Similarly, the designer knows that timing measurements can rarely yield more than a few bits of information per operation, since timing information is normally quantized to an integral number of clock cycles. In choosing L_{MAX}, the designer should assume that attackers will be able to combine information gleaned from multiple types of attacks. If the leakage rate is too large (as in the extreme case where L equals the key size because the entire key can be extracted during a single transaction), additional design features should be added to reduce L and reduce the value needed for L_{MAX}. Such additional measures can include known methods, such as filtering the device's power inputs, adding shielding, introducing noise into the timing or power consumption, implementing constanttime and constant execution path algorithms, and changing the device layout. Again, note that the designer of a leakresistant system does not actually need to know what information is being revealed or how it is leaked; all he or she need do is choose an upper bound for the rate at which attackers might learn information about the keys. In contrast, the designer of a traditional system faces the much harder task of ensuring that no information about the secrets will leak out.
 [0019]There are many ways information about secrets can leak from cryptosystems. For example, an attacker can use a highspeed analogtodigital converter to record a smartcard's power consumption during a cryptographic operation. The amount of useful information that can be gained from such a measurement varies, but it would be fairly typical to gain enough information to guess each of 128 key bits correctly with a probability of 0.7. This information can reduce the amount of effort required for a brute force attack. For example, a brute force attack with one message against a key containing k bits where each bit's value is known with probability p can be completed in
$E\ue8a0\left(k,p\right)=\sum _{i=0}^{k}\ue89e\text{\hspace{1em}}\ue89e\left[\left(\begin{array}{c}k\\ i\end{array}\right)\ue89e{\left(1p\right)}^{i}\ue89e{p}^{ki}\ue8a0\left[\left(\sum _{j=0}^{i}\ue89e\text{\hspace{1em}}\ue89e\left(\begin{array}{c}k\\ j\end{array}\right)\right)\frac{1}{2}\ue89e\left(\begin{array}{c}k\\ i\end{array}\right)\right]+\frac{1}{2}\right]$  [0020]operations. The reduction in the effort for a brute force attack is equivalent to shortening the key by L=log_{2}(E(k,{fraction (1/2)})/E(k,p))=log_{2}(k−E(k,p)−1) bits. (For example, in the case of k=128 and p=0.7, L is estimated to be about 11 bits for the first measurement. With a multiple message attack, the attacker's effort can fall to as low as
$E\ue8a0\left(k,p\right)=\frac{1}{{p}^{k}}.)$  [0021]Attackers can gain additional information about the keys by measuring additional operations; unless leakresistance is used, finding the key becomes easy after just a few dozen operations.
 [0022]When choosing L_{MAX, }a system designer should consider the signaltonoise ratio of an attacker's measurements. For example, if the signal and noise are of roughly equivalent magnitude, the designer knows that an attacker's measurements should be incorrect about 25 percent of the time (e.g., p=0.75 if only one observation per key bit is possible). Many measurement techniques, such as those involving timing, may have signaltonoise ratios of 1:100 or worse. With such systems, L is generally quite small, but attackers who can make a large number of measurements can use averaging or other statistical techniques to recover the entire key. In extreme cases, attackers may be able to obtain all key bits with virtually perfect accuracy from a single transaction (i.e., L=k), necessitating the addition of shielding, noise in the power consumption (or elsewhere), and other measures to reduce p and L. Of course, L_{MAX }should be chosen conservatively; in the example above where less than 4 useful bits are obtained per operation for the given attack, the designer might select L_{MAX }=64 for a leakproof design.
 [0023]Leakproof (and, more generally, leakresistant) cryptosystems provide system designers with important advantages. When designing a traditional (i.e., nonleakresistant and nonleakproof) cryptosystem, a careful cryptosystem designer should study all possible information available to attackers if he or she is to ensure that no analytical techniques could be used to compromise the keys. In practice, many insecure systems are developed and deployed because such analysis is incomplete, too difficult even to attempt, or because the cryptographers working on the system do not understand or cannot completely control the physical characteristics of the device they are designing. Unexpected manufacturing defects or process changes, alterations made to the product by attackers, or modifications made to the product in the field can also introduce problems. Even a system designed and analyzed with great care can be broken if new or improved data collection and analysis techniques are found later. In contrast, with leakproof cryptography, the system designer only needs to define an upper bound on the maximum rate at which attackers can extract information about the keys. A detailed understanding of the information available to attackers is not required, since leakproof (and leakresistant) cryptosystem designs allow for secret information in the device to leak out in (virtually) any way, yet remain secure despite this because leaked information is only of momentary value.
 [0024]In a typical leakproof design, with each new cryptographic operation i, the attacker is assumed to be able to choose any function F_{i }and determine the L_{MAX}bit result of computing F_{i }on the device's secrets, inputs, intermediates, and outputs over the course of the operation. The attacker is even allowed to choose a new function F_{i }with each new operation. The system may be considered leakproof with a security factor n and leak rate L_{MAX }if, after observing a large number of operations, an attacker cannot forge signatures, decrypt data, or perform other sensitive operations without performing an exhaustive search to find an nbit key or performing a comparable O(2^{n}) operation. In addition to choosing L_{MAX}, designers also choose n, and should select a value large enough to make exhaustive search infeasible. In the sections that follow, various embodiments of the invention, as applied to improve the security of common cryptographic operations and protocols, will be described in more detail.
 [0025]II. Symmetric Cryptographic Protocols
 [0026]A. Symmetric Authentication
 [0027]An exemplary cryptographic protocol that can be secured using the techniques of the present invention is symmetric authentication.
 [0028]1. Conventional Symmetric Authentication
 [0029]Assume a user wishes to authenticate herself to a server using an nbit secret key, K, known to both the server and the user's cryptographic token, but not known to attackers. The cryptographic token should be able to resist tampering to prevent, for example, attackers from being able to extract secrets from a stolen token. If the user's token has perfect tamper resistance (i.e., L=0), authentication protocols of the background art can be used. Typically the server sends a unique, unpredictable challenge value R to the user's token, which computes the value A=H(RK), where “” denotes concatenation and H is a oneway cryptographic hash function such as SHA. The user sends A to the server, which independently computes A (using its copy of K) and compares its result with the received value. The user authentication succeeds only if the comparison operation indicates a match.
 [0030]If the function H is secure and if K is sufficiently large to prevent brute force attacks, attackers should not be able to obtain any useful information from the (R,A) values of old authentication sessions. To ensure that attackers cannot impersonate users by replaying old values of A, the server generates values of R that are effectively (with sufficiently high probability) unique. In most cases, the server should also make R unpredictable to ensure that an attacker with temporary possession of a token cannot compute future values of A. For example, R might be a 128bit number produced using a secure random number generator (or pseudorandom number generator) in the server. The properties of cryptographic hash functions such as H have been the subject of considerable discussion in the literature, and need not be described in detail here. Hash functions typically provide functionality modeled after a random oracle, deterministically producing a particular output from any input. Ideally, such functions should be collisionresistant, noninvertable, should not leak partial information about the input from the output, and should not leak information about the output unless the entire input is known. Hash functions can have any output size. For example, MD5 produces 128bit outputs and SHA produces 160bit outputs. Hash functions may be constructed from other cryptographic primitives or other hash functions.
 [0031]While the cryptographic security of the protocol using technology of the background art may be good, it is not leakproof; even a onebit leak function (with L=1) can reveal the key. For example, if the leak function F equals bit (R mod n) of K, an attacker can break the system quickly since a new key bit is revealed with every transaction where (R mod n) has a new value. Therefore, there is a need for a leakproof/leakresistant symmetric authentication protocol.
 [0032]2. LeakResistant Symmetric Authentication
 [0033]The following is one embodiment of a leakresistant (and, in fact, also leakproof) symmetric authentication protocol, described in the context of a maximum leakage rate of L_{MAX }bits per transaction from the token and a security factor n, meaning that attacks of complexity O(2^{n}), such as bruteforce attacks against an nbit key, are acceptable, but there should not be significantly easier attacks. The user's token maintains a counter t, which is initialized to zero, and an (n+2L_{MAX})bit shared secret K_{t}, which is initialized with a secret K_{0}. Note that against adversaries performing precomputation attacks based on Hellman's time/memory tradeoff, larger values of n may be in order. Note also that some useful protocol security features, such as user and/or server identifiers in the hash operation inputs, have been omitted for simplicity in the protocol description. It is also assumed that no leaking will occur from the server. For simplicity in the protocol description, some possible security features (such as user and/or server identifiers in the hash operation inputs) have been omitted, and it is assumed that the server is in a physically secure environment. However, those skilled in the art will appreciate that the invention is not limited to such assumptions, which have been made as a matter of convenience rather than necessity.
 [0034]As in the traditional protocol, the server begins the authentication process by generating a unique and unpredictable value R at step 105. For example, R might be a 128bit output from a secure random number generator. At step 110, the server sends R to the user's token. At step 112, the token receives R. At step 115, the token increments its counter t by computing t ←t+1. At step 120, the token updates K_{t }by computing K_{t }←H_{K}(t K_{t}), where H_{K }is a cryptographic hash finction that produces an (n+2L_{MAX}) bit output from the old value of K_{t }and the (newly incremented) value of t. Note that in the replacement operations (denoted “←”), the token deletes the old values of t and K_{t}, replacing them with the new values. By deleting the old K_{t}, the token ensures that future leak functions cannot reveal information about the old (deleted) value. At step 122, the token uses the new values of t and K_{t }to compute an authenticator A=H_{A}(K_{t}tR). At step 125, the token sends both t and the authenticator A to the server, which receives them at step 130. At step 135, the server verifies that t is acceptable (e.g., not too large but larger than the value received in the last successful authentication). If t is invalid, the server proceeds to step 175. Otherwise, at step 140, the server initializes its loop counter i to zero and its key register K_{t}′ to K_{0}. At step 145, the server compares i with the received value of t, proceeding to step 160 if they are equal. Otherwise, at step 150, the server increments i by computing i←i+1. At step 155, the server computes K_{t}′←H_{K}(iK_{t}), then proceeds back to step 145. At step 160, the server computes A′=H_{A}(K_{t′}tR). Finally, at step 165, the server compares A and A′, where the authentication succeeds at step 170 if they match, or fails at 175 if they do not match.
 [0035]This design assumes that at the beginning of any transaction the attacker may have L_{MAX }bits of useful information about the state of the token (e.g., K_{t}) that were obtained using the leak function F in a previous operation. During the transaction, the attacker can gain an additional L_{MAX }bits of useful information from the token. If, at any time, any 2L_{MAX }(or fewer) bits of useful information about the secret are known to the attacker, there are still (n+2L_{MAX})−2L_{MAX}=n or more unknown bits. These n bits of unknown information ensure that attacks will require O(2^{n}) effort, corresponding to the desired security factor. However, the attacker should have no more than L_{MAX }bits of useful information about K_{t }at the end of the transaction. The property that attackers lose useful information during normal operation of the system is a characteristic of the leakproof or leakresistant cryptosystem. In general, this information loss is achieved when the cryptosystem performs operations that convert attackers' useful partial information about the secret into useless information. (Information is considered useless if it gives an attacker nothing better than the ability to test candidate values in an O(2^{n}) exhaustive search or other “hard” operation. For example, if exhaustive search of X is hard and H is a good hash function, H(X) is useless information to an attacker trying to find X.)
 [0036]Thus, the attacker is assumed to begin with L_{MAX }bits of useful information about K_{t }before the token's K_{t}←H_{K}(tK_{t}) computation. (Initial information about anything other than K_{t }is of no value to an attacker because K_{t }is the only secret value in the token. The function H_{K }and the value of t are not assumed to be secret.) The attacker's information can be any function of K_{t }produced from the previous operation's leaks.
 [0037]3. Security Characteristics of LeakProof Systems
 [0038]The following section provides a technical discussion of the security characteristics of the exemplary leakproof system described above. The following analysis is provided as an example of how the design can be analyzed, and how a system may be designed using general assumptions about attackers' capabilities. The discussion and assumptions do not necessarily apply to other embodiments of the invention and should not be construed as limiting the scope or applicability of the invention in any way.
 [0039]During the course of a transaction, the leak function F might reveal up to L_{MAX }information about the system and its secrets. The design assumed that any information contained in the system may be leaked by F, provided that F does not reveal useful new information about values of K_{t }that were deleted before the operation started, and F does not reveal useful information about values of K_{t }that will be computed in future operations. These constraints are completely reasonable, since realworld leaks would not reveal information about deleted or notyetexistent data. (The only way information about future K_{t }values could be leaked would be the bizarre case where the leak function itself included, or was somehow derived from, the function H_{K}.) In practice, these constraints on F are academic and of little concern, but they are relevant when constructing proofs to demonstrate the security of a leakproof system.
 [0040]If the leak occurs at the beginning of the H_{K }computation, it could give the attacker up to 2L_{MAX }bits of useful information about the input value of K_{t}. Because K_{t }contains (2L_{MAX}+n) bits of secret information and the attacker may have up to 2L_{MAX }bits of useful information about the initial value of K_{t}, there remain at least (2L_{MAX}+n)−2L_{MAX}=n bits of information in K_{t }that are secret. The hash function H_{K }effectively mixes up these n bits to produce a secure new K_{t }during each transaction such that the attacker's information about the old K_{t }is no longer useful.
 [0041]If the leak occurs at the end of the H_{K }computation, it could give an attacker up to L_{MAX }bits of information about the final value of H_{K}, yielding L_{MAX }bits of information about the input to the subsequent transaction. This is not a problem, since the design assumes that attackers have up to L_{MAX }bits of information about K_{t }at the beginning of each transaction.
 [0042]A third possibility is that the attacker's L_{MAX }bits of information might describe intermediates computed during the operation H_{K}. However, even if the attacker could obtain L_{MAX }new bits of information about the input to H_{K }and also L_{MAX }bits of information about the output from H_{K}, the system would be secure, since the attacker would never have more than 2L_{MAX }bits of information about the input K_{t }or more than L_{MAX }bits of information about the output K_{t}. Provided that L_{MAX }bits of information from within H_{K }cannot reveal more than L_{MAX }bits of information about the input, or more than L_{MAX }bits of information about the output, the system will be secure. This will be true unless H_{K }somehow compresses the input to form a short intermediate which is expanded to form the output. While hash functions whose internal states are smaller than their outputs should not be used, most cryptographic hash functions are fine.
 [0043]A fourth possibility is that part or all of the leak could occur during the A=H_{A}(K_{t}tR) calculation. The attacker's total “budget” for observations is L_{MAX }bits. If L_{1 }bits of leak occur during the H_{K }computation, an additional L_{2 }bits of information can leak during the A=H_{A}(K_{tR) operation, where L} _{2<L} _{MAX}−L_{1. }If the second leak provides information about K_{t}, this is no different from leaking information about the result of the H_{K }computation; the attacker will still conclude the transaction with no more than L_{MAX }bits of information about K_{t }because L_{1 }+L_{2}<L_{MAX}. However, the second leak could reveal information about A. To keep A secure against leaks (to prevent, for example, an attacker from using a leak to capture A and using A before the legitimate user can), the size of A should include an extra L_{MAX }bits (to provide security even if L_{2}=L_{MAX}). Like H_{K}, H_{A }should not leak information about deleted or future values of K_{t }that are not used in or produced by the given operation. As with the similar assumptions on leaks from H_{K}, this limitation is primarily academic and of little practical concern, since realworld leak functions do not reveal information about deleted or notyetcomputed data. However, designers might be cautious when using unusual designs for H_{A }that are based on or derived from H_{K}, particularly if the operation H_{A}(K_{t}tR) could reveal useful information about the result of computing H_{K}(tK_{t}).
 [0044]B. Other LeakResistant Symmetric Schemes
 [0045]The same basic technique of updating a key (K) with each transaction, such that leakage about a key during one transaction does not reveal useful information about a key in a subsequent (or past) transaction, can be easily extended to other applications besides authentication.
 [0046]1. Symmetric Data Verification
 [0047]For example and without limitation, leakresistant symmetric data verification is often useful where a device needs to support symmetricallysigned code, data, content, or parameter updates (all of which will, as a matter of convenience, be denoted as “data” herein). In existing systems, a hash or MAC of the data is typically computed using a secret key and the data is rejected if computed hash or MAC does not match a value received with the data. For example, a MAC may be computed as HMAC(K,data), where HMAC is defined in “RFC 2104, HMAC:KeyedHashing for Message Authentication” by H. Krawczyk, M. Bellare, and R. Canetti, 1997. Traditional (nonleakresistant) designs are often vulnerable to attacks including power consumption analysis of MAC finctions and timing analysis of comparison operations.
 [0048]In an exemplary leakresistant verification protocol, a verifying device (the “verifier”) maintains a counter t and a key K_{t}, which are initialized (for example at the factory) with t←0 and K_{t}←K_{0}. Before the transaction, the verifier provides t to the device providing the signed data (the “signer”), which also knows K_{0}. The signer uses t to compute K_{t+1}′ (the prime indicating a quantity derived by the signer, rather than at the verifier) from K_{0 }(or K_{t}′ or any other available value of K_{i}′). using the relation K_{i}′=H_{K}(iK_{i−1}′), computes signature S′=HMAC(K_{t+} 1′, data), and sends S′ plus any other needed information (such as data or t) to the verifier. The verifier confirms that the received value of t (if any) matches its value of t, and rejects the signature if it does not. If t matches, the verifier increments t and updates K_{t }in its nonvolatile memory by computing t←t+1 and K_{t}←H_{K}(tK_{t}). In an alternative embodiment, if the received value of t is larger than the internal value but the difference is not unreasonably large, it may be more appropriate to accept the signature and perform multiple updates to K_{t }(to catch up with the signer) instead of rejecting the signature outright. Finally, the verifier computes S=HMAC(K_{t}, data) and verifies that S=S′, rejecting the signature if S does not equal the value of S′ received with the data.
 [0049]2. Symmetric Encryption
 [0050]Besides authentication and verification, leakresistant symmetric cryptography can also be tailored to a wide variety of applications and environments. For example, if data encryption is desired instead of authentication, the same techniques as were disclosed above may be used to generate a key K_{t }used for encryption rather than verification.
 [0051]3. Variations in Computational Implementation
 [0052]In the foregoing, various applications were disclosed for the basic technique of updating a key K_{t }in accordance with a counter and deleting old key values to ensure that future leakage cannot reveal information about the nowdeleted key. Those skilled in the art will realize, however, that the exemplary techniques described above may be modified in various ways without departing from the spirit and scope of the invention. For example, if communications between the device and the server are unreliable (for example if the server uses voice recognition or manual input to receive t and A), then small errors in the signature may be ignored. (One skilled in the art will appreciate that many functions may be used to determine whether a signature corresponds—sufficiently closely—to its expected value.) In another variation of the basic technique, the order of operations and of data values may be adjusted, or additional steps and parameters may be added, without significantly changing the invention. In another variation, to save on communication bandwidth or memory, the high order bits or digits of t may not need to be communicated or remembered. In another variation, as a performance optimization, devices need not recompute K_{t }from K_{0 }with each new transaction. For example, when a transaction succeeds, the server can discard K_{0 }and maintain the validated version of K_{t}. In another variation, if bidirectional authentication is required, the protocol can include a step whereby the server can authenticates itself to the user (or user's token) after the user's authentication is complete. In another variation, if the server needs to be secured against leaks as well (as in the case where the role of “server” is played by an ordinary user), it can maintain its own counter t. In each transaction, the parties agree to use the larger of their two t values, where the device with the smaller t value performs extra updates to K_{t }to synchronize t. In an alternate embodiment for devices that contain a clock and a reliable power source (e.g., battery), the update operation may be performed periodically, for example by computing K_{t}←H_{K}(tK_{t}) once per second. The token uses the current K_{t }to compute A=H_{A}(K_{t}tR) or, if the token does not have any means for receiving R, it can output A=HA(K_{t}). The server can use its clock and local copy of the secret to maintain its own version of K_{t}, which it can use to determine whether received values of A are recent and correct. All of the foregoing show that the method and apparatus of the present invention can be implemented using numerous variations and modifications to the exemplary embodiments described herein, as would be understood by one skilled in the art.
 [0053]III. Asymmetric Cryptographic Protocols
 [0054]The foregoing illustrates various embodiments of the invention that may be used with symmetric cryptographic protocols. As will be seen below, still other techniques of the present invention may be used in connection with asymmetric cryptographic operations and protocols. While symmetric cryptosystems are sufficient for some applications, asymmetric cryptography is required for many applications. There are several ways leak resistance can be incorporated into public key cryptosystems, but it is often preferable to have as little impact as possible on the overall system architecture. Most of the exemplary designs have thus been chosen to incorporate leak resistance into widely used cryptosystems in a way that only alters the key management device, and does not affect the certification process, certificate format, public key format, or processes for using the public key.
 [0055]A. Certified DiffieHeilman
 [0056]DiffieHellman exponential key exchange is a widely used asymmetric protocol whereby two parties who do not share a secret key can negotiate a shared secret key. Implementations of DiffieHellman can leak information about the secret exponents, enabling attackers to determine the secret keys produced by those implementations. Consequently, a leakresistant implementation of DiffieHellman would be useful. To understand such a leakresistant implementation, it will be useful to first review a conventional DiffieHellman implementation.
 [0057]1. Conventional Certified DiffieHellman
 [0058]Typical protocols in the background art for performing certified DiffieHellman exponential key agreement involve two communicating users (or devices) and a certifying authority (CA). The CA uses an asymmetric signature algorithm (such as DSA) to sign certificates that specify a user's public DiffieHeilman parameters (the prime p and generator g), public key (p^{x }mod g, where x is the user's secret exponent), and auxiliary information (such as the user's identity, a description of privileges granted to the certificate holder, a serial number, expiration date, etc.). Certificates may be verified by anyone with the CA's public signature verification key. To obtain a certificate, user U typically generates a secret exponent (x_{u}), computes his or her own public key y_{u}=g^{x} ^{ u }mod p, presents y_{u }along with any required auxiliary identifying or authenticating information (e.g., a passport) to the CA, who issues the user a certificate C_{u }Depending on the system, p and g may be unique for each user, or they may be systemwide constants (as will be assumed in the following description of DiffieHellman using the background art).
 [0059]Using techniques of the background art, Alice and Bob can use their certificates to establish a secure communication channel. They first exchange certificates (C_{Alice }and C_{Bob}). Each verifies that the other's certificate is acceptable (e.g., properly formatted, properly signed by a trusted CA, not expired, not revoked, etc.). Because this protocol will assume thatp and g are constants, they also check that the certificate's p and g match the expected values. Alice extracts Bob's public key (y_{Bob}) from C_{Bob }and uses her secret exponent (x_{Alice}) to compute z_{Alice=(Y} _{Bob})^{X} ^{ Alice }mod p. Bob uses his secret exponent and Alice's public key to compute Z_{Bob}=(Y_{Alice})^{X} ^{ Bob }mod p. If everything works correctly, z_{Alice}=Z_{Bob}, since:
$\begin{array}{c}{z}_{\mathrm{Alice}}={\left({y}_{\mathrm{Bob}}\right)}^{{x}_{\mathrm{Alice}}}\ue89e\mathrm{mod}\ue89e\text{\hspace{1em}}\ue89ep\\ ={\left({g}^{{x}_{\mathrm{Bob}}}\right)}^{{x}_{\mathrm{Alice}}}\ue89e\mathrm{mod}\ue89e\text{\hspace{1em}}\ue89ep\\ ={\left({g}^{{x}_{\mathrm{Alice}}}\right)}^{{x}_{\mathrm{Bob}}}\ue89e\mathrm{mod}\ue89e\text{\hspace{1em}}\ue89ep\\ ={\left({y}_{\mathrm{Alice}}\right)}^{{x}_{\mathrm{Bob}}}\ue89e\mathrm{mod}\ue89e\text{\hspace{1em}}\ue89ep\\ ={z}_{\mathrm{Bob}}.\end{array}$  [0060]Thus, Alice and Bob have a shared key z=z_{Alice}=z=_{Bob}. An attacker who pretends to be Alice but does not know her secret exponent (x_{Alice}) will not be able to compute z_{Alice}=(y_{Bob})^{x} ^{ Alice }mod p correctly. Alice and Bob can positively identify themselves by showing that they correctly found z. For example, each can compute and send the other the hash of z concatenated with their own certificate. Once Alice and Bob have verified each other, they can use a symmetric key derived from z to secure their communications. (For an example of a protocol in the background art that uses authenticated DiffieHellman, see “The SSL Protocol Version 3.0” by A. Freier, P. Karlton, and P. Kocher, Mar. 1996.)
 [0061]2. LeakResistant Certified DiffieHellman
 [0062]A satisfactory leakresistant public key cryptographic scheme should overcome the problem that, while certification requires the public key be constant, information about the corresponding private key should not leak out of the token that contains it. In the symmetric protocol described above, the design assumes that the leak function reveals no useful information about old deleted values of K_{t }or about future values of K_{t }that have not yet been computed. Existing public key schemes, however, require that implementations repeatedly perform a consistent, usually deterministic, operation using the private key. For example, in the case of DiffieHellman, a leakresistant token that is compatible with existing protocols and implementations should be able to perform the secret key operation y^{x }mod p, while ensuring that the exponent x remains secret. The radical reshuffling of the secret provided by the hash finction H_{K }in the symmetric approach cannot be used because the device should be able to perform the same operation consistently.
 [0063]The operations used by the token to perform the private key operation are modified to add leak resistance using the following variables:
Register Comment x_{1} First part of the secret key (in nonvolatile updateable memory) x_{2} Second part of the secret key (in nonvolatile updateable memory) g The generator (not secret). p The public prime, preferably a strong prime (not secret).  [0064]The prime p and generator g may be global parameters, or may be specific to individual users or groups of users (or tokens). In either case, the certificate recipient should be able to obtain p and g securely, usually as builtin constants or by extracting them from the certificate.
 [0065]To generate a new secret key, the key generation device (often but not always the cryptographic token that will contain the key) first obtains or generates p and g, where p is the prime and g is a generator mod p. If p and g are not systemwide parameters, algorithms known in the background art for selecting large prime numbers and generators may be used. It is recommended that p be chosen with (p−1)/2 also prime, or at least that ø(p) not be smooth. (When (p−1)/2 is not prime, information about x_{1 }and x_{2 }modulo small factors of ø(p) may be leaked, which is why it is preferable that ø(p) not be smooth. Note that ø denotes Euler's totient function.) Once p and g have been chosen, the device generates two random exponents x_{1 }and x_{2}. The lowestorder bit of x_{1 }and of x_{2 }is not considered secret, and may be set to 1. Using p, g, x_{1 }and x_{2}, the device can then compute its public key as g^{x} ^{ 1 } ^{x} ^{ 2 }mod p and submit it, along with any required identifying information or parameters needed (e.g., p and g), to the CA for certification.
 [0066][0066]FIG. 2 illustrates the process followed by the token to perform private key operations. At step 205, the token obtains the input message y, its own (nonsecret) prime p, and its own secret key halves (x_{1 }and x_{2}). If x_{1}, x_{2}, and p are stored in encrypted and/or authenticated form, they would be decrypted or verified at this point. At this step, the token should verify that 1 <y <−1. At step 210, the token uses a random number generator (or pseudorandom number generator) to select a random integer b_{0}, where 0 < b_{0}<p. At step 215, the token computes b_{1}=b_{0} ^{−1 }mod p. The inverse computation mod p may be performed using the extended Euclidean algorithm or the formula b_{1}=b_{0} ^{ø(p)1 }mod p. At step 220, the token computes b_{2 }=b_{1} ^{x} ^{ 1 }mod p. At this point, b_{1 }is no longer needed; its storage space may be used to store b_{2}. Efficient algorithms for computing modular exponentiation, widely known in the art, may be used to complete step 220. Alternatively, when a fast modular exponentiator is available, the computation b_{2 }may be performed using the relationship b_{2}=b_{0} ^{ø(p)x} ^{ 1 }mod p. At step 225, the token computes b_{3}=b_{2} ^{x} ^{ 2 }mod p. At this point, b_{2 }is no longer needed; its storage space may be used to store b_{3}. At step 230, the token computes z_{0}=b_{0}y mod p. At this point,y and b_{0 }are no longer needed; their space may be used to store r_{1 }(computed at step 235) and z_{0}. At step 235, the token uses a random number generator to select a random integer r_{1}, where 0<r_{1}<ø(p) and gcd(r_{1}, ø(p))=1. (If (p−1/2 is known to be prime, it is sufficient to verify that r_{1 }is odd.) At step 240, the token updates x_{1 }by computing x_{1}←x_{1}r_{1 }mod ø(p). The old value of x_{1 }is deleted and replaced with the updated value. At step 245, the token computes r_{2}=(r_{1} ^{−1}) mod ø(p). If (p−1/2 is prime, then r_{2 }can be found using a modular exponentiator and the Chinese Remainder Theorem. Note that r_{1 }is not needed after this step, so its space may be used to store r_{2}. At step 250, the token updates x_{2 }by computing x_{2}←x_{2}r_{2 }mod ø(p). The old value of x_{2 }should be deleted and replaced with the updated value. At step 255, the token computes z_{1}=(z_{0})^{x} ^{ 1 }mod p. Note that z_{0 }is not needed after this step, so its space may be used to store z_{1}. At step 260, the token computes z_{2}=(z_{1})^{x} ^{ 2 }mod p. Note that z_{1 }is not needed after this step, so its space may be used to store z_{2}. At step 265, the token finds the exponential key exchange result by computing z=z_{2}b_{3 }mod p. Finally, at step 270, the token erases and frees any remaining temporary variables.
 [0067]The process shown in FIG. 2 correctly computes z=mod p, where x=x_{1}x_{2 }mod ø(p), since:
$\begin{array}{c}z={z}_{2}\ue89e{b}_{3}\ue89e\mathrm{mod}\ue89e\text{\hspace{1em}}\ue89ep\\ =\left({z}_{1}^{{x}_{2}}\ue89e\mathrm{mod}\ue89e\text{\hspace{1em}}\ue89ep\right)\ue89e\left({b}_{2}^{{x}_{2}}\ue89e\mathrm{mod}\ue89e\text{\hspace{1em}}\ue89ep\right)\ue89e\mathrm{mod}\ue89e\text{\hspace{1em}}\ue89ep\\ =\left({\left({z}_{0}^{{x}_{1}}\ue89e\mathrm{mod}\ue89e\text{\hspace{1em}}\ue89ep\right)}^{{x}_{2}}\right)\ue89e\left({\left({b}_{1}^{{x}_{1}}\ue89e\mathrm{mod}\ue89e\text{\hspace{1em}}\ue89ep\right)}^{{x}_{2}}\right)\ue89e\mathrm{mod}\ue89e\text{\hspace{1em}}\ue89ep\\ ={\left({b}_{0}\ue89ey\ue89e\text{\hspace{1em}}\ue89e\mathrm{mod}\ue89e\text{\hspace{1em}}\ue89ep\right)}^{{x}_{1}\ue89e{x}_{2}}\ue89e{\left({b}_{0}^{1}\ue89e\mathrm{mod}\ue89e\text{\hspace{1em}}\ue89ep\right)}^{{x}_{1}\ue89e{x}_{2}}\ue89e\mathrm{mod}\ue89e\text{\hspace{1em}}\ue89ep\\ ={y}^{{x}_{1}\ue89e{x}_{2}}\ue89e\mathrm{mod}\ue89e\text{\hspace{1em}}\ue89ep\\ ={y}^{x}\ue89e\mathrm{mod}\ue89e\text{\hspace{1em}}\ue89ep.\end{array}$  [0068]The invention is useful for private key owners communicating with other users (or devices) who have certificates, and also when communicating with users who do not.
 [0069]If Alice has a certificate and wishes to communicate with Bob who does not have a certificate, the protocol proceeds as follows. Alice sends her certificate (C_{Alice}) to Bob, who receives it and verifies that it is acceptable. Bob extracts y_{Alice }(along with p_{Alice }and g_{Alice}, unless they are systemwide parameters) from C_{Alice}. Next, Bob generates a random exponent X_{BA}, where 0 <X_{AB}<ø(P_{Alice}). Bob then uses his exponent X_{AB }and Alice's parameters to calculate Y_{BA}=(g_{Alice} ^{x} ^{ BA })mod p_{Alice }and the session key z=(y_{Alice} ^{X} ^{ BA })mod p_{Alice}. Bob sends Y_{BA }to Alice, who performs the operation illustrated in FIG. 2 to update her internal parameters and derive z from y_{BA}. Alice then proves that she computed z correctly, for example by sending Bob H(zC_{Alice}). (Alice cannot authenticate Bob because he does not have a certificate. Consequently, she does not necessarily need to verify that he computed z successfully.) Finally, Alice and Bob can use z (or, more commonly, a key derived from z) to secure their communications.
 [0070]If both Alice and Bob have certificates, the protocol works as follows. First, Alice and Bob exchange certificates (C_{Alice }and C_{Bob}), and each verifies that other's certificate is valid. Alice then extracts the parameters p_{Bob}, g_{Bob}, and Y_{Bob }from C_{Bob, }and Bob extracts p_{Alice}, g_{Alice}, and y_{Alice }from C_{Alice Alice then generates a random exponent X} _{AB }where 0 <X_{AB}<ø(p_{Bob}), computes y_{AB}=(g_{Bob})^{x} ^{ AB }mod p_{Bob, and computes z} _{AB}(Y_{Bob}. Bob generates a random X_{BA }where 0<X_{BA}<ø(p_{Alice}), computes Y_{BA}=(g_{Alice})^{X} ^{ BA }mod p_{Alice}, and computes Z_{BA}(Y_{Alice})^{x} ^{ BA }mod p_{Alice}. Bob sen Alice, and Alice sends y_{AB }to Bob. Alice and Bob each perform the operation shown in FIG. 2, where each uses the prime p from their own certificate and their own secret exponent halves (x_{1 }and x_{2}). For the message y in FIG. 2, Alice uses y_{BA }(received from Bob), and Bob uses y_{AB }(received from Alice). Using the process shown in FIG. 2, Alice computes z. Using z and z_{AB }(computed previously), she can find a session key K. This may be done, for example, by using a hash function H to compute K=H(zz_{AB}). The value of z Bob obtains using the process shown in FIG. 2 should equal Alice's z_{AB}, and Bob's z_{BA }(computed previously) should equal Alice's z. If there were no errors or attacks, Bob should thus be able to find K, e.g., by computing K=H(z_{BAz). }Alice and Bob now share K. Alice can prove her identity by showing that she computed K correctly, for example by sending Bob H(KC_{Alice}). Bob can prove his identity by sending Alice H(KC_{Bob}). Alice and Bob can then secure their communications by encrypting and authenticating using K or a key derived from K.
 [0071]Note that this protocol, like the others, is provided as an example only; many variations and enhancements of the present invention are possible and will be evident to one skilled in the art. For example, certificates may come from a directory, more than two parties can participate in the key agreement, key escrow functionality may be added, the prime modulus p may be replaced with a composite number, etc. Note also that Alice and Bob as they are called in the protocol are not necessarily people; they would normally be computers, cryptographic devices, etc.
 [0072]For leak resistance to be effective, attackers should not be able to gain new useful information about the secret variables with each additional operation unless a comparable amount of old useful information is made useless. While the symmetric design is based on the assumption that leaked information will not survive the hash operation H_{K}, this design uses multiplication operations mod ø(p) to update x_{1 }and x_{2}. The most common variety of leaked information, statistical information about exponent bits, is not of use to attackers in this design, as the exponent update process (x_{1}←x_{1}r_{1 }mod ø(p) and x_{2}←x_{2}r_{2 }mod ø(p)) destroys the utility of this information. The only relevant characteristic that survives the update process is that x_{1}x_{2 }mod ø(p) remains constant, so the system designer should be careful to ensure that the leak function does not reveal information allowing the attacker to find new useful information about x_{1}x_{2 }mod ø(p).
 [0073]There is a modest performance penalty, approximately a factor of four, for the leakresistant design as described. One way to improve performance is to remove the blinding and unblinding operations, which are often unnecessary. (The blinding operations prevent attackers from correlating input values of y with the numbers processed by the modular exponentiation operation.) Alternatively or additionally, it is possible to update and reuse values of b_{0}, b_{3}, r_{1}, and r_{2 }by computing b_{0}←(b_{0}) mod p, b_{3}←(b_{3})^{v }mod p,r_{1}←(r_{1})^{w }mod ø(p), and r_{2}←(r_{2})^{w }mod ø(p), where v and w are fairly short random exponents. Note that the relationship b_{3}←b_{0} ^{x} ^{ 1 } ^{x} ^{ 2 }mod p remains true when b_{0 }and b_{3 }are both raised to the power v (mod p). The relationship r_{2}=(r_{1} ^{1}) mod ø(p) also remains true when r_{1 }and r_{2 }are exponentiated (mod ø(p)). Other parameter update operations may also be used, such as exponentiation with fixed exponents (e.g., v=w= 3), or multiplication with random values and their inverses, mod p and ø(p). The time per transaction with this update process is about half that of the unoptimized leakresistant implementation, but additional storage is required and care should be taken to ensure that b_{0}, b_{3}, r_{2 }will not be leaked or otherwise compromised.
 [0074]It should also be noted that with this particular type of certified DiffieHellman, the negotiated key is the same every time any given pair of users communicate. Consequently, though the blinding operation performed using b_{0 }and b_{3 }does serve to protect the exponents, the result K can be leaked in the final step or by the system after the process is complete. If storage is available, parties could keep track of the values of y they have received (or their hashes) and reject duplicates. Alternatively, to ensure that a different result is obtained from each negotiation, Alice and Bob can generate and exchange additional exponents, w_{Alice }and w_{Bob}, for example with 0<w<2^{128 }(where 2^{128 }<<p). Alice sets y=(y_{BA})^{w} ^{ Alice } ^{W} ^{ Bob }mod p instead ofjust y=Y_{BA}, and Bob sets y=(y_{AB})^{w} ^{ Bob } ^{w} ^{ Alice }mod p instead of y=y_{AB }before performing the operation shown in FIG. 2.
 [0075]B. LeakResistant RSA
 [0076]Another asymmetric cryptographic protocol is RSA, which is widely used for digital signatures and public key encryption. RSA private key operations rely on secret exponents. If information about these secret exponents leaks from an implementation, its security can be compromised. Consequently, a leakresistant implementation of RSA would be useful.
 [0077]To give RSA private key operations resistance to leaks, it is possible to divide the secret exponent into two halves such that information about either half is destroyed with each operation. These are two kinds of RSA private key operations. The first, private key signing, involves signing a message with one's own private key to produce a digital signature verifiable by anyone with one's corresponding public key. RSA signing operations involve computing S=M^{d }mod n, where M is the message, S is the signature (verifiable using M=S^{e }mod n), d is the secret exponent and equals e^{1 }mod ø(n), and n is the modulus and equals pq, where n and e are public and p and q are secret primes, and ø is Euler's phi finction. An RSA public key consists of e and n, while an RSA private key consists of d and n (or other representations of them). For RSA to be secure, d, ø(n), p, and q should all be secret.
 [0078]The other RSA operation is decryption, which is used to recover messages encrypted using one's public key. RSA decryption is virtually identical to signing, since the decrypted message M is recovered from the ciphertext C by computing M=C^{d }mod n, where the ciphertext C was produced by computing C=M^{e }mod n. Although the following discussion uses variable names from the RSA signing operation, the same techniques may be applied similarly to decryption.
 [0079]An exemplary leakresistant scheme for RSA implementations may be constructed as illustrated in FIG. 3. At step 300, prior to the commencement of any signing or decryption operations, the device is initialized with (or creates) the public and private keys. The device contains the public modulus n and the secret key components d_{1}, d_{2}, and z, and k, where k is a prime number of mediumsize (e.g., 0<k<2^{128}) chosen at random, z=kø(n), d_{1 }is a random number such that 0<d_{1}<z and gcd(d_{1}z)=1, and d_{2 }=(e^{1 }mod ø(n))(d_{1} ^{1 }mod z) mod z. In this invention, d_{1 }and d_{2 }replace the usual RSA secret exponent d. Techniques for generating the initial RSA primes (e.g., p and q) and modulus (n) are well known in the background art. At step 305, the device computes a random prime k′ of medium size (e.g., 0<k′<2^{128}). (Algorithms for efficiently generating prime numbers are known in the art.)
 [0080]At step 303, the device (token) receives a message M to sign (or to decrypt). At step 310, the device updates z by computing z←k′z. At step 315, the device updates z again by computing z←z/k. (There should be no remainder from this operation, since k divides z.) At step 320, k is replaced with k′ by performing k←k′. Because k′will not be used in subsequent operations, its storage space may be used to hold R (produced at step 325). At step 325, the device selects a random R where 0<R<z and gcd(R,z)=1. At step 330, the device updates d_{1 }by computing d_{1}R mod z. At step 335, the device finds the inverse of R by computing R′←R^{1 }mod z using, for example, the extended Euclidean algorithm. Note that R is no longer needed after this step, so its storage space may be erased and used to hold R′. At step 340, the device updates d_{2 }by computing d_{2}←d_{2}R′ mod z. At step 345, the device computes S_{0}=M^{d} ^{ 1 }mod n, where M is the input message to be signed (or the message to be decrypted). Note that M is no longer needed after this step, so its storage space may be used for S_{0}. At step 350, the device computes S=S_{0} ^{d} ^{ 2 }mod n, yielding the final signature (or plaintext if decrypting a message). Leakresistant RSA has similar security ch Characteristics as normal RSA; standard message padding, postprocessing, and key sizes may be used. Public key operations are also performed normally (e.g., M=S^{e }mod n).
 [0081]A simpler RSA leak resistance scheme may be implemented by splitting the exponent d into two halves d_{1 }and d_{2 }such that d_{1}+d_{2}=d. This can be achieved during key generation by choosing d_{1 }to be a random integer where 0<d_{1}<d, and choosing d_{2 }←dd_{1}. To perform private key operations, the device needs d_{1 }and d_{2}, but it does not need to contain d. Prior to each private key operation, the cryptographic device identifies which of d_{1 }and d_{2 }is larger. If d_{1>d} _{2}, then the device computes a random integer r where 0<r<d_{1}, adds r to d_{2 }(i.e., d_{2}←d_{2}+r), and subtracts r from d_{1}, (i.e., d_{1←d} _{1}r). Otherwise, if d_{1<d} _{2}, then the device chooses a random integer r where 0<r<d_{2}, adds r to d_{1}(i.e., d_{1←d} _{1}+r), and subtracts r from d_{2 }(i.e., d_{2}←d_{2}r). Then, to perform the private key operation on a message M, the device computes s_{1=M} ^{d} ^{ 1 }mod n, s_{2}=M^{d} ^{ 2 }modn, and computes the signature S=s_{1}s_{2}mod n. While this approach of splitting the exponent into two halves whose sum equals the exponent can also be used with DiffieHellman and other cryptosystems, dividing the exponent into the product of two numbers mod ø(p) is usually preferable since the assumption that information about d_{1}+d_{2 }will not leak is less conservative than the assumption that information about x_{1}x_{2 }mod ø(p) will not leak. In the case of RSA, updates mod ø(n) cannot be done safely, since ø(n) must be kept secret.
 [0082]When the Chinese Remainder Theorem is required for performance, it is possible to use similar techniques to add leak resistance by maintaining multiples of the secret primes (p and q) that are updated every time (e.g., multiplying by the new multiple then dividing by the old multiple). These techniques also protect the exponents (dp and dq) as multiples of their normal values. At the end of the operation, the result S is corrected to compensate for the adjustments to dp, dq, p, and q.
 [0083]An exemplary embodiment maintains state information consisting of the values n, B_{i}, B_{f}, _{pk}, _{qk}, d_{pk}, d_{qk}, _{PInv}, and f. To convert a traditional RSA CRT private key (consisting of p, q, d_{p}, and d_{q }with p<q) into the new representation, a random value for k is chosen, where 0<k<2^{64}. The value B_{i }is chosen at random where 0<B_{i}<n, and R_{l }and R_{2 }are chosen at random where 0<R_{l}<2^{64 }and 0<R_{2}<2^{64}. (Of course, constants such as 2^{64 }are chosen as example values. It is possible, but not necessary, to place constraints on random numbers, such as requiring that they be prime.) The leakresistant private key state is then initialized by setting n←pq,B_{f}←B_{i} ^{d }p_{k }mod n,_{pk}←(k)(p), _{qk}←(k)(q),d_{pk}←d_{p}+(R_{l})(p)R_{l}d_{qk}←d_{q}+(R_{2})(q)R_{2}, _{PInv}←k(p ^{1}mod q), and f←0.
 [0084]To update the system state, first a random value α may be produced where 0<α< 2^{64}. Then compute p_{k}←((α)(qk))/k, _{PInv}←((α)(_{PInv}))/k,k←αThe exponents d_{pk }and d_{qk }may be updated by computing d_{pk}←d_{pk}±(R_{3p}R_{3}k) and d_{qk}←d_{qk}±(R_{4qk}R_{4}k), where R_{3 }and R_{4 }can be random or constant values (even 1). The blinding factors B_{i }and B_{f }may be updated by computing B_{i}=B_{i} ^{2 }mod n and B_{f}=B_{f} ^{2 }mod n, by computing new blinding factors, by exponentiating with a value other than 2, etc. Update processes should be performed as often as practical, for example before or after each modular exponentiation process. Before the update begins, a failure counter f is incremented, and when the update completes fis set to zero. If f ever exceeds a threshold value indicating too many consecutive failures, the device should temporarily or permanently disable itself. Note that if the update process is interrupted, memory values should not be left in intermediate states. This can be done by using complete reliable memory updates. If the total set of variable changes is too large for a single complete update, it is possible to store α first then do each variable update reliably which keeping track of how many have been completed.
 [0085]To perform a private key operation (such as decryption or signing), the input message C is received by the modular exponentiator. Next, the value is blinded by computing C′←(C)(B_{i}) mod n. The blinded input message is then used to compute modified CRT intermediates by computing m_{pk}←(C′)^{d} ^{ pk }P_{k }mod p_{k }and m_{qk}←(C′)^{d} ^{ qk }mod q_{k}. Next in the exemplary embodiment, the CRT intermediates are multiplied by k, e.g. m_{pk}←(k)(m_{pk}) mod p_{k }and m_{qk}←(k)(m_{qk}) mod qk. The CRT difference is then computed as m_{pqk}=(m_{pk}[+qk]m_{qk) [mod } _{qk], where the addition of } _{qk }and/or reduction mod _{qk }are optional. (The addition of _{qk }ensures that the result is nonnegative.) The blinded result can be computed as
${M}^{\prime}=\frac{\left({m}_{\mathrm{pk}}\right)\ue89ek+{p}_{k}[\left(\frac{\left({p}_{\mathrm{Inv}}\right)\ue89e\left({m}_{\mathrm{pqk}}\right)}{k}\right)\ue89e\mathrm{mod}\ue89e\text{\hspace{1em}}\ue89e{q}_{k}}{{k}^{2}},$  [0086]As one of ordinary skill in the art will appreciate, variant forms of the invention are possible. For example, the computational processes can be reordered or modified without significantly changing the invention. Some portions (such as the initial and blinding steps) can be skipped. In another example, it is also possible to use multiple blinding factors (for example, instead of or in addition to the value k).
 [0087]In some cases, other techniques may also be appropriate. For example, exponent vector codings may be rechosen frequently using, for example, a random number generator. Also, Montgomery arithmetic may be performed mod j where j is a value that is changed with each operation (as opposed to traditional Montgomery implementations where j is constant with j=2^{k}). The foregoing shows that the method and apparatus of the present invention can be implemented using numerous variations and modifications to the exemplary embodiments described herein, as would be known by one skilled in the art.
 [0088]C. LeakResistant ElGamal Public Key Encryption and Digital Signatures Sti
 [0089]Still other asymmetric cryptographic protocols that may be improved using the techniques of the invention. For example, ElGamal and related cryptosystems are widely used for digital signatures and public key encryption. If information about the secret exponents and parameters leaks from an ElGamal implementation, security can be compromised. Consequently, leakresistant implementations of ElGamal would be useful.
 [0090]The private key in the ElGamal public key encryption scheme is a randomly selected secret α where 1 <α<p−2. The nonsecret parameters are a prime p, a generator α, and α^{α}mod p. To encrypt a message m, one selects a random k (where 1<k<p−2) and computes the ciphertext (γ, δ) where γ=α^{k }mod p and δ=m(α^{α}mod p)^{k }mod p. Decryption is performed by computing m=δ(γ^{p−1α}) mod p. (See the Handbook of Applied Cryptography by A. Menezes, P. van Oorschot, and S. Vanstone, 1997, pages 294298, for a description of ElGamal publickey encryption).
 [0091]To make the ElGamal publickey decryption process leakresistant, the secret exponent (p−1α) is stored in two halves α_{1 }and α_{2}, such that α_{1}α_{2}=(ø(p)−α) mod ø(p).
 [0092]When generating ElGamal parameters for this leakresistant implementation, it is recommended, but not required, that p be chosen with (p−1)/2 prime so that ø(p)/2 is prime.
 [0093]The variables α_{1 }and α_{2 }are normally chosen initially as random integers between 0 and ø(p). Alternatively, it is possible. to generate a first, then choose α_{1 }and α_{2}, as by selecting a, relatively prime to ø(p) and computing α_{2}= (α^{1 }mod ø(p))(α_{1} ^{1 }mod ø(p)) mod ø(p).
 [0094][0094]FIG. 4 illustrates an exemplary leakresistant ElGamal decryption process. At step 405, the decryption device receives an encrypted message pair (γ, δ). At step 410, the device selects a random r_{1 }where 1<r_{1}<ø(p) and gcd(r_{1}, ø(p))=1. At step 415, the device updates α_{1 }by computing α←α_{1}r_{1 }, mod ø(p), overwriting the old value of α_{1 }with the new value. At step 420, the device computes the inverse of r_{1 }by computing r_{2 }=(r_{1})^{1 }mod ø(p). Because r_{1 }is not used after this step, its storage space may be used to hold r_{2. }Note that if (p−1)/2 is prime, then r_{2 }may also be found by finding r_{2}′=r_{1} ^{(P−1)/22 }mod (p−1)/2 and using the CRT to find r_{2 }(mod p−1). At step 425, the device updates a_{2 }by computing a_{2}←α_{2}r_{2 }mod ø(p). At step 430, the device begins the private key (decryption) process by computing m′=γ^{α} ^{ 1 }mod p. At step 435, the device computes m=δ(m′)^{α} ^{ 2 }mod p and returns the message m. If verification is successful, the result equals the original message because:
$\begin{array}{c}\left(\delta \right)\ue89e{\left({m}^{\prime}\right)}^{{a}_{2}}\ue89e\mathrm{mod}\ue89e\text{\hspace{1em}}\ue89ep=\left({m\ue8a0\left({\alpha}^{a}\right)}^{k}\right)\ue89e{\left({\gamma}^{{a}_{1}}\ue89e\mathrm{mod}\ue89e\text{\hspace{1em}}\ue89ep\right)}^{{a}_{2}}\ue89e\mathrm{mod}\ue89e\text{\hspace{1em}}\ue89ep\\ =\left(m\ue89e\text{\hspace{1em}}\ue89e{\alpha}^{\mathrm{ak}}\right)\ue89e\left({\gamma}^{{a}_{1}\ue89e{a}_{2}\ue89e\mathrm{mod}\ue89e\text{\hspace{1em}}\ue89e\phi \ue8a0\left(p\right)}\right)\ue89e\mathrm{mod}\ue89e\text{\hspace{1em}}\ue89ep\\ =\left(m\ue89e\text{\hspace{1em}}\ue89e{\alpha}^{\mathrm{ak}}\right)\ue89e\left({\left({\alpha}^{k}\ue89e\mathrm{mod}\ue89e\text{\hspace{1em}}\ue89ep\right)}^{a\ue89e\text{\hspace{1em}}\ue89e\mathrm{mod}\ue89e\text{\hspace{1em}}\ue89e\phi \ue8a0\left(p\right)}\right)\ue89e\mathrm{mod}\ue89e\text{\hspace{1em}}\ue89ep\\ =\left(m\ue89e\text{\hspace{1em}}\ue89e{\alpha}^{\mathrm{ak}}\right)\ue89e\left({\alpha}^{\mathrm{ak}}\right)\ue89e\mathrm{mod}\ue89e\text{\hspace{1em}}\ue89ep\\ =m\end{array}$  [0095]As with the ElGamal public key encryption scheme, the private key for the ElGamal digital signature scheme is a randomlyselected secret α, where 1<α<p−2. The public key is also similar, consisting of a prime p, a generator α, and public parameter y where y=α^{α}mod p. To sign a message m, the private key holder chooses or precomputes a random secret integer k (where 1<k<p−2 and k is relatively prime to p−1) and its inverse, k^{1 }mod ø(p). Next, the signer computes the signature (r, s), where r= α^{k }mod p, s=((k^{1 }modø(p))[H(m)−αr])mod ø(p), and H(m) is the hash of the message. Signature verification is performed using the public key (p, α, y) by verifying that 1<r< p and by verifying that y^{r}r^{s }mod p=α^{h(m) }mod p.
 [0096]To make the ElGamal digital signing process leakresistant, the token containing the private key maintains three persistent variables, α_{k}, w, and r. Initially, αa_{k}=α(the private exponent), w=1, and r=α. When a message m is to be signed (or during the precomputation before signing), the token generates a random number b and its inverse b^{1 }mod ø(p), where b is relatively prime to ø(p) and 0 <b<ø(p). The token then updates a_{k}, w, and r by computing a_{k}←(a_{k})(b^{1}) mod 526 (p), w←(w)(b^{1}) mod ø(p), and r←(r^{b}) mod p. The signature (r, s) is formed from the updated value of r and s, where s=(w(H(m)−a_{k}r))modø(p). Note that a_{k}, w, and r are not randomized prior to the first operation, but should be randomized before exposure to possible attack, since otherwise the first operation may leak more information than subsequent ones. It is thus recommended that a dummy signature or parameter update with a_{k}←(a_{k})(b^{1}) mod ø(p), w←(w)(b^{1}) mod ø(p), and r←(r^{b}) mod p be performed immediately after key generation. Valid signatures produced using the exemplary tamperresistant ElGamal process may be checked using the normal ElGamal signature verification procedure.
 [0097]It is also possible to split all or some the ElGamal variables into two halves as part of the leak resistance scheme. In such a variant, α is replaced with α_{1 }and α_{2}, w with w_{1 }and w_{2}, and r with r_{1 }and r_{2}. It is also possible to reorder the operations by performing, for example, the parameter updates as a precomputation step prior to receipt of the enciphered message. Other variations and modifications to the exemplary embodiments described herein will be evident to one skilled in the art.
 [0098]D. LeakResistant DSA
 [0099]Another commonly used asymmetric cryptographic protocol is the Digital Signature Algorithm (DSA, also known as the Digital Signature Standard, or DSS), which is defined in “Digital Signature Standard (DSS),” Federal Information Processing Standards Publication 186, National Institute of Standards and Technology, May 19, 1994 and described in detail in the Handbook of Applied Cryptography, pages 452 to 454. DSA is widely used for digital signatures. If information about the secret key leaks from a DSA implementation, security can be compromised. Consequently, leakresistant implementations of DSA would be useful.
 [0100]In nonleakproof systems, the private key consists of a secret parameter α, and the public key consists of (p, q, α, y), where p is a large (usually 512 to 1024 bit) prime, q is a 160bit prime, α is a generator of the cyclic group of order q mod p, and y=α^{α}mod p. To sign a message whose hash is H(m), the signer first generates (or precomputes) a random integer k and its inverse k^{1 }mod q, where 0<k<q. The signer then computes the signature (r, s), where r=(a^{k }mod p) mod q, and s=(k^{1 }mod q)(H(m)+αr) mod q.
 [0101]In an exemplary embodiment of a leakresistant DSA signing process, the token containing the private key maintains two variables in nonvolatile memory, a_{k }and k, which are initialized with a_{k}=αand k=1. When a message m is to be signed (or during the precomputation before signing), the token generates a random integer b and its inverse b^{1 }mod q, where 0 <b<q. The token then updates ak and k by computing a_{k}←(α_{kb} ^{1 }mod q)(k) mod q, followed by k←b. The signature (r, s) is formed from the updated values of a_{k }and k by computing r=α^{k }mod p (which may be reduced mod q), and s=[(b^{1}H(m) mod q)+(α_{k}r) mod q] mod q. As indicated, when computing s, b^{1}H(m) mod q and (a_{k}r) mod q are computed first, then combined mod q. Note that a_{k }and k should be randomized prior to the first operation, since the first update may leak more information than subsequent updates. It is thus recommended that a dummy signature (or parameter update) be performed immediately after key generation. Valid signatures produced using the leakresistant DSA process may be checked using the normal DSA signature verification procedure.
 [0102]IV. Other Algorithms and Applications
 [0103]Still other cryptographic processes can be made leakproof or leakresistant, or may be incorporated into leakresistant cryptosystems. For example, cryptosystems such as those based on elliptic curves (including elliptic curve analogs of other cryptosystems), secret sharing schemes, anonymous electronic cash protocols, threshold signatures schemes, etc. be made leak resistant using the techniques of the present invention.
 [0104]Implementation details of the schemes described may be adjusted without materially changing the invention, for example by reordering operations, inserting steps, substituting equivalent or similar operations, etc. Also, while new keys are normally generated when a new system is produced, it is often possible to add leak resistance retroactively while maintaining or converting existing private keys.
 [0105]Leakresistant designs avoid performing repeated mathematical operations using nonchanging (static) secret values, since they are likely to leak out. However, in environments where it is possible to implement a simple function (such as an exclusive OR) that does not leak information, it is possible use this finction to implement more complex cryptographic operations.
 [0106]While the exemplary implementations assume that the leak functions can reveal any information present in the system, designers may often safely use the (weaker) assumption that information not used in a given operation will not be leaked by that operation. Schemes using this weaker assumption may contain a large table of precomputed subkey values, from which a unique or random subset are selected and/or updated for each operation. For example, DES implementations may use indexed permutation lookup tables in which a few table elements are exchanged with each operation.
 [0107]While leak resistance provides many advantages, the use of leak resistance by itself cannot guarantee good security. For example, leakresistant cryptosystems are not inherently secure against error attacks, so operations should be verified. (Changes can even be made to the cryptosystem and/or leak resistance operations to detect errors.) Similarly, leak resistance by itself does not prevent attacks that extract the entire state out of a device (e.g., L=L_{MAX}). For example, traditional tamper resistance techniques may be required to prevent attackers from staining ROM or EEPROM memory cells and reading the contents under a microscope. Implementers should also be aware of interruption attacks, such as those that involve disconnecting the power or resetting a device during an operation, to ensure that secrets will not be compromised or that a single leaky operation will not be performed repeatedly. (As a countermeasure, devices can increment a counter in nonvolatile memory prior to each operation, and reset or reduce the counter value when the operation completes successfully. If the number of interrupted operations since the last successful update exceeds a threshold value, the device can disable itself.) Other tamper resistance mechanisms and techniques, such as the use of fixedtime and fixedexecution path code or implementations for critical operat conjunction with leak resistance, particularly for systems with a relatively low selfhealing rate (e.g., L_{MAX }is small).
 [0108]Leakresistant algorithms, protocols, and devices may be used in virtually any application requiring cryptographic security and secure key management, including without limitation: smartcards, electronic cash, electronic payments, funds transfer, remote access, timestamping, certification, certificate validation, secure email, secure facsimile, telecommunications security (voice and data), computer networks, radio and satellite communications, infrared communications, access control, door locks, wireless keys, biometric devices, automobile ignition locks, copy protection devices, payment systems, systems for controlling the use and payment of copyrighted information, and point of sale terminals.
 [0109]The foregoing shows that the method and apparatus of the present invention can be implemented using numerous variations and modifications to the exemplary embodiments described herein, as would be known by one skilled in the art. Thus, it is intended that the scope of the present invention be limited only with regard to the claims below.
Claims (71)
 1. A method for implementing RSA with the Chinese Remainder Theorem for use in a cryptographic system, with resistance to leakage attacks against said cryptographic system, comprising the steps of:(a) obtaining a representation of an RSA private key corresponding to an RSA public key, said private key characterized by secret factors p and q;(b) storing said representation of said private key in a memory;(c) obtaining a message for use in an RSA cryptographic operation;(d) computing a first modulus, corresponding to a multiple of p, where the value of said multiple of p and the value of said multiple of p divided by p are both unknown to an attacker of said cryptographic system;(e) reducing said message modulo said first modulus;(f) performing modular exponentiation on the result of step (e);(g) computing a second modulus, corresponding to a multiple of q, where the value of said multiple of q and the value of said multiple of q divided by q are both unknown to an attacker of said cryptographic system;(h) reducing said message modulo said second modulus;(i) performing modular exponentiation on the result of step (h);(j) combining the results of said steps (e) and (h) to produce a result which, if operated on with an RSA public key operation using said RSA public key, yields said message; and(k) repeating steps (c) through 0) a plurality of times using different values for said multiple of p and for said multiple of q.
 2. The method ofclaim 1(i) said step (b) includes storing an exponent d_{p }of said RSA private key in said memory as a plurality of parameters;(ii) an arithmetic fimction of at least one of said plurality of parameters is congruent to d_{p}, modulo (p−1);(iii) none of said parameters comprising said stored d_{p }is equal to d_{p};(iv) an exponent used in said step (f) is at least one of said parameters;(v) at least one of said parameters in said memory changes with said repetitions of said steps (c) through (j).
 3. The method ofclaim 2
 4. The method ofclaim 1
 5. The method ofclaim 1
 6. The method ofclaim 1
 7. The method ofclaim 1
 8. A method for implementing RSA for use in a cryptographic system, with resistance to leakage attacks against said cryptographic system, comprising the steps of:(a) obtaining an RSA private key corresponding to an RSA public key, said RSA public key having an RSA modulus n;(b) storing said private key in a memory in a form whereby a secret parameter of said key is stored as an arithmetic combination of phi(x) and a first at least one key masking parameter, where(i) an operand x in said phi(x) is an exact multiple of at least one factor of said modulus n of said RSA public key; and(ii) said first key masking parameter is unknown to an attacker of said cryptosystem;(iii) a representation of said first key masking parameter is stored in said memory;(iv) phi denotes Euler's totient function;(c) receiving a message;(d) deriving an RSA input from said message;(e) performing modular exponentiation to raise said RSA input to a power dependent on said secret parameter, modulo an RSA modulus stored in said memory, to produce an RSA result such that said RSA result raised to the power of the public exponent of said RSA public key, modulo the modulus of said RSA public key, equals said RSA input;(f) updating said secret parameter in said memory by:(i) modifing said first key masking parameter to produce a new key masking parameter, where said modification is performed in a manner such that an attacker with partial useful information about said first key masking parameter has less useful information about said new key masking parameter; and(ii) using said new key masking parameter to update said secret parameter in said memory;(g) repeating steps (d) through (f) a plurality of times, where the power used for each of said modular exponentiation steps (e) is different.
 9. The method ofclaim 8
 10. The method ofclaim 8
 11. A method for implementing exponential key exchange for use in a cryptographic system, with resistance to leakage attacks against said cryptographic system, comprising the steps of:(a) obtaining, and storing in a memory, exponential key exchange parameters g and p, and a plurality of secret exponent parameters on which an arithmetic relationship may be computed to produce an exponent x;(b) using a key update transformation to produce a plurality of updated secret exponent parameters while maintaining said arithmetic relationship thereamong;(c) receiving a public value y from a party with whom said key exchange is desired;(d) using said updated secret exponent parameters to perform a cryptographic computation yielding an exponential key exchange result z=y x mod p;(e) using said result z to secure an electronic communication with said party; and(f) performing said steps (b), (c), (d), and (e) in a plurality of transactions.
 12. The method ofclaim 11
 13. The method ofclaim 11
 14. The method ofclaim 11
 15. The method ofclaim 11
 16. The method ofclaim 15
 17. A cryptographic token configured to perform cryptographic operations using a secret key in a secure manner, comprising:(a) an interface configured to receive power from a source external to said token;(b) a memory containing said secret key;(c) a processor:(i) configured to receive said power delivered via said interface;(ii) configured to perform said processing using said secret key from said memory;(d) said token having a power consumption characteristic:(i) that is externally measurable; and(ii) that varies over time in a manner measurably correlated with said cryptographic operations; and(e) a source of unpredictable information usable in said cryptographic operations to make determination of said secret key infeasible from external measurements of said power consumption characteristic.
 18. The cryptographic token ofclaim 17
 19. The cryptographic token ofclaim 17
 20. The cryptographic token ofclaim 19
 21. The cryptographic token ofclaim 19
 22. The cryptographic token ofclaim 21
 23. The cryptographic token ofclaim 17
 24. The cryptographic token ofclaim 23
 25. The cryptographic token ofclaim 23
 26. The cryptographic token ofclaim 23
 27. The cryptographic token ofclaim 23
 28. The cryptographic token ofclaim 27
 29. The cryptographic token ofclaim 17
 30. The cryptographic token ofclaim 17
 31. The cryptographic token ofclaim 17
 32. The cryptographic token ofclaim 17
 33. The cryptographic token ofclaim 17
 34. The cryptographic token ofclaim 33
 35. A method for securely managing and using a private key in a computing environment where information about said private key may leak to attackers, comprising the steps of:(a) using a first private key, complementary to a public key, to perform first asymmetric cryptographic operation;(b) reading at least a portion of said first private key from a memory;(c) transforming said read portion of said first private key to produce a second private key:(i) said second private key usable to perform a subsequent asymmetric cryptographic operation in a manner that remains complementary to said public key, and(ii) said transformation enabling said asymmetric cryptographic operations to be performed in a manner such that information leaked during said first asymmetric cryptographic operation does not provide incrementally useful information about said second private key;(d) obtaining a datum;(e) using said second private key to perform said subsequent asymmetric cryptographic operation on said datum.
 36. The method ofclaim 35
 37. The method ofclaim 36
 38. The method ofclaim 36
 39. The method ofclaim 36
 40. The method ofclaim 35
 41. The method ofclaim 40
 42. The method ofclaim 40
 43. The method ofclaim 35
 44. The method ofclaim 35
 45. The method ofclaim 35
 46. The method ofclaim 35
 47. A method for performing cryptographic transactions while protecting a stored cryptographic key against compromise due to leakage attacks, comprising the steps of:(a) retrieving a stored private cryptographic key stored in a memory, said stored key having been used in a previous cryptographic transaction;(b) using a first cryptographic function to derive from said stored key an updated key, about which useful information about said stored key obtained through monitoring of leaked information is effectively uncorrelated to said updated key;(c) replacing said stored key in said memory with said updated key;(d) using an asymmetric cryptographic function, cryptographically processing a datum with said updated key; and(e) sending said cryptographically processed datum to an external device having a public key corresponding to said stored key.
 48. The method ofclaim 47
 49. The method ofclaim 48
 50. The method ofclaim 49
 51. The method ofclaim 50
 52. The method ofclaim 51
 53. The method ofclaim 51
 54. The method ofclaim 53
 55. The method ofclaim 47
 56. A method for implementing a private key operation for an asymmetric cryptographic system with resistance to leakage attacks against said cryptographic system, comprising the steps of:(a) encoding a portion of a private key as at least two component parts, such that an arithmetic function of said parts yields said portion;(b) modifing said component parts to produce updated component parts, but where said arithmetic function of said updated parts still yields said private key portion;(c) obtaining a message for use in an asymmetric private key cryptographic operation;(d) separately applying said component parts to said message to produce an intermediate result;(e) deriving a final result from said intermediate result such that said final result is a valid result of applying said private key to said message;and(f) repeating steps (b) through (e) a plurality of times.
 57. The method ofclaim 56
 58. The method ofclaim 57
 59. The method ofclaim 57
 60. The method ofclaim 56
 61. The method ofclaim 60
 62. The method ofclaim 56
 63. The method ofclaim 56
 64. A method for performing cryptographic transactions in a cryptographic token while protecting a stored cryptographic key against compromise due to leakage attacks, including the steps of:(a) retrieving said stored key from a memory;(b) cryptographically processing said key, to derive an updated key, by executing a cryptographic update finction that:(i) prevents partial information about said stored key from revealing useful information about said updated key, and(ii) also prevents partial information about said updated key from revealing useful information about said stored key;(c) replacing said stored key in said memory with said updated key;(d) performing a cryptographic operation using said updated key; and(e) repeating steps (a) through (d) a plurality of times.
 65. The method ofclaim 64
 66. The method ofclaim 64
 67. The method ofclaim 64
 68. The method ofclaim 66
 69. The method ofclaim 66
 70. The method ofclaim 64(i) explicitly erasing a region of said memory containing said stored key; and(ii) storing said updated key in said region of memory.
 71. The method ofclaim 64
Priority Applications (4)
Application Number  Priority Date  Filing Date  Title 

US7034498 true  19980102  19980102  
US8952998 true  19980615  19980615  
US09224682 US6304658B1 (en)  19980102  19981231  Leakresistant cryptographic method and apparatus 
US09737182 US6381699B2 (en)  19980102  20001213  Leakresistant cryptographic method and apparatus 
Applications Claiming Priority (9)
Application Number  Priority Date  Filing Date  Title 

US09737182 US6381699B2 (en)  19980102  20001213  Leakresistant cryptographic method and apparatus 
US10005105 US7587044B2 (en)  19980102  20011203  Differential power analysis method and apparatus 
US10136012 US7506165B2 (en)  19980102  20020429  Leakresistant cryptographic payment smartcard 
US11643349 US7634083B2 (en)  19980102  20061221  Differential power analysis 
US11978364 US7599488B2 (en)  19980102  20071029  Differential power analysis 
US11981495 US7792287B2 (en)  19980102  20071030  Leakresistant cryptographic payment smartcard 
US12637565 US8879724B2 (en)  19980102  20091214  Differential power analysis—resistant cryptographic processing 
US14530905 US9419790B2 (en)  19980102  20141103  Differential power analysis—resistant cryptographic processing 
US15236739 US20170099134A1 (en)  19980102  20160815  Differential power analysis  resistant cryptographic processing 
Related Parent Applications (2)
Application Number  Title  Priority Date  Filing Date  

US09224682 Division US6304658B1 (en)  19980102  19981231  Leakresistant cryptographic method and apparatus  
US09326222 ContinuationInPart US6327661B1 (en)  19980603  19990603  Using unpredictable information to minimize leakage from smartcards and other cryptosystems 
Related Child Applications (3)
Application Number  Title  Priority Date  Filing Date 

US09930836 ContinuationInPart US7668310B2 (en)  19980603  20010815  Cryptographic computation using masking to prevent differential power analysis and other attacks 
US10005105 ContinuationInPart US7587044B2 (en)  19980102  20011203  Differential power analysis method and apparatus 
US10136012 Division US7506165B2 (en)  19980102  20020429  Leakresistant cryptographic payment smartcard 
Publications (2)
Publication Number  Publication Date 

US20010002486A1 true true US20010002486A1 (en)  20010531 
US6381699B2 US6381699B2 (en)  20020430 
Family
ID=26751037
Family Applications (4)
Application Number  Title  Priority Date  Filing Date 

US09224682 Active US6304658B1 (en)  19980102  19981231  Leakresistant cryptographic method and apparatus 
US09737182 Active US6381699B2 (en)  19980102  20001213  Leakresistant cryptographic method and apparatus 
US10136012 Active 20190712 US7506165B2 (en)  19980102  20020429  Leakresistant cryptographic payment smartcard 
US11981495 Active 20190530 US7792287B2 (en)  19980102  20071030  Leakresistant cryptographic payment smartcard 
Family Applications Before (1)
Application Number  Title  Priority Date  Filing Date 

US09224682 Active US6304658B1 (en)  19980102  19981231  Leakresistant cryptographic method and apparatus 
Family Applications After (2)
Application Number  Title  Priority Date  Filing Date 

US10136012 Active 20190712 US7506165B2 (en)  19980102  20020429  Leakresistant cryptographic payment smartcard 
US11981495 Active 20190530 US7792287B2 (en)  19980102  20071030  Leakresistant cryptographic payment smartcard 
Country Status (5)
Country  Link 

US (4)  US6304658B1 (en) 
EP (1)  EP1050133B2 (en) 
CA (1)  CA2316227C (en) 
DE (3)  DE69840782D1 (en) 
WO (1)  WO1999035782A1 (en) 
Cited By (83)
Publication number  Priority date  Publication date  Assignee  Title 

US20020089725A1 (en) *  20001004  20020711  Wave7 Optics, Inc.  System and method for communicating optical signals upstream and downstream between a data service provider and subscribers 
US20030016692A1 (en) *  20001026  20030123  Wave7 Optics, Inc.  Method and system for processing upstream packets of an optical network 
US20030046547A1 (en) *  20010530  20030306  Jakobsson Bjorn Markus  Secure distributed computation in cryptographic applications 
US20030044014A1 (en) *  20010906  20030306  PierreYvan Liardet  Method for scrambling a calculation with a secret quantity 
US20030044003A1 (en) *  20010814  20030306  International Business Machines Corporation  Spaceefficient, sidechannel attack resistant table lookups 
US20030072059A1 (en) *  20010705  20030417  Wave7 Optics, Inc.  System and method for securing a communication channel over an optical network 
US20030152218A1 (en) *  20000418  20030814  JeanSebastien Coron  Cryptography method on elliptic curves 
US20030200224A1 (en) *  20020423  20031023  International Business Machines Corporation  Content management system and methodology employing a treebased table hierarchy featuring arbitrary information retrieval from different locations in the hierarchy 
US20030200218A1 (en) *  20020423  20031023  International Business Machines Corporation  Content management system and methodology featuring query conversion capability for efficient searching 
US20030200256A1 (en) *  20020423  20031023  International Business Machines Corporation  Method and apparatus of parameter passing of structured data for stored procedures in a content management system 
US20030200202A1 (en) *  20020423  20031023  International Business Machines Corporation  Content management system and methodology employing nontransferable access tokens to control data access 
US20030204537A1 (en) *  20020423  20031030  International Business Machines Corporation  Content management system and methodology for implementing a complex object using nested/recursive structures 
US20030223750A1 (en) *  20010705  20031204  Farmer James O.  Method and system for providing a return path for signals generated by legacy terminals in an optical network 
US20040131357A1 (en) *  20010705  20040708  Wave7 Optics, Inc.  Method and system for supporting multiple services with a subscriber optical interface located outside a subscriber's premises 
WO2003098429A3 (en) *  20020516  20040715  Giesecke & Devrient Gmbh  Modular inversion that is protected against espionage 
US20040141747A1 (en) *  20010705  20040722  Wave7 Optics, Inc.  Method and system for supporting multiple service providers within a single optical network 
US20040151310A1 (en) *  20030131  20040805  Fu Kevin E.  Method and system for relating cryptographic keys 
US20040179680A1 (en) *  20010430  20040916  PierreYvan Liardet  Method for encrypting a calculation using a modular function 
US20050018842A1 (en) *  20030721  20050127  Fu Kevin E.  Windowed backward key rotation 
US20050053350A1 (en) *  20021015  20050310  Wave7 Optics, Inc.  Reflection suppression for an optical fiber 
US20050081041A1 (en) *  20031010  20050414  JingJang Hwang  Partition and recovery of a verifiable digital secret 
US20050125837A1 (en) *  20010705  20050609  Wave7 Optics, Inc.  Method and system for providing a return path for signals generated by legacy video service terminals in an optical network 
US20050160432A1 (en) *  20040116  20050721  International Business Machines Corporation  Parameter passing of data structures where API and corresponding stored procedure are different versions/releases 
US6938050B2 (en)  20020423  20050830  International Business Machines Corporation  Content management system and methodology employing a treebased table hierarchy which accomodates opening a dynamically variable number of cursors therefor 
US6947948B2 (en)  20020423  20050920  International Business Machines Corporation  Versionenabled, multityped, multitargeting referential integrity relational database system and methodology 
US6973271B2 (en)  20001004  20051206  Wave7 Optics, Inc.  System and method for communicating optical signals between a data service provider and subscribers 
US20060020975A1 (en) *  20010705  20060126  Wave7 Optics, Inc.  System and method for propagating satellite TVband, cable TVband, and data signals over an optical network 
US20060039699A1 (en) *  20040810  20060223  Wave7 Optics, Inc.  Countermeasures for idle pattern SRS interference in ethernet optical network systems 
US20060075428A1 (en) *  20041004  20060406  Wave7 Optics, Inc.  Minimizing channel change time for IP video 
US7039329B2 (en)  20010705  20060502  Wave7 Optics, Inc.  System and method for increasing upstream communication efficiency in an optical network 
US20060092251A1 (en) *  20041104  20060504  HewlettPackard Development Company, L.P.  Inkjet compositions 
US20060159457A1 (en) *  20010705  20060720  Wave7 Optics, Inc.  System and method for communicating optical signals between a data service provider and subscribers 
US20060187863A1 (en) *  20041221  20060824  Wave7 Optics, Inc.  System and method for operating a wideband return channel in a bidirectional optical communication system 
US20060248336A1 (en) *  20050428  20061102  Secure Data In Motion, Inc.  Mediated key exchange between source and target of communication 
US20060269285A1 (en) *  20020108  20061130  Wave7 Optics, Inc.  Optical network system and method for supporting upstream signals propagated according to a cable modem protocol 
US7146104B2 (en)  20010705  20061205  Wave7 Optics, Inc.  Method and system for providing a return data path for legacy terminals by using existing electrical waveguides of a structure 
US20070043945A1 (en) *  20050819  20070222  Choi JinHyeock  Method for performing multiple preshared key based authentication at once and system for executing the method 
US7184664B2 (en)  20010705  20070227  Wave7 Optics, Inc.  Method and system for providing a return path for signals generated by legacy terminals in an optical network 
US20070047959A1 (en) *  20050812  20070301  Wave7 Optics, Inc.  System and method for supporting communications between subcriber optical interfaces coupled to the same laser transceiver node in an optical network 
US20070077069A1 (en) *  20001004  20070405  Farmer James O  System and method for communicating optical signals upstream and downstream between a data service provider and subscribers 
US7218855B2 (en)  20010705  20070515  Wave7 Optics, Inc.  System and method for communicating optical signals to multiple subscribers having various bandwidth demands connected to the same optical waveguide 
US7254600B2 (en)  20020920  20070807  Stmicroelectronics S.A.  Masking of factorized data in a residue number system 
EP1815411A2 (en) *  20040930  20070808  American Express Travel Related Services Company, Inc.  System and method for authenticating a rf transaction using a radio frequency identification device including a transactions counter 
US20070212070A1 (en) *  20030314  20070913  Farmer James O  Method and system for providing a return path for signals generated by legacy terminals in an optical network 
US20070223928A1 (en) *  20010803  20070927  Farmer James O  Method and system for providing a return path for signals generated by legacy terminals in an optical network 
US20070253551A1 (en) *  20031006  20071101  Canal + Technologies  Portable Security Module Pairing 
US20070263577A1 (en) *  20040820  20071115  Paolo Gallo  Method for Enrolling a User Terminal in a Wireless Local Area Network 
US20070292133A1 (en) *  20020520  20071220  Whittlesey Paul F  System and method for communicating optical signals to multiple subscribers having various bandwidth demands connected to the same optical waveguide 
US20080082824A1 (en) *  20060928  20080403  Ibrahim Wael M  Changing of shared encryption key 
US20080085117A1 (en) *  20040819  20080410  Farmer James O  System and method for communicating optical signals between a data service provider and subscribers 
US7392246B2 (en)  20030214  20080624  International Business Machines Corporation  Method for implementing access control for queries to a content management system 
US20080219450A1 (en) *  20070307  20080911  Nevine Maurice Nassif Ebeid  Methods And Apparatus For Performing An Elliptic Curve Scalar Multiplication Operation Using Splitting 
WO2008106792A1 (en) *  20070306  20080912  Research In Motion Limited  Methods and apparatus for performing an elliptic curve scalar multiplication operation using splitting 
US20090003606A1 (en) *  20070628  20090101  Samsung Electronics Co., Ltd.  Changing the order of public key cryptographic computations 
US7477741B1 (en)  20041001  20090113  The United States Of America As Represented By The Administrator Of The National Aeronautics And Space Administration  Analysis resistant cipher method and apparatus 
US20090052657A1 (en) *  20051028  20090226  Telecom Italia S.P.A.  Method for Scalar Multiplication in Elliptic Curve Groups Over Binary Polynomial Fields for SideChannel AttackResistant Cryptosystems 
US20090164796A1 (en) *  20071221  20090625  Daon Holdings Limited  Anonymous biometric tokens 
US7764785B2 (en)  20041108  20100727  King Fahd University Of Petroleum And Minerals  Method for communicating securely over an insecure communication channel 
US20100299266A1 (en) *  20090520  20101125  MDot, Inc.  Digital Incentives Issuance, Redemption, and Reimbursement 
US20100296654A1 (en) *  20090519  20101125  Terence Wilson  Configuring a network connection 
KR101083200B1 (en) *  20031006  20111111  나그라 톰슨 라이센싱  Portable security module pairing 
US8059814B1 (en) *  20070928  20111115  Emc Corporation  Techniques for carrying out seed or key derivation 
US20120082307A1 (en) *  20090616  20120405  Morpho  Cryptography on a elliptical curve 
CN103221917A (en) *  20100929  20130724  纳格拉影像股份有限公司  Protecting modular exponentiation in cryptographic operations 
US20130218937A1 (en) *  20101227  20130822  Mitsubishi Electric Corporation  Arithmetic apparatus, elliptic scalar multiplication method of arithmetic apparatus, elliptic scalar multiplication program, residue operation method of arithmetic apparatus, and residue operation program 
US8539254B1 (en)  20100601  20130917  Xilinx, Inc.  Method and integrated circuit for protecting against differential power analysis attacks 
US8583944B1 (en)  20100804  20131112  Xilinx, Inc.  Method and integrated circuit for secure encryption and decryption 
US8650408B2 (en)  20100908  20140211  Xilinx, Inc.  Protecting against differential power analysis attacks on decryption keys 
US8712038B2 (en)  20090616  20140429  Morpho  Cryptography on a simplified elliptical curve 
US20140129604A1 (en) *  20121107  20140508  Inside Secure  Cryptographic method comprising a modular exponentiation operation 
US8832462B2 (en)  20100908  20140909  Xilinx, Inc.  Protecting against differential power analysis attacks on sensitive data 
US20140331051A1 (en) *  20021008  20141106  Koolspan, Inc.  Localized network authentication and security using tamperresistant keys 
US8909941B1 (en)  20110331  20141209  Xilinx, Inc.  Programmable integrated circuit and a method of enabling the detection of tampering with data provided to a programmable integrated circuit 
US8966253B1 (en)  20100601  20150224  Xilinx, Inc.  Method and apparatus for authenticating a programmable device bitstream 
US20150222422A1 (en) *  20140131  20150806  Google Inc.  Systems and methods for faster public key encryption using the associated private key portion 
CN104917608A (en) *  20150519  20150916  清华大学  Key antipower attack method 
US20160134419A1 (en) *  20141111  20160512  Ned M. Smith  Technologies for trusted device onboarding 
US20160323097A1 (en) *  20150430  20161103  Nxp B.V.  Securing a cryptographic device 
US20170063556A1 (en) *  20020726  20170302  Koninklijke Philips N.V.  Secure authenticated distance measurement 
EP2201718A4 (en) *  20071008  20170719  Microsoft Technology Licensing Llc  An efficient certified email protocol 
WO2017152056A1 (en) *  20160303  20170908  Cryptography Research, Inc.  Converting a boolean masked value to an arithmetically masked value for cryptographic operations 
US9773111B2 (en)  20120814  20170926  Empire Technology Development Llc  Softwarebased sidechannel attack prevention 
US9866371B2 (en)  20090616  20180109  Morpho  Cryptography on a simplified elliptical curve 
Families Citing this family (179)
Publication number  Priority date  Publication date  Assignee  Title 

US6963859B2 (en)  19941123  20051108  Contentguard Holdings, Inc.  Content rendering repository 
JPH08263438A (en)  19941123  19961011  Xerox Corp  Distribution and use control system for digital work, and method for controlling access to digital work 
US6233684B1 (en)  19970228  20010515  Contenaguard Holdings, Inc.  System for controlling the distribution and use of rendered digital works through watermaking 
US6748410B1 (en)  19970504  20040608  MSystems Flash Disk Pioneers, Ltd.  Apparatus and method for modular multiplication and exponentiation based on montgomery multiplication 
DE69840782D1 (en) *  19980102  20090604  Cryptography Res Inc  Leakresistant cryptographic method and apparatus 
US7587044B2 (en)  19980102  20090908  Cryptography Research, Inc.  Differential power analysis method and apparatus 
FR2776445A1 (en)  19980317  19990924  Schlumberger Ind Sa  Cryptographic algorithm security technique 
CA2332350C (en) *  19980518  20150707  Giesecke & Devrient Gmbh  Accessprotected data carrier 
CA2333095C (en)  19980603  20050510  Cryptography Research, Inc.  Improved des and other cryptographic processes with leak minimization for smartcards and other cryptosystems 
DE69935913T2 (en)  19980702  20080110  Cryptography Research Inc., San Francisco  A leak resistant update an indexed cryptographic wrench 
CA2243761C (en) *  19980721  20091006  Certicom Corp.  Timing attack resistant cryptographic system 
US6578143B1 (en) *  19981218  20030610  Qualcomm Incorporated  Method for negotiating weakened keys in encryption systems 
US7599491B2 (en)  19990111  20091006  Certicom Corp.  Method for strengthening the implementation of ECDSA against power analysis 
US7092523B2 (en)  19990111  20060815  Certicom Corp.  Method and apparatus for minimizing differential power attacks on processors 
WO2000048108A1 (en)  19990212  20000817  Mack Hicks  System and method for providing certificationrelated and other services 
FR2790890B1 (en) *  19990308  20010427  Gemplus Card Int  Process for countermeasure against an electronic component implementing a cryptographic algorithm secret key 
US6298135B1 (en)  19990429  20011002  Motorola, Inc.  Method of preventing power analysis attacks on microelectronic assemblies 
FR2793904B1 (en) *  19990521  20010727  St Microelectronics Sa  Method and device for managing an electronic circuit 
FR2794592B1 (en) *  19990604  20010824  France Telecom  Generator bits for establishing a secret key encryption and corresponding method 
US6804782B1 (en) *  19990611  20041012  General Instrument Corporation  Countermeasure to power attack and timing attack on cryptographic operations 
FI115259B (en) *  19990716  20050331  Setec Oy  A method for producing a response in 
EP1081891A3 (en) *  19990902  20020522  Compaq Computer Corporation  Autokey initialization of cryptographic devices 
US20020029200A1 (en)  19990910  20020307  Charles Dulin  System and method for providing certificate validation and other services 
CA2384242A1 (en)  19990924  20010405  Mary Mckenney  System and method for providing payment services in electronic commerce 
FR2799851B1 (en) *  19991014  20020125  Gemplus Card Int  Process for againstable in an electronic component using a cryptographic algorithm rsa type of public key 
FR2800478B1 (en) *  19991028  20011130  Bull Cp8  Process for securisation of an electronic set of cryptographybased modular exponentiation against physical analysis by attacks 
DE59914370D1 (en) *  19991103  20070719  Infineon Technologies Ag  coding 
US6724894B1 (en)  19991105  20040420  Pitney Bowes Inc.  Cryptographic device having reduced vulnerability to sidechannel attack and method of operating same 
DE60025401T2 (en) *  19991129  20060914  General Instrument Corporation  Generating a mathematical restricted key using a oneway function 
DE19963408A1 (en) *  19991228  20010830  Giesecke & Devrient Gmbh  A portable data carrier with access protection by key division 
DE19963407A1 (en) *  19991228  20010712  Giesecke & Devrient Gmbh  A portable data carrier with access protection by news alienation 
US6973570B1 (en) *  19991231  20051206  Western Digital Ventures, Inc.  Integrated circuit comprising encryption circuitry selectively enabled by verifying a device 
US6983366B1 (en) *  20000214  20060103  Safenet, Inc.  Packet Processor 
JP3926532B2 (en)  20000316  20070606  株式会社日立製作所  The information processing apparatus, information processing method, and the card member 
US6732175B1 (en) *  20000413  20040504  Intel Corporation  Network apparatus for switching based on content of application data 
DE50010164D1 (en) *  20000522  20050602  Infineon Technologies Ag  Security data processing unit and associated method 
KR100377172B1 (en) *  20000613  20030326  주식회사 하이닉스반도체  Key Scheduller of encryption device using data encryption standard algorithm 
FR2810481B1 (en) *  20000620  20030404  Gemplus Card Int  of access control has a data processing means 
FI112013B (en) *  20000711  20031015  Setec Oy  A method of handling a secret key and a hardware 
EP1323061A1 (en) *  20000814  20030702  Peter H. Gien  System and method for facilitating signing by buyers in electronic commerce 
US7743259B2 (en)  20000828  20100622  Contentguard Holdings, Inc.  System and method for digital rights management using a standard rendering engine 
US7913095B2 (en)  20000828  20110322  Contentguard Holdings, Inc.  Method and apparatus for providing a specific user interface in a system for managing content 
FR2813468B1 (en) *  20000829  20030110  Gemplus Card Int  Security of access by secret code has a data processing means 
EP1325599A1 (en)  20000908  20030709  Paul Donfried  System and method for providing authorization and other services 
WO2002021408A1 (en)  20000908  20020314  Tallent Guy S  System and method for transparently providing certificate validation and other services within an electronic transaction 
US7620832B2 (en) *  20000920  20091117  Mips Technologies, Inc.  Method and apparatus for masking a microprocessor execution signature 
FI112708B (en) *  20000929  20031231  Setec Oy  Method and device for calculating a response 
FI112707B (en) *  20000929  20031231  Setec Oy  A method of handling a secret key 
US6769062B1 (en)  20001025  20040727  Ericsson Inc.  Method and system of using an insecure cryptoaccelerator 
US7343324B2 (en)  20001103  20080311  Contentguard Holdings Inc.  Method, system, and computer readable medium for automatically publishing content 
FR2818846B1 (en) *  20001222  20040305  Gemplus Card Int  Process for countermeasure against an electronic component implementing a cryptographic algorithm 
US6912294B2 (en)  20001229  20050628  Contentguard Holdings, Inc.  Multistage watermarking process and system 
US8069116B2 (en)  20010117  20111129  Contentguard Holdings, Inc.  System and method for supplying and managing usage rights associated with an item repository 
US7028009B2 (en)  20010117  20060411  Contentguardiholdings, Inc.  Method and apparatus for distributing enforceable property rights 
FR2820576B1 (en) *  20010208  20030620  St Microelectronics Sa  Encryption Method protects against the analyzes of energetics consumption and component using such an encryption process 
JP4651212B2 (en) *  20010322  20110316  大日本印刷株式会社  Portable information storage medium, and an authentication method 
US7516325B2 (en)  20010406  20090407  Certicom Corp.  Device authentication in a PKI 
US8275709B2 (en)  20010531  20120925  Contentguard Holdings, Inc.  Digital rights management of content when content is a future live event 
US8275716B2 (en)  20010531  20120925  Contentguard Holdings, Inc.  Method and system for subscription digital rights management 
US20080021836A1 (en)  20010531  20080124  Contentguard Holding, Inc.  Method and system for subscription digital rights management 
US6876984B2 (en)  20010531  20050405  Contentguard Holdings, Inc.  Method and apparatus for establishing usage rights for digital content to be created in the future 
US8099364B2 (en)  20010531  20120117  Contentguard Holdings, Inc.  Digital rights management of content when content is a future live event 
US7725401B2 (en)  20010531  20100525  Contentguard Holdings, Inc.  Method and apparatus for establishing usage rights for digital content to be created in the future 
US7774279B2 (en)  20010531  20100810  Contentguard Holdings, Inc.  Rights offering and granting 
US8001053B2 (en)  20010531  20110816  Contentguard Holdings, Inc.  System and method for rights offering and granting using shared state variables 
US6895503B2 (en)  20010531  20050517  Contentguard Holdings, Inc.  Method and apparatus for hierarchical assignment of rights to documents and documents having such rights 
US7318145B1 (en)  20010601  20080108  Mips Technologies, Inc.  Random slip generator 
US7774280B2 (en)  20010607  20100810  Contentguard Holdings, Inc.  System and method for managing transfer of rights using shared state variables 
KR20030096250A (en)  20010607  20031224  콘텐트가드 홀딩즈 인코포레이티드  Method and apparatus for supporting multiple trust zones in a digital rights management system 
DE10143728B4 (en)  20010906  20040902  Infineon Technologies Ag  Device and method for calculating a result of a modular exponentiation 
FR2830146B1 (en) *  20010924  20031031  Gemplus Card Int  Process for implementation in an electronic component, a cryptography algorithm and corresponding component 
CN100390695C (en) *  20011114  20080528  国际商业机器公司  Device and method with reduced information leakage 
US7974923B2 (en)  20011120  20110705  Contentguard Holdings, Inc.  Extensible rights expression processing system 
US7558759B2 (en)  20011120  20090707  Contentguard Holdings, Inc.  Systems and methods for creating, manipulating and processing rights and contract expressions using tokenized templates 
US7840488B2 (en)  20011120  20101123  Contentguard Holdings, Inc.  System and method for granting access to an item or permission to use an item based on configurable conditions 
US7243853B1 (en) *  20011204  20070717  Visa U.S.A. Inc.  Method and system for facilitating memory and application management on a secured token 
US7076059B1 (en) *  20020117  20060711  Cavium Networks  Method and apparatus to implement the data encryption standard algorithm 
US20030233169A1 (en)  20020314  20031218  Contentguard Holdings, Inc.  System and method for expressing usage rights using light signals 
US7805371B2 (en)  20020314  20100928  Contentguard Holdings, Inc.  Rights expression profile system and method 
JP2003296680A (en) *  20020329  20031017  Hitachi Ltd  Data processor 
EP1502221A4 (en)  20020429  20090805  Contentguard Holdings Inc  Rights management system using legality expression language 
DE10230098A1 (en) *  20020704  20040219  Siemens Ag  A method for authentication of a first object relative to at least one other object, in particular a vehicle with respect to at least one key 
FR2842052B1 (en) *  20020705  20040924  France Telecom  Method and cryptographic devices to alleviate calculations during transactions 
US7343011B2 (en) *  20020715  20080311  Conexant, Inc.  Secure telecommunications system for wireless local area networks 
KR100745436B1 (en) *  20020729  20070802  인터내셔널 비지네스 머신즈 코포레이션  Groups signature scheme 
US20040139021A1 (en)  20021007  20040715  Visa International Service Association  Method and system for facilitating data access and management on a secure token 
KR101047641B1 (en)  20021007  20110708  텔레폰악티에볼라겟엘엠에릭슨(펍)  Enhanced Security and Privacy for Security Devices 
US7574731B2 (en) *  20021008  20090811  Koolspan, Inc.  Selfmanaged network access using localized access management 
US7325134B2 (en) *  20021008  20080129  Koolspan, Inc.  Localized network authentication and security using tamperresistant keys 
US7725933B2 (en) *  20031007  20100525  Koolspan, Inc.  Automatic hardwareenabled virtual private network system 
US7934005B2 (en) *  20030908  20110426  Koolspan, Inc.  Subnet box 
US7607015B2 (en) *  20021008  20091020  Koolspan, Inc.  Shared network access using different access keys 
CN1708942B (en) *  20021031  20101103  艾利森电话股份有限公司  Secure implementation and utilization of devicespecific security data 
US7895443B2 (en) *  20021105  20110222  Safenet, Inc.  Secure authentication using hardware token and computer fingerprint 
DE10304451B3 (en) *  20030204  20040902  Infineon Technologies Ag  Modular exponentiation with randomized exponent 
US20060179305A1 (en) *  20040311  20060810  Junbiao Zhang  WLAN session management techniques with secure rekeying and logoff 
CN1759550A (en) *  20030314  20060412  汤姆森特许公司  WLAN session management techniques with secure rekeying and logoff 
GB2399904B (en) *  20030328  20050817  Sharp Kk  Side channel attack prevention in data processing apparatus 
US7551737B2 (en) *  20030331  20090623  International Business Machines Corporation  Cryptographic keys using random numbers instead of random primes 
JP4759513B2 (en) *  20030602  20110831  リキッド・マシンズ・インコーポレーテッドＬｉｑｕｉｄ Ｍａｃｈｉｎｅｓ，Ｉｎｃ．  Dynamic management of data objects in a distributed and collaborative environment 
US7685642B2 (en)  20030626  20100323  Contentguard Holdings, Inc.  System and method for controlling rights expressions by stakeholders of an item 
FR2858496B1 (en) *  20030731  20050930  Gemplus Card Int  Method for secure implementation of an RSAtype cryptographic algorithm and corresponding component 
KR20060069448A (en) *  20030808  20060621  코닌클리케 필립스 일렉트로닉스 엔.브이.  Reproducing encrypted content using region keys 
US8489452B1 (en)  20030910  20130716  Target Brands, Inc.  Systems and methods for providing a user incentive program using smart card technology 
US7389530B2 (en) *  20030912  20080617  International Business Machines Corporation  Portable electronic door opener device and method for secure door opening 
US20050089190A1 (en) *  20031023  20050428  Eyal Shavit  Recording content distribution information into an adjunct to content 
WO2005057507A3 (en) *  20031202  20061102  Koolspan Inc  Remote secure authorization 
JP4626148B2 (en) *  20040107  20110202  株式会社日立製作所  Calculation of modular exponentiation operation in the decoding or signature creation 
US7457964B2 (en) *  20040204  20081125  Microsoft Corporation  Trusted path for transmitting content thereon 
WO2005119960A3 (en) *  20040601  20060810  Univ Ben Gurion  Structure preserving database encryption method and system 
WO2007001329A3 (en) *  20040729  20090416  Infoassure Inc  Cryptographic key management 
KR100652377B1 (en) *  20040806  20070228  삼성전자주식회사  A modular exponentiation algorithm, a record device including the algorithm and a system using the algorithm 
WO2006027430A1 (en) *  20040816  20060316  France Telecom  Method for carrying out authentication between entities communicating with one another over a telecommunications network 
JP4326443B2 (en) *  20041008  20090909  フェリカネットワークス株式会社  The information processing apparatus, information processing method, and program 
EP1815635B9 (en) *  20041111  20140115  Certicom Corp.  Custom static diffiehellman groups 
EP1825632B1 (en)  20041111  20160120  Certicom Corp.  Secure interface for versatile key derivation function support 
US8660961B2 (en)  20041118  20140225  Contentguard Holdings, Inc.  Method, system, and device for licensecentric content consumption 
FR2879866B1 (en) *  20041222  20070720  Sagem  Method and device execution of a cryptographic calculation 
US8467535B2 (en) *  20050118  20130618  Certicom Corp.  Accelerated verification of digital signatures and public keys 
JP5068176B2 (en)  20050118  20121107  サーティコム コーポレーション  Verification that has been the promotion of digital signature and public key 
FR2882209A1 (en) *  20050211  20060818  France Telecom  Method for authenticating an electonic label using a cryptographic algorithm public key 
US20060210071A1 (en) *  20050316  20060921  Chandran Gayathiri R  Encryption of securitysensitive data 
US8200972B2 (en) *  20050316  20120612  International Business Machines Corporation  Encryption of securitysensitive data by reusing a connection 
FR2884004B1 (en) *  20050330  20070629  Oberthur Card Syst Sa  data processing involving a modular exponentiation Method and device combines 
WO2006118086A1 (en)  20050428  20061109  Matsushita Electric Industrial Co., Ltd.  Program converter, encrypting device, and encrypting method 
FR2887351A1 (en) *  20050616  20061222  St Microelectronics Sa  Protecting a modular exponentiation calculation performed by circuitry integrated 
FR2889349A1 (en)  20050726  20070202  St Microelectronics Sa  Method and device for securing integrated circuit including a microprocessor card 
KR20080039497A (en) *  20050819  20080507  엔엑스피 비 브이  Circuit arrangement for and method of performing an inversion operation in a cryptographic calculation 
WO2007020564A3 (en) *  20050819  20070531  Koninkl Philips Electronics Nv  Circuit arrangement and method for rsa key generation 
US8041032B2 (en) *  20050819  20111018  Cardiac Pacemakers, Inc.  Symmetric key encryption system with synchronously updating expanded key 
FR2890267B1 (en) *  20050826  20071005  Viaccess Sa  A method of establishing a session key and units for implementing the METHOD 
FR2890269A1 (en) *  20050901  20070302  France Telecom  Electronic object e.g. radio frequency identifier type electronic label, authenticating method, involves encrypting number using oneway function, and determining cryptogram from secret identifier, of encrypted number and variable 
US7720767B2 (en)  20051024  20100518  Contentguard Holdings, Inc.  Method and system to support dynamic rights and resources sharing 
FR2895609A1 (en) *  20051226  20070629  Gemplus Sa  Cryptographic method for forming modular exponentiation, involves masking operand with random number, and forming modular exponentiation of operand masked by exponent using Montgomery multiplier 
KR100850202B1 (en) *  20060304  20080804  삼성전자주식회사  Cryptographic method for countering DFA using ECC fast Montgomery power ladder algorithm 
US7971058B2 (en) *  20060327  20110628  Kyocera Corporation  System and method for generating a plaintext / cyphertext database for use in device authentication 
US8301890B2 (en) *  20060810  20121030  Inside Secure  Software execution randomization 
US7613907B2 (en) *  20060811  20091103  Atmel Corporation  Embedded software camouflage against code reverse engineering 
US7984301B2 (en) *  20060817  20110719  Inside Contactless S.A.  Biprocessor architecture for secure systems 
US7554865B2 (en) *  20060921  20090630  Atmel Corporation  Randomizing current consumption in memory devices 
US7822207B2 (en) *  20061222  20101026  Atmel Rousset S.A.S.  Key protection mechanism 
US8243919B2 (en)  20070307  20120814  Research In Motion Limited  Method and apparatus for performing elliptic curve scalar multiplication in a manner that counters power analysis attacks 
US8391479B2 (en) *  20070307  20130305  Research In Motion Limited  Combining interleaving with fixedsequence windowing in an elliptic curve scalar multiplication 
US8280041B2 (en) *  20070312  20121002  Inside Secure  Chinese remainder theorembased computation method for cryptosystems 
EP1998491A1 (en) *  20070531  20081203  Thomson Licensing  Method for calculating compressed RSA moduli 
US7907735B2 (en)  20070615  20110315  Koolspan, Inc.  System and method of creating and sending broadcast and multicast data 
US7936871B2 (en) *  20070628  20110503  Samsung Electronics Co., Ltd.  Altering the size of windows in public key cryptographic computations 
US8290151B2 (en) *  20071012  20121016  Infineon Technologies Ag  Device and method for determining an inverse of a value related to a modulus 
EP2208165A4 (en) *  20071102  20101124  Certicom Corp  Signed montgomery arithmetic 
CN100488099C (en) *  20071108  20090513  西安西电捷通无线网络通信有限公司  Bidirectional access authentication method 
US8473751B2 (en)  20071213  20130625  Oberthur Technologies  Method for cryptographic data processing, particularly using an S box, and related device and software 
WO2009091611A1 (en)  20080118  20090723  Identrust, Inc.  Binding a digital certificate to multiple trust domains 
US20090184800A1 (en) *  20080122  20090723  Harris Scott C  Cellular phone Entry Techniques 
FR2926651B1 (en) *  20080123  20100521  Inside Contactless  Method and againstmeasuring devices for asymmetric cryptography 
US8312534B2 (en) *  20080303  20121113  Lenovo (Singapore) Pte. Ltd.  System and method for securely clearing secret data that remain in a computer system memory 
WO2009136361A1 (en) *  20080507  20091112  Koninklijke Philips Electronics N.V.  Exponent obfuscation 
FR2935059B1 (en) *  20080812  20120511  Groupe Des Ecoles De Telecommunications Get Ecole Nationale Superieure Des Telecommunications Enst  anomaly detection method in an encryption circuit and protected by differential logic circuit implementing such a process a 
WO2010020910A3 (en)  20080819  20100701  Nxp B.V.  Method for generating a cipherbased message authentication code 
EP2169535A1 (en) *  20080922  20100331  Thomson Licensing  Method, apparatus and computer program support for regular recoding of a positive integer 
JP5407352B2 (en) *  20090119  20140205  富士通株式会社  Decryption equipment, decryption processing program, decoding processing method 
EP2222013A1 (en) *  20090219  20100825  Thomson Licensing  Method and device for countering fault attacks 
WO2010096902A1 (en) *  20090227  20100902  Certicom Corp.  System and method for performing exponentiation in a cryptographic system 
US8245959B1 (en)  20090630  20120821  Emc Corporation  Powered card and method of disposing of the same 
EP2290872B1 (en)  20090827  20140618  Nxp B.V.  Device for generating a message authentication code for authenticating a message 
CN102725737B (en)  20091204  20160420  密码研究公司  Verifiable leakproof encryption and decryption 
US8775813B2 (en) *  20100226  20140708  Certicom Corp.  ElGamal signature schemes 
KR101610917B1 (en) *  20100308  20160411  삼성전자주식회사  Decryption method of crypto algorithm and crypto system having its 
DE102010010851A1 (en)  20100310  20110915  Giesecke & Devrient Gmbh  Spying protection during execution of an operation sequence in a portable data carrier 
US8817977B2 (en) *  20100916  20140826  Stmicroelectronics S.R.L.  Method for generating a digital signature 
EP2466523B1 (en) *  20101216  20150429  BlackBerry Limited  Method and apparatus for securing a computing device 
KR101467719B1 (en) *  20101224  20141201  미쓰비시덴키 가부시키가이샤  Signature generating device, method of generating signature, and recording medium 
US8745376B2 (en)  20111014  20140603  Certicom Corp.  Verifying implicit certificates and digital signatures 
US8334705B1 (en)  20111027  20121218  Certicom Corp.  Analog circuitry to conceal activity of logic circuitry 
US8635467B2 (en)  20111027  20140121  Certicom Corp.  Integrated circuit with logic circuitry and multiple concealing circuits 
EP2608445A1 (en) *  20111220  20130626  Gemalto SA  Method to protect a binary GCD computation against SPA attacks 
CN102664732B (en) *  20120307  20160622  南相浩  Cpk public key cryptosystem anti quantum computation method and system attacks 
US9106405B1 (en) *  20120625  20150811  Amazon Technologies, Inc.  Multiuser secret decay 
EP2918037A1 (en) *  20121112  20150916  Cryptography Research Inc.  Methods and systems for glitchresistant cryptographic discretelog based signing 
US9009495B2 (en)  20130628  20150414  Envieta, LLC  High speed cryptographic combining system, and method for programmable logic devices 
Family Cites Families (182)
Publication number  Priority date  Publication date  Assignee  Title 

US2733432A (en) *  19560131  Breckman  
FR561910A (en)  19220211  19231030  
US4214126A (en) *  19450430  19800722  Rca Corporation  Cadence suppression system 
US2632058A (en) *  19460322  19530317  Bell Telephone Labor Inc  Pulse code communication 
US3816762A (en) *  19730102  19740611  Fairchild Camera Instr Co  Noise suppression circuit 
US4243890A (en) *  19760823  19810106  Miller Bruce J  Isolator/switching assembly for data processing terminal 
US4107458A (en) *  19760823  19780815  Constant James N  Cipher computer and cryptographic system 
US4139839A (en) *  19770318  19790213  Nasa  Digital data reformatter/deserializer 
US4295041A (en)  19770826  19811013  Compagnie Internationale Pour L'informatique CiiHoneywell Bull (Societe Anonyme)  Device for the protection of access to a permanent memory of a portable data carrier 
FR2401459B1 (en) *  19770826  19800425  Cii Honeywell Bull  
US4200770A (en)  19770906  19800429  Stanford University  Cryptographic apparatus and method 
US4202051A (en)  19771003  19800506  Wisconsin Alumni Research Foundation  Digital data enciphering and deciphering circuit and method 
DE2838600C2 (en)  19771115  19820826  Hasler Ag, 3000 Bern, Ch  
US4203166A (en) *  19771205  19800513  International Business Machines Corporation  Cryptographic file security for multiple domain networks 
US4405829A (en)  19771214  19830920  Massachusetts Institute Of Technology  Cryptographic communications system and method 
US4309569A (en) *  19790905  19820105  The Board Of Trustees Of The Leland Stanford Junior University  Method of providing digital signatures 
US4369332A (en)  19790926  19830118  Burroughs Corporation  Key variable generator for an encryption/decryption device 
US4268898A (en) *  19800320  19810519  Lorain Products Corporation  Semiconductor switching circuit with clamping and energy recovery features 
DE3127843A1 (en) *  19810715  19830526  Aeg Telefunken Nachrichten  A process for the prevention of "compromising radiation" in the processing and transmission of secret data information 
JPH0113766B2 (en)  19820426  19890308  Nippon Telegraph & Telephone  
US4605921A (en) *  19830620  19860812  Riddle Herbert S  Digital wordframing technique and system 
US4569052A (en) *  19830714  19860204  Sperry Corporation  Coset code generator for computer memory protection 
US4759063A (en)  19830822  19880719  Chaum David L  Blind signature systems 
US4776011A (en)  19831024  19881004  Sony Corporation  Recursive key schedule cryptographic system 
US4605820A (en)  19831110  19860812  Visa U.S.A. Inc.  Key management system for online communication 
US4570084A (en) *  19831121  19860211  International Business Machines Corporation  Clocked differential cascode voltage switch logic systems 
US4799258A (en) *  19840213  19890117  National Research Development Corporation  Apparatus and methods for granting access to computers 
NL8401989A (en) *  19840622  19860116  Nederlanden Staat  Video terminal with beeldlijnverhaspeling. 
JPS61102167A (en) *  19841023  19860520  Yokogawa Hokushin Electric Corp  Dc/dc converter 
US4661658A (en)  19850212  19870428  International Business Machines Corporation  Offline PIN validation with DES 
US4686392A (en) *  19851030  19870811  International Business Machines Corporation  Multifunctional differential cascode voltage switch logic 
GB8608172D0 (en)  19860403  19860508  Walker S M  Computer security devices 
FR2600183B1 (en) *  19860613  19901012  Eurotechnique Sa  Integrated circuit for storing and processing information in a confidential manner comprising an antifraud device 
US4937866A (en) *  19860813  19900626  U.S. Philips Corporation  System for decoding transmitted scrambled signals 
JPH0565059B2 (en) *  19860912  19930916  Nippon Electric Co  
US5341423A (en)  19870206  19940823  General Electric Company  Masked data transmission system 
FR2617976B1 (en) *  19870710  19891110  Thomson Semiconducteurs  Detector electric binary logic level 
JPH0583959B2 (en) *  19871029  19931130  Toppan Printing Co Ltd  
JP2698588B2 (en) *  19871113  19980119  株式会社東芝  Portable electronic devices 
US5412379A (en) *  19880527  19950502  Lectron Products, Inc.  Rolling code for a keyless entry system 
JPH022475A (en)  19880615  19900108  Omron Tateisi Electron Co  Ic card 
EP0424415B1 (en)  19880705  19940202  System Sikkerhet A/S  System for protecting digital equipment against remote access 
DE3825880C1 (en)  19880729  19951221  Siemens Ag  key device 
GB8819767D0 (en)  19880819  19890705  Ncr Co  Public key diversification method 
US4932057A (en) *  19881017  19900605  Grumman Aerospace Corporation  Parallel transmission to mask data radiation 
US4905176A (en) *  19881028  19900227  International Business Machines Corporation  Random number generator circuit 
FR2638869B1 (en) *  19881110  19901221  Sgs Thomson Microelectronics  Safety device against the unauthorized detection of protected data 
US5293029A (en) *  19890117  19940308  Kabushiki Kaisha Toshiba  System for mutually certifying an IC card and an IC card terminal 
CA2045619C (en)  19890126  20000725  Per Lindholm  Method and apparatus for preventing external detection of signal information 
US5181243A (en) *  19890519  19930119  Syntellect, Inc.  System and method for communications security protection 
US5086467A (en) *  19890530  19920204  Motorola, Inc.  Dummy traffic generation 
FR2651347A1 (en)  19890822  19910301  Trt Telecom Radio Electr  number of single generation of Method for chip card and application to the cooperation of the card with a host system. 
US5412730A (en) †  19891006  19950502  Telequip Corporation  Encrypted data transmission system employing means for randomly altering the encryption keys 
US5136643A (en)  19891013  19920804  Fischer Addison M  Public/key datetime notary facility 
CA2073011A1 (en)  19891110  19910511  Giovanni Gilardi  Protective device for computers and the like, adapted to prevent the pick up, the recording and the unauthorized use of data from the computers during the working thereof, and to protect them against high energy transient disturbances taking place on the main a.c. power line 
US5249294A (en)  19900320  19930928  General Instrument Corporation  Determination of time of execution of predetermined data processing routing in relation to occurrence of prior externally observable event 
US5177430A (en) *  19900419  19930105  Moshe Mohel  Circuit for securing a power supply 
GB2247138B (en) *  19900629  19941012  Digital Equipment Corp  System and method for error detection and reducing simultaneous switching noise 
JPH0778975B2 (en) *  19900927  19950823  インターナシヨナル・ビジネス・マシーンズ・コーポレーシヨン  The optical disk drive 
FR2667715B1 (en)  19901009  19941230  Gemplus Card Int  
US5144667A (en)  19901220  19920901  Delco Electronics Corporation  Method of secure remote access 
US5136646A (en)  19910308  19920804  Bell Communications Research, Inc.  Digital document timestamping with catenate certificate 
US5149992A (en)  19910430  19920922  The State Of Oregon Acting By And Through The State Board Of Higher Education On Behalf Of Oregon State University  MOS folded sourcecoupled logic 
US5241598A (en) *  19910522  19930831  Ericsson Ge Mobile Communications, Inc.  Rolling key resynchronization in cellular verification and validation system 
US5216713A (en) *  19910624  19930601  Shield Research In Sweden  Method and apparatus for preventing extraneous detection of signal information 
US5159632A (en)  19910917  19921027  Next Computer, Inc.  Method and apparatus for public key exchange in a cryptographic system 
EP0605618A4 (en)  19910923  19980513  Microsystems Z  Enhanced security system for computing devices. 
JP3083187B2 (en) *  19910930  20000904  富士通株式会社  Key management system of the electronic wallet system 
DE69311596D1 (en)  19920227  19970724  Philips Electronics Nv  CMOS integrated circuit 
JP2821306B2 (en)  19920306  19981105  三菱電機株式会社  Authentication method and system between Ic card and terminal 
US5600324A (en) *  19920511  19970204  Rockwell International Corporation  Keyless entry system using a rolling code 
US5297201A (en) *  19921013  19940322  J.D. Technologies, Inc.  System for preventing remote detection of computer data from tempest signal emissions 
FR2704081B1 (en) *  19930416  19950519  France Telecom  A method of updating a memory card and memory card for carrying Óoeuvre this method. 
JPH08510365A (en) *  19930505  19961029  リウ，ザンクアン  Method and apparatus for data encryption 
US5297207A (en) *  19930524  19940322  Degele Steven T  Machine generation of cryptographic keys by nonlinear processes similar to processes normally associated with encryption of data 
US5917168A (en) *  19930602  19990629  HewlettPackard Company  System and method for revaluation of stored tokens in IC cards 
US5483598A (en) †  19930701  19960109  Digital Equipment Corp., Patent Law Group  Message encryption using a hash function 
US5914471A (en) *  19930720  19990622  Koninklijke Ptt Nederland N.V.  Method and apparatus for recording usage data of card operated devices 
JP2750072B2 (en) *  19930727  19980513  松下電工株式会社  Power converter 
US5399996A (en) *  19930816  19950321  At&T Global Information Solutions Company  Circuit and method for minimizing electromagnetic emissions 
JP2828218B2 (en) *  19930920  19981125  インターナシヨナル・ビジネス・マシーンズ・コーポレーシヨン  Change the method and system of the authorized password or key in a distributed communication network 
US5369706A (en)  19931105  19941129  United Technologies Automotive, Inc.  Resynchronizing transmitters to receivers for secure vehicle entry using cryptography or rolling code 
US5515438A (en) *  19931124  19960507  International Business Machines Corporation  Quantum key distribution using nonorthogonal macroscopic signals 
FR2713419B1 (en)  19931202  19960705  Gemplus Card Int  The process of DSA signature generation with portable devices at low cost. 
EP0656708A1 (en) *  19931203  19950607  International Business Machines Corporation  System and method for the transmission and validation of an updated encryption key between two users 
US5404402A (en) *  19931221  19950404  Gi Corporation  Clock frequency modulation for secure microprocessors 
JP3029381B2 (en)  19940110  20000404  富士通株式会社  Data conversion device 
US5434919A (en) *  19940111  19950718  Chaum; David  Compact endorsement signature systems 
US5631492A (en) *  19940121  19970520  Motorola  Standard cell having a capacitor and a power supply capacitor for reducing noise and method of formation 
US5412723A (en) *  19940301  19950502  International Business Machines Corporation  Mechanism for keeping a key secret from mobile eavesdroppers 
US5420925A (en) *  19940303  19950530  Lectron Products, Inc.  Rolling code encryption process for remote keyless entry system 
JPH07322602A (en)  19940523  19951208  Fujitsu Ltd  Power supply device 
US5551013A (en)  19940603  19960827  International Business Machines Corporation  Multiprocessor for hardware emulation 
US5414614A (en) *  19940606  19950509  Motorola, Inc.  Dynamically configurable switched capacitor power supply and method 
US5506905A (en) *  19940610  19960409  Delco Electronics Corp.  Authentication method for keyless entry system 
EP0693836A1 (en)  19940610  19960124  Sun Microsystems, Inc.  Method and apparatus for a keymanagement scheme for internet protocols. 
US5546463A (en)  19940712  19960813  Information Resource Engineering, Inc.  Pocket encrypting and authenticating communications device 
US5511123A (en) *  19940804  19960423  Northern Telecom Limited  Symmetric cryptographic system for data encryption 
US5557346A (en)  19940811  19960917  Trusted Information Systems, Inc.  System and method for key escrow encryption 
US5600273A (en) *  19940818  19970204  Harris Corporation  Constant delay logic circuits and methods 
US5514982A (en) *  19940818  19960507  Harris Corporation  Low noise logic family 
BE1008699A3 (en)  19940909  19960702  Banksys  Method and arrangement for selective give access to a security system. 
US5663896A (en) *  19940922  19970902  Intel Corporation  Broadcast key distribution apparatus and method using Chinese Remainder 
US5559887A (en)  19940930  19960924  Electronic Payment Service  Collection of value from stored value systems 
US5544086A (en)  19940930  19960806  Electronic Payment Services, Inc.  Information consolidation within a transaction network 
US5633930A (en) *  19940930  19970527  Electronic Payment Services, Inc.  Common cryptographic key verification in a transaction network 
US5636157A (en) *  19941003  19970603  International Business Machines Corporation  Modular 64bit integer adder 
US5737419A (en) *  19941109  19980407  Bell Atlantic Network Services, Inc.  Computer system for securing communications using split private key asymmetric cryptography 
JP2825064B2 (en) *  19941219  19981118  株式会社日本自動車部品総合研究所  Encryption device 
EP0804855B1 (en) *  19941230  20011010  Thomson Consumer Electronics, Inc.  Modem with automatic callback provisions 
US5602917A (en)  19941230  19970211  Lucent Technologies Inc.  Method for secure session key generation 
US5625692A (en)  19950123  19970429  International Business Machines Corporation  Method and system for a public key cryptosystem having proactive, robust, and recoverable distributed threshold secret sharing 
US5483182A (en) *  19950306  19960109  Motorola, Inc.  Method and apparatus for a DCDC converter an current limiting thereof 
DE19511298B4 (en)  19950328  20050818  Deutsche Telekom Ag  A method for issuing and withdrawing authorization for the reception of radio broadcasts and decoders 
US5710834A (en) *  19950508  19980120  Digimarc Corporation  Method and apparatus responsive to a code signal conveyed through a graphic image 
US5638444A (en) *  19950602  19970610  Software Security, Inc.  Secure computer communication method and system 
US5778074A (en) *  19950629  19980707  Teledyne Industries, Inc.  Methods for generating variable Sboxes from arbitrary keys of arbitrary length including methods which allow rapid key changes 
US6078663A (en)  19950630  20000620  Canon Kabushiki Kaisha  Communication apparatus and a communication system 
US5727062A (en)  19950706  19980310  Ritter; Terry F.  Variable size block ciphers 
FR2738971B1 (en) *  19950919  19971010  Schlumberger Ind Sa  Method for determination of an associated encryption key has integrated circuit 
NL1001659C2 (en) *  19951115  19970521  Nederland Ptt  A method of debiting an electronic payment means. 
US5727063A (en) *  19951127  19980310  Bell Communications Research, Inc.  Pseudorandom generator 
JPH09163469A (en) *  19951211  19970620  Alpha Corp  Device and method for remote control 
JP3504050B2 (en)  19960126  20040308  株式会社東芝  Modular exponentiation method and apparatus 
US6453296B1 (en)  19960131  20020917  Canon Kabushiki Kaisha  Electronic credit system and communication apparatus 
FR2745135B1 (en) *  19960215  19980918  Cedric Colnot  Method to allow a server to access to a service from portable devices has electronic microcircuit card type memory has e.g. 
FR2745099B1 (en)  19960219  19980327  Sgs Thomson Microelectronics  Process for sequencing a circuit integrated 
US5761306A (en) *  19960222  19980602  Visa International Service Association  Key replacement in a public key cryptosystem 
FR2745924B1 (en)  19960307  19981211  Bull Cp8  Integrated circuit perfects and method of using such an integrated circuit 
US5778069A (en)  19960410  19980707  Microsoft Corporation  Nonbiased pseudo random number generator 
CA2177622A1 (en) *  19960529  19971130  Thierry Moreau  Cryptographic data integrity apparatus and method based on pseudorandom bit generators 
US5764766A (en) †  19960611  19980609  Digital Equipment Corporation  System and method for generation of onetime encryption keys for data communications and a computer program product for implementing the same 
US5859548A (en) *  19960724  19990112  Lg Semicon Co., Ltd.  Charge recycling differential logic (CRDL) circuit and devices using the same 
US5745577A (en)  19960725  19980428  Northern Telecom Limited  Symmetric cryptographic system for data encryption 
EP0831433A1 (en) *  19960924  19980325  Koninklijke PTT Nederland N.V.  Method of making recoverable smart card transactions, a method of recovering such a transaction, as well as a smart card allowing recoverable transactions 
EP0840477B1 (en)  19961031  20120718  Panasonic Corporation  Secret key transfer method which is highly secure and can restrict the damage caused when the secret key is leaked or decoded 
GB9624127D0 (en) *  19961120  19970108  British Telecomm  Transaction system 
DE19649292A1 (en)  19961128  19980604  Deutsche Telekom Ag  Access protection method for pay television 
US5848159A (en)  19961209  19981208  Tandem Computers, Incorporated  Public key cryptographic apparatus and method 
US5821775A (en)  19961227  19981013  Intel Corporation  Method and apparatus to interface monotonic and nonmonotonic domino logic 
US5892829A (en) *  19970108  19990406  Bell Communications Research, Inc.  Method and apparatus for generating secure hash functions 
US6690795B1 (en)  19970304  20040210  Lucent Technologies Inc.  Multiple keys for decrypting data in restrictedaccess television system 
US6049613A (en) *  19970307  20000411  Jakobsson; Markus  Method and apparatus for encrypting, decrypting, and providing privacy for data values 
US6247129B1 (en) *  19970312  20010612  Visa International Service Association  Secure electronic commerce employing integrated circuit cards 
GB9707349D0 (en)  19970411  19970528  Univ Waterloo  A dynamic current mode logic family 
US6748410B1 (en)  19970504  20040608  MSystems Flash Disk Pioneers, Ltd.  Apparatus and method for modular multiplication and exponentiation based on montgomery multiplication 
WO1998050851A1 (en) *  19970504  19981112  Fortress U & T Ltd.  Improved apparatus & method for modular multiplication & exponentiation based on montgomery multiplication 
US5991415A (en) *  19970512  19991123  Yeda Research And Development Co. Ltd. At The Weizmann Institute Of Science  Method and apparatus for protecting public key schemes from timing and fault attacks 
US5917754A (en) *  19970521  19990629  Atmel Corporation  Semiconductor memory having a current balancing circuit 
US5905399A (en) *  19970630  19990518  Sun Microsystems, Inc.  CMOS integrated circuit regulator for reducing power supply noise 
US6331946B1 (en)  19970715  20011218  Silverbrook Research Pty Ltd  Method for protecting onchip memory (flash and RAM) against attacks 
US6003014A (en) *  19970822  19991214  Visa International Service Association  Method and apparatus for acquiring access using a smart card 
US6128391A (en)  19970922  20001003  Visa International Service Association  Method and apparatus for asymetric key management in a cryptographic system 
US6064740A (en) *  19971112  20000516  Curiger; Andreas  Method and apparatus for masking modulo exponentiation calculations in an integrated circuit 
US6345359B1 (en)  19971114  20020205  Raytheon Company  Inline decryption for protecting embedded software 
US6041412A (en) *  19971114  20000321  Tl Technology Rerearch (M) Sdn. Bhd.  Apparatus and method for providing access to secured data or area 
US6090153A (en)  19971205  20000718  International Business Machines Corporation  Multithresholdvoltage differential cascode voltage switch (DCVS) circuits 
US6046608A (en)  19971208  20000404  Intel Corporation  Differential precharge circuit 
US6448981B1 (en)  19971209  20020910  International Business Machines Corporation  Intermediate userinterface definition method and system 
US6107835A (en)  19971211  20000822  Intrinsity, Inc.  Method and apparatus for a logic circuit with constant power consumption 
US6066965A (en)  19971211  20000523  Evsx, Inc.  Method and apparatus for a Nnary logic circuit using 1 of 4 signals 
US6211456B1 (en)  19971211  20010403  Intrinsity, Inc.  Method and apparatus for routing 1 of 4 signals 
US6185685B1 (en)  19971211  20010206  International Business Machines Corporation  Security method and system for persistent storage and communications on computer network systems and computer network systems employing the same 
US6046931A (en)  19971211  20000404  Evsx, Inc.  Method and apparatus for a RAM circuit having Nnary output interface 
US6069497A (en)  19971211  20000530  Evsx, Inc.  Method and apparatus for a Nnary logic circuit using 1 of N signals 
US7587044B2 (en)  19980102  20090908  Cryptography Research, Inc.  Differential power analysis method and apparatus 
DE69840782D1 (en)  19980102  20090604  Cryptography Res Inc  Leakresistant cryptographic method and apparatus 
US6226750B1 (en)  19980120  20010501  Proact Technologies Corp.  Secure session tracking method and system for clientserver environment 
US6101477A (en)  19980123  20000808  American Express Travel Related Services Company, Inc.  Methods and apparatus for a travelrelated multifunction smartcard 
US6041122A (en) *  19980227  20000321  Intel Corporation  Method and apparatus for hiding crytographic keys utilizing autocorrelation timing encoding and computation 
FR2776445A1 (en) *  19980317  19990924  Schlumberger Ind Sa  Cryptographic algorithm security technique 
FR2776410B1 (en) *  19980320  20021115  Gemplus Card Int  Devices to hide the transactions effected in a microprocessor card 
US6336188B2 (en) *  19980501  20020101  Certicom Corp.  Authenticated key agreement protocol 
CN100530025C (en)  19980529  20090819  西门子公司  Method and device for processing data 
EP2280502B1 (en)  19980603  20180502  Cryptography Research, Inc.  Using unpredictable information to Resist Discovery of Secrets by External Monitoring 
WO1999067766A8 (en)  19980603  20000727  Cryptography Res Inc  Balanced cryptographic computational method and apparatus for leak minimization in smartcards and other cryptosystems 
CA2333095C (en)  19980603  20050510  Cryptography Research, Inc.  Improved des and other cryptographic processes with leak minimization for smartcards and other cryptosystems 
EP2031792B1 (en)  19980603  20130109  Cryptography Research Inc.  Secure modular exponentiation with leak minimization for smartcards and other cryptosystems 
US5998978A (en)  19980629  19991207  Motorola, Inc.  Apparatus and method for reducing energy fluctuations in a portable data device 
US6075865A (en)  19980701  20000613  Tecsec Incorporated  Cryptographic communication process and apparatus 
DE69935913T2 (en)  19980702  20080110  Cryptography Research Inc., San Francisco  A leak resistant update an indexed cryptographic wrench 
GB2371460B (en)  20010119  20041222  Clearspeed Solutions Ltd  Computer graphics 
Cited By (134)
Publication number  Priority date  Publication date  Assignee  Title 

US7218735B2 (en) *  20000418  20070515  Gemplus  Cryptography method on elliptic curves 
US20030152218A1 (en) *  20000418  20030814  JeanSebastien Coron  Cryptography method on elliptic curves 
US7130541B2 (en)  20001004  20061031  Wave7 Optics, Inc.  System and method for communicating optical signals upstream and downstream between a data service provider and subscriber 
US20020089725A1 (en) *  20001004  20020711  Wave7 Optics, Inc.  System and method for communicating optical signals upstream and downstream between a data service provider and subscribers 
US6973271B2 (en)  20001004  20051206  Wave7 Optics, Inc.  System and method for communicating optical signals between a data service provider and subscribers 
US20070077069A1 (en) *  20001004  20070405  Farmer James O  System and method for communicating optical signals upstream and downstream between a data service provider and subscribers 
US20030086140A1 (en) *  20001026  20030508  Wave7 Optics, Inc.  Method and system for processing downstream packets of an optical network 
US7085281B2 (en)  20001026  20060801  Wave7 Optics, Inc.  Method and system for processing upstream packets of an optical network 
US20030016692A1 (en) *  20001026  20030123  Wave7 Optics, Inc.  Method and system for processing upstream packets of an optical network 
US7197244B2 (en)  20001026  20070327  Wave7 Optics, Inc.  Method and system for processing downstream packets of an optical network 
US20040179680A1 (en) *  20010430  20040916  PierreYvan Liardet  Method for encrypting a calculation using a modular function 
US7536564B2 (en)  20010430  20090519  Stmicroelectronics S.A.  Method for encrypting a calculation using a modular function 
US20030046547A1 (en) *  20010530  20030306  Jakobsson Bjorn Markus  Secure distributed computation in cryptographic applications 
US6950937B2 (en) *  20010530  20050927  Lucent Technologies Inc.  Secure distributed computation in cryptographic applications 
US20030223750A1 (en) *  20010705  20031204  Farmer James O.  Method and system for providing a return path for signals generated by legacy terminals in an optical network 
US7218855B2 (en)  20010705  20070515  Wave7 Optics, Inc.  System and method for communicating optical signals to multiple subscribers having various bandwidth demands connected to the same optical waveguide 
US7269350B2 (en)  20010705  20070911  Wave7 Optics, Inc.  System and method for communicating optical signals between a data service provider and subscribers 
US7190901B2 (en)  20010705  20070313  Wave7 Optices, Inc.  Method and system for providing a return path for signals generated by legacy terminals in an optical network 
US7333726B2 (en)  20010705  20080219  Wave7 Optics, Inc.  Method and system for supporting multiple service providers within a single optical network 
US7184664B2 (en)  20010705  20070227  Wave7 Optics, Inc.  Method and system for providing a return path for signals generated by legacy terminals in an optical network 
US7146104B2 (en)  20010705  20061205  Wave7 Optics, Inc.  Method and system for providing a return data path for legacy terminals by using existing electrical waveguides of a structure 
US20030072059A1 (en) *  20010705  20030417  Wave7 Optics, Inc.  System and method for securing a communication channel over an optical network 
US20050125837A1 (en) *  20010705  20050609  Wave7 Optics, Inc.  Method and system for providing a return path for signals generated by legacy video service terminals in an optical network 
US7877014B2 (en)  20010705  20110125  Enablence Technologies Inc.  Method and system for providing a return path for signals generated by legacy video service terminals in an optical network 
US20060159457A1 (en) *  20010705  20060720  Wave7 Optics, Inc.  System and method for communicating optical signals between a data service provider and subscribers 
US7039329B2 (en)  20010705  20060502  Wave7 Optics, Inc.  System and method for increasing upstream communication efficiency in an optical network 
US20060020975A1 (en) *  20010705  20060126  Wave7 Optics, Inc.  System and method for propagating satellite TVband, cable TVband, and data signals over an optical network 
US20040131357A1 (en) *  20010705  20040708  Wave7 Optics, Inc.  Method and system for supporting multiple services with a subscriber optical interface located outside a subscriber's premises 
US20040141747A1 (en) *  20010705  20040722  Wave7 Optics, Inc.  Method and system for supporting multiple service providers within a single optical network 
US20070223928A1 (en) *  20010803  20070927  Farmer James O  Method and system for providing a return path for signals generated by legacy terminals in an optical network 
US7142670B2 (en) *  20010814  20061128  International Business Machines Corporation  Spaceefficient, sidechannel attack resistant table lookups 
US20030044003A1 (en) *  20010814  20030306  International Business Machines Corporation  Spaceefficient, sidechannel attack resistant table lookups 
US20030044014A1 (en) *  20010906  20030306  PierreYvan Liardet  Method for scrambling a calculation with a secret quantity 
US20060269285A1 (en) *  20020108  20061130  Wave7 Optics, Inc.  Optical network system and method for supporting upstream signals propagated according to a cable modem protocol 
US20030204537A1 (en) *  20020423  20031030  International Business Machines Corporation  Content management system and methodology for implementing a complex object using nested/recursive structures 
US7035854B2 (en)  20020423  20060425  International Business Machines Corporation  Content management system and methodology employing nontransferable access tokens to control data access 
US6938050B2 (en)  20020423  20050830  International Business Machines Corporation  Content management system and methodology employing a treebased table hierarchy which accomodates opening a dynamically variable number of cursors therefor 
US20030200256A1 (en) *  20020423  20031023  International Business Machines Corporation  Method and apparatus of parameter passing of structured data for stored procedures in a content management system 
US20030200224A1 (en) *  20020423  20031023  International Business Machines Corporation  Content management system and methodology employing a treebased table hierarchy featuring arbitrary information retrieval from different locations in the hierarchy 
US6999966B2 (en)  20020423  20060214  International Business Machines Corporation  Content management system and methodology for implementing a complex object using nested/recursive structures 
US7082455B2 (en)  20020423  20060725  International Business Machines Corporation  Method and apparatus of parameter passing of structured data for stored procedures in a content management system 
US6944627B2 (en)  20020423  20050913  International Business Machines Corporation  Content management system and methodology employing a treebased table hierarchy featuring arbitrary information retrieval from different locations in the hierarchy 
US6950815B2 (en)  20020423  20050927  International Business Machines Corporation  Content management system and methodology featuring query conversion capability for efficient searching 
US6947948B2 (en)  20020423  20050920  International Business Machines Corporation  Versionenabled, multityped, multitargeting referential integrity relational database system and methodology 
US20030200218A1 (en) *  20020423  20031023  International Business Machines Corporation  Content management system and methodology featuring query conversion capability for efficient searching 
US20030200202A1 (en) *  20020423  20031023  International Business Machines Corporation  Content management system and methodology employing nontransferable access tokens to control data access 
US7474748B2 (en)  20020516  20090106  Giesecke & Devrient Gmbh  Modular inversion that is protected against espionage 
US20050157870A1 (en) *  20020516  20050721  Sven Bauer  Modular inversion that is protected against espionage 
WO2003098429A3 (en) *  20020516  20040715  Giesecke & Devrient Gmbh  Modular inversion that is protected against espionage 
US20070292133A1 (en) *  20020520  20071220  Whittlesey Paul F  System and method for communicating optical signals to multiple subscribers having various bandwidth demands connected to the same optical waveguide 
US20170063556A1 (en) *  20020726  20170302  Koninklijke Philips N.V.  Secure authenticated distance measurement 
US7254600B2 (en)  20020920  20070807  Stmicroelectronics S.A.  Masking of factorized data in a residue number system 
US20140331051A1 (en) *  20021008  20141106  Koolspan, Inc.  Localized network authentication and security using tamperresistant keys 
US9294915B2 (en) *  20021008  20160322  Koolspan, Inc.  Localized network authentication and security using tamperresistant keys 
US7058260B2 (en)  20021015  20060606  Wave7 Optics, Inc.  Reflection suppression for an optical fiber 
US20050053350A1 (en) *  20021015  20050310  Wave7 Optics, Inc.  Reflection suppression for an optical fiber 
US20060251373A1 (en) *  20021015  20061109  Wave7 Optics, Inc.  Reflection suppression for an optical fiber 
US20040151310A1 (en) *  20030131  20040805  Fu Kevin E.  Method and system for relating cryptographic keys 
US7313238B2 (en) *  20030131  20071225  HewlettPackard Development Company, L.P.  Method and system for relating cryptographic keys 
US7761443B2 (en)  20030214  20100720  International Business Machines Corporation  Implementing access control for queries to a content management system 
US7392246B2 (en)  20030214  20080624  International Business Machines Corporation  Method for implementing access control for queries to a content management system 
US20080222708A1 (en) *  20030214  20080911  International Business Machines Corporation  Implementing access control for queries to a content management system 
US8682162B2 (en)  20030314  20140325  Aurora Networks, Inc.  Method and system for providing a return path for signals generated by legacy terminals in an optical network 
US20070212070A1 (en) *  20030314  20070913  Farmer James O  Method and system for providing a return path for signals generated by legacy terminals in an optical network 
US7986880B2 (en)  20030314  20110726  Enablence Usa Fttx Networks Inc.  Method and system for providing a return path for signals generated by legacy terminals in an optical network 
US20090196611A1 (en) *  20030314  20090806  Enablence Usa Fttx Networks Inc.  Method and system for providing a return path for signals generated by legacy terminals in an optical network 
US7697690B2 (en)  20030721  20100413  HewlettPackard Development Company, L.P.  Windowed backward key rotation 
US20050018842A1 (en) *  20030721  20050127  Fu Kevin E.  Windowed backward key rotation 
US20070253551A1 (en) *  20031006  20071101  Canal + Technologies  Portable Security Module Pairing 
KR101083200B1 (en) *  20031006  20111111  나그라 톰슨 라이센싱  Portable security module pairing 
US8401190B2 (en) *  20031006  20130319  Nagra France Sas  Portable security module pairing 
US20050081041A1 (en) *  20031010  20050414  JingJang Hwang  Partition and recovery of a verifiable digital secret 
US7596704B2 (en)  20031010  20090929  JingJang Hwang  Partition and recovery of a verifiable digital secret 
US20050160432A1 (en) *  20040116  20050721  International Business Machines Corporation  Parameter passing of data structures where API and corresponding stored procedure are different versions/releases 
US7467386B2 (en)  20040116  20081216  International Business Machines Corporation  Parameter passing of data structures where API and corresponding stored procedure are different versions/releases 
US8161495B2 (en)  20040116  20120417  International Business Machines Corporation  Parameters passing of data structures where API and corresponding stored procedure are different versions/releases 
US20060039699A1 (en) *  20040810  20060223  Wave7 Optics, Inc.  Countermeasures for idle pattern SRS interference in ethernet optical network systems 
US20080085117A1 (en) *  20040819  20080410  Farmer James O  System and method for communicating optical signals between a data service provider and subscribers 
US7953325B2 (en)  20040819  20110531  Enablence Usa Fttx Networks, Inc.  System and method for communicating optical signals between a data service provider and subscribers 
US20070263577A1 (en) *  20040820  20071115  Paolo Gallo  Method for Enrolling a User Terminal in a Wireless Local Area Network 
US8498617B2 (en) *  20040820  20130730  Telecom Italia S.P.A.  Method for enrolling a user terminal in a wireless local area network 
EP1815411A4 (en) *  20040930  20090429  American Express Travel Relate  System and method for authenticating a rf transaction using a radio frequency identification device including a transactions counter 
EP1815411A2 (en) *  20040930  20070808  American Express Travel Related Services Company, Inc.  System and method for authenticating a rf transaction using a radio frequency identification device including a transactions counter 
US7477741B1 (en)  20041001  20090113  The United States Of America As Represented By The Administrator Of The National Aeronautics And Space Administration  Analysis resistant cipher method and apparatus 
US20060075428A1 (en) *  20041004  20060406  Wave7 Optics, Inc.  Minimizing channel change time for IP video 
US20060092251A1 (en) *  20041104  20060504  HewlettPackard Development Company, L.P.  Inkjet compositions 
US7764785B2 (en)  20041108  20100727  King Fahd University Of Petroleum And Minerals  Method for communicating securely over an insecure communication channel 
US20060187863A1 (en) *  20041221  20060824  Wave7 Optics, Inc.  System and method for operating a wideband return channel in a bidirectional optical communication system 
US7594116B2 (en)  20050428  20090922  Proofpoint, Inc.  Mediated key exchange between source and target of communication 
WO2006115996A3 (en) *  20050428  20090409  Logan O'sullivan Bruns  Mediated key exchange between source and target of communication 
US20060248336A1 (en) *  20050428  20061102  Secure Data In Motion, Inc.  Mediated key exchange between source and target of communication 
WO2006115996A2 (en) *  20050428  20061102  Secure Data In Motion, Inc.  Mediated key exchange between source and target of communication 
US20070047959A1 (en) *  20050812  20070301  Wave7 Optics, Inc.  System and method for supporting communications between subcriber optical interfaces coupled to the same laser transceiver node in an optical network 
US8621577B2 (en)  20050819  20131231  Samsung Electronics Co., Ltd.  Method for performing multiple preshared key based authentication at once and system for executing the method 
US20070043945A1 (en) *  20050819  20070222  Choi JinHyeock  Method for performing multiple preshared key based authentication at once and system for executing the method 
US8243920B2 (en) *  20051028  20120814  Telecom Italia S.P.A.  Method for scalar multiplication in elliptic curve groups over binary polynomial fields for sidechannel attackresistant cryptosystems 
US20090052657A1 (en) *  20051028  20090226  Telecom Italia S.P.A.  Method for Scalar Multiplication in Elliptic Curve Groups Over Binary Polynomial Fields for SideChannel AttackResistant Cryptosystems 
US8127135B2 (en) *  20060928  20120228  HewlettPackard Development Company, L.P.  Changing of shared encryption key 
US20080082824A1 (en) *  20060928  20080403  Ibrahim Wael M  Changing of shared encryption key 
WO2008106792A1 (en) *  20070306  20080912  Research In Motion Limited  Methods and apparatus for performing an elliptic curve scalar multiplication operation using splitting 
US20080219450A1 (en) *  20070307  20080911  Nevine Maurice Nassif Ebeid  Methods And Apparatus For Performing An Elliptic Curve Scalar Multiplication Operation Using Splitting 
US8379844B2 (en)  20070307  20130219  Research In Motion Limited  Methods and apparatus for performing an elliptic curve scalar multiplication operation using splitting 
US8160245B2 (en) *  20070307  20120417  Research In Motion Limited  Methods and apparatus for performing an elliptic curve scalar multiplication operation using splitting 
US7974409B2 (en) *  20070628  20110705  Samsung Electronics Co., Ltd.  Changing the order of public key cryptographic computations 
US20090003606A1 (en) *  20070628  20090101  Samsung Electronics Co., Ltd.  Changing the order of public key cryptographic computations 
US8059814B1 (en) *  20070928  20111115  Emc Corporation  Techniques for carrying out seed or key derivation 
EP2201718A4 (en) *  20071008  20170719  Microsoft Technology Licensing Llc  An efficient certified email protocol 
US20090164796A1 (en) *  20071221  20090625  Daon Holdings Limited  Anonymous biometric tokens 
US20100296654A1 (en) *  20090519  20101125  Terence Wilson  Configuring a network connection 
US20100299266A1 (en) *  20090520  20101125  MDot, Inc.  Digital Incentives Issuance, Redemption, and Reimbursement 
US20100299198A1 (en) *  20090520  20101125  MDot, Inc.  Message Broker for Redemption of Digital Incentives 
US20120082307A1 (en) *  20090616  20120405  Morpho  Cryptography on a elliptical curve 
US9866371B2 (en)  20090616  20180109  Morpho  Cryptography on a simplified elliptical curve 
US8712038B2 (en)  20090616  20140429  Morpho  Cryptography on a simplified elliptical curve 
US8718276B2 (en) *  20090616  20140506  Morpho  Cryptography on a elliptical curve 
US8539254B1 (en)  20100601  20130917  Xilinx, Inc.  Method and integrated circuit for protecting against differential power analysis attacks 
US8966253B1 (en)  20100601  20150224  Xilinx, Inc.  Method and apparatus for authenticating a programmable device bitstream 
US8583944B1 (en)  20100804  20131112  Xilinx, Inc.  Method and integrated circuit for secure encryption and decryption 
US8832462B2 (en)  20100908  20140909  Xilinx, Inc.  Protecting against differential power analysis attacks on sensitive data 
US8650408B2 (en)  20100908  20140211  Xilinx, Inc.  Protecting against differential power analysis attacks on decryption keys 
US20130279692A1 (en) *  20100929  20131024  Nagravision S.A.  Protecting modular exponentiation in cryptographic operations 
CN103221917A (en) *  20100929  20130724  纳格拉影像股份有限公司  Protecting modular exponentiation in cryptographic operations 
US9176707B2 (en) *  20101227  20151103  Mitsubishi Electric Corporation  Arithmetic apparatus, elliptic scalar multiplication method of arithmetic apparatus, elliptic scalar multiplication program, residue operation method of arithmetic apparatus, and residue operation program 
US20130218937A1 (en) *  20101227  20130822  Mitsubishi Electric Corporation  Arithmetic apparatus, elliptic scalar multiplication method of arithmetic apparatus, elliptic scalar multiplication program, residue operation method of arithmetic apparatus, and residue operation program 
US8909941B1 (en)  20110331  20141209  Xilinx, Inc.  Programmable integrated circuit and a method of enabling the detection of tampering with data provided to a programmable integrated circuit 
US9773111B2 (en)  20120814  20170926  Empire Technology Development Llc  Softwarebased sidechannel attack prevention 
US9405729B2 (en) *  20121107  20160802  Inside Secure  Cryptographic method comprising a modular exponentiation operation 
US20140129604A1 (en) *  20121107  20140508  Inside Secure  Cryptographic method comprising a modular exponentiation operation 
US20150222422A1 (en) *  20140131  20150806  Google Inc.  Systems and methods for faster public key encryption using the associated private key portion 
US9264221B2 (en) *  20140131  20160216  Google Inc.  Systems and methods for faster public key encryption using the associated private key portion 
US20160134419A1 (en) *  20141111  20160512  Ned M. Smith  Technologies for trusted device onboarding 
US20160323097A1 (en) *  20150430  20161103  Nxp B.V.  Securing a cryptographic device 
CN104917608A (en) *  20150519  20150916  清华大学  Key antipower attack method 
WO2017152056A1 (en) *  20160303  20170908  Cryptography Research, Inc.  Converting a boolean masked value to an arithmetically masked value for cryptographic operations 
Also Published As
Publication number  Publication date  Type 

US20080104400A1 (en)  20080501  application 
CA2316227A1 (en)  19990715  application 
DE69834431T2 (en)  20070419  grant 
US6381699B2 (en)  20020430  grant 
US6304658B1 (en)  20011016  grant 
DE69834431T3 (en)  20090910  grant 
DE69834431D1 (en)  20060608  grant 
EP1050133A1 (en)  20001108  application 
WO1999035782A1 (en)  19990715  application 
US20030028771A1 (en)  20030206  application 
EP1050133A4 (en)  20050504  application 
CA2316227C (en)  20090811  grant 
US7792287B2 (en)  20100907  grant 
EP1050133B2 (en)  20090527  grant 
DE69840782D1 (en)  20090604  grant 
EP1050133B1 (en)  20060503  grant 
US7506165B2 (en)  20090317  grant 
Similar Documents
Publication  Publication Date  Title 

Sun et al.  Threshold proxy signatures  
Bellare et al.  The exact security of digital signaturesHow to sign with RSA and Rabin  
Boneh  Twenty years of attacks on the RSA cryptosystem  
Guajardo et al.  Physical unclonable functions and publickey crypto for FPGA IP protection  
Diffie et al.  New directions in cryptography  
He et al.  A strong user authentication scheme with smart cards for wireless communications  
US6154541A (en)  Method and apparatus for a robust highspeed cryptosystem  
Young et al.  Kleptography: Using cryptography against cryptography  
US5768388A (en)  Time delayed key escrow  
US7000110B1 (en)  Oneway function generation method, oneway function value generation device, proving device, authentication method, and authentication device  
Odelu et al.  A secure biometricsbased multiserver authentication protocol using smart cards  
US6539092B1 (en)  Leakresistant cryptographic indexed key update  
US6195433B1 (en)  Private key validity and validation  
US8386800B2 (en)  Verifiable, leakresistant encryption and decryption  
Yoon et al.  Robust biometricsbased multiserver authentication with key agreement scheme for smart cards on elliptic curve cryptosystem  
US7716484B1 (en)  System and method for increasing the security of encrypted secrets and authentication  
US20060104441A1 (en)  Password protection  
US7047408B1 (en)  Secure mutual network authentication and key exchange protocol  
US7076656B2 (en)  Methods and apparatus for providing efficient passwordauthenticated key exchange  
US6757825B1 (en)  Secure mutual network authentication protocol  
US6965673B1 (en)  Method of using transient faults to verify the security of a cryptosystem  
Biham et al.  Bug attacks  
Camenisch  Better privacy for trusted computing platforms  
US6769062B1 (en)  Method and system of using an insecure cryptoaccelerator  
US20120023336A1 (en)  System and method for designing secure clientserver communication protocols based on certificateless public key infrastructure 
Legal Events
Date  Code  Title  Description 

FPAY  Fee payment 
Year of fee payment: 4 

FPAY  Fee payment 
Year of fee payment: 8 

AS  Assignment 
Owner name: CRYPTOGRAPHY RESEARCH, INC., CALIFORNIA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:KOCHER, PAUL C.;JAFFE, JOSHUA M.;REEL/FRAME:026204/0649 Effective date: 19981228 

FPAY  Fee payment 
Year of fee payment: 12 