US 12,229,322 B2
Protecting parallel multiplication operations from external monitoring attacks
Guilherme Ozari de Almeida, Voorschoten (NL); Elena Trichina, Aix-en-Provence (FR); and Elke De Mulder, Kirkland, WA (US)
Assigned to CRYPTOGRAPHY RESEARCH, INC., San Jose, CA (US)
Filed by CRYPTOGRAPHY RESEARCH, INC., Sunnyvale, CA (US)
Filed on Feb. 5, 2021, as Appl. No. 17/169,074.
Application 17/169,074 is a continuation of application No. 16/471,716, granted, now 10,915,667, previously published as PCT/US2017/066052, filed on Dec. 13, 2017.
Claims priority of provisional application 62/437,396, filed on Dec. 21, 2016.
Prior Publication US 2021/0256165 A1, Aug. 19, 2021
This patent is subject to a terminal disclaimer.
Int. Cl. H04L 9/06 (2006.01); G06F 7/72 (2006.01); G06F 21/60 (2013.01); G06F 21/72 (2013.01)
CPC G06F 21/72 (2013.01) [G06F 7/724 (2013.01); G06F 21/602 (2013.01); H04L 9/0637 (2013.01); H04L 9/0643 (2013.01)] 21 Claims
OG exemplary drawing
 
1. A system for performing a cryptographic operation, the system comprising:
a first circuit to multiply a hash key by a combination of an input data block and a masked result value to produce a new masked result value, by iteratively processing operand bits starting from a first bit position;
a second circuit to multiply the hash key by a mask correction value to produce a new mask correction value, by iteratively processing operand bits starting from a second bit position, wherein the second bit position is different from the first bit position; and
a third circuit to produce a value of a cryptographic hash function based on the new masked result value and the new mask correction value, wherein the value of the cryptographic hash function is utilized for protecting the cryptographic operation from external monitoring attacks by performing by at least one of: an authenticated encryption operation or an authenticated decryption operation.