发明名称 |
Protecting cryptographic operations using conjugacy class functions |
摘要 |
Some embodiments provide for an improved method for performing AES cryptographic operations. The method applies a look up table operation that includes several operations embedded within look up tables. The embedded operations include a permutation operation to permute several bytes of AES state, a multiplication operation to apply a next round's protection to the AES state, an affine function and an inverse affine function to conceal the multiplication operation, and an inverse permutation operation to remove a previous round's protection. Some embodiments provide for an optimized method for efficiently performing such protected AES operations. The method alternates rounds of AES processing between software processing (e.g. processing by a CPU, performed according to software instructions) and hardware processing (e.g. processing by cryptographic ASIC). |
申请公布号 |
US9565018(B2) |
申请公布日期 |
2017.02.07 |
申请号 |
US201414291591 |
申请日期 |
2014.05.30 |
申请人 |
APPLE INC. |
发明人 |
Farrugia Augustin J.;Chevallier-Mames Benoit;Kindarji Bruno;Ciet Mathieu;Icart Thomas |
分类号 |
G06F21/00;H04L9/06;G09C1/00 |
主分类号 |
G06F21/00 |
代理机构 |
Adeli LLP |
代理人 |
Adeli LLP |
主权项 |
1. A method for performing a block cryptographic process, the method comprising:
receiving an input portion of cryptographic state that has been protected by a protection function; applying a cryptographic operation to the input portion over a series of rounds, wherein the rounds alternate between applying the cryptographic operation using a software process and applying the cryptographic operation using a hardware process, and wherein the cryptographic operation when applied during the software process rounds comprises a composition of:
a permutation operation;a substitution operation; andan inverse permutation operation to enable subsequent processing by a hardware process round. |
地址 |
Cupertino CA US |