摘要 |
PROBLEM TO BE SOLVED: To provide a simple and effective barrier to three DFA attacks. SOLUTION: This security method includes: storing the calculation result (result) of a selected step of an iterative process forming a part of a cryptographic algorithm; performing once more at least a part of the steps of the iterative process; computing once more a result corresponding to what has been stored; comparing the two results; and denying distribution of an encrypted message (MC) if they are different. COPYRIGHT: (C)2011,JPO&INPIT
|