摘要 |
The current application is designed to defend a secret stored key K against external attack. It is possible to attempt to determine the value of a secret stored key by inputting the same number time and again and monitoring the resultant output while progressively modifying the stored key by external means (eg. microwave bombardment). The current application attempts to foil this approach by checking that the key K remains unchanged using a stored check value D which has a known relationship to the stored key K. If either the stored key K or the stored check value D becomes corrupted then the known relationship breaks down and encryption using the key K is prevented. |