PROTECTING MODULAR INVERSION OPERATION FROM EXTERNAL MONITORING ATTACKS

Systems and methods for performing modular inversion operations in a manner protected from external monitoring attacks. An example method comprises: determining, by a processor, a first masked value based on a public cryptographic key and a first random integer value; determining a second masked val...

Full description

Saved in:
Bibliographic Details
Main Authors TUNSTALL, Michael, HAMBURG, Michael Alexander
Format Patent
LanguageEnglish
Published 28.01.2021
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:Systems and methods for performing modular inversion operations in a manner protected from external monitoring attacks. An example method comprises: determining, by a processor, a first masked value based on a public cryptographic key and a first random integer value; determining a second masked value based on the public cryptographic key and a second random integer value, and determining, based on the first masked value and the second masked value, a private cryptographic key represented by a modular inversion of the public cryptographic key.
Bibliography:Application Number: US201816756099