A secured method of cryptographic computation to generate output data from input data and from a secret key includes a derived key scheduling step to provide a derived key from the secret key according to a known key scheduling operation. The method also includes a masking step, performed before the derived key scheduling step, to mask the secret key so that the derived scheduled key is different at each implementation of the method. The present method and component can be used in transfer type applications, such as bank type applications.

 
Web www.patentalert.com

< Authentication chip for authenticating an untrusted chip

> Method for transmitting data, apparatus for recording data, medium for recording data, and apparatus for reproducing data

~ 00447