In an electronic component using a secret key cryptographic algorithm, one operation utilizes a first table for supplying output data from input data. The output data, and/or derived data, is manipulated by critical instructions. A countermeasure method involves the use of other tables such that the output data and the derived data are unpredictable. The other tables are obtained from the first table by an exclusive-OR operation with a random value, or a derived random value, on one and/or the other of the input and output data of the first table.

 
Web www.patentalert.com

< Electronic media communication apparatus

> Gathering randomness in a wireless smart card reader

> Derivation method for cached keys in wireless communication system

~ 00531