The patent badge is an abbreviated version of the USPTO patent document. The patent badge does contain a link to the full patent document.

The patent badge is an abbreviated version of the USPTO patent document. The patent badge covers the following: Patent number, Date patent was issued, Date patent was filed, Title of the patent, Applicant, Inventor, Assignee, Attorney firm, Primary examiner, Assistant examiner, CPCs, and Abstract. The patent badge does contain a link to the full patent document (in Adobe Acrobat format, aka pdf). To download or print any patent click here.

Date of Patent:
Aug. 16, 2016

Filed:

Nov. 03, 2014
Applicant:

Cryptography Research, Inc., San Francisco, CA (US);

Inventors:

Paul C. Kocher, San Francisco, CA (US);

Joshua M. Jaffe, San Francisco, CA (US);

Benjamin C. Jun, Burlingame, CA (US);

Assignee:

Cryptography Research, Inc., San Francisco, CA (US);

Attorney:
Primary Examiner:
Assistant Examiner:
Int. Cl.
CPC ...
H04L 9/00 (2006.01); G06F 1/32 (2006.01); G06F 7/00 (2006.01); G06F 21/55 (2013.01); G06F 21/75 (2013.01); G06F 21/77 (2013.01); G06K 19/073 (2006.01); G06Q 20/34 (2012.01); G07F 7/08 (2006.01); G07F 7/10 (2006.01); G06F 1/06 (2006.01); G09C 1/00 (2006.01);
U.S. Cl.
CPC ...
H04L 9/003 (2013.01); G06F 1/06 (2013.01); G06F 1/3225 (2013.01); G06F 7/00 (2013.01); G06F 21/558 (2013.01); G06F 21/75 (2013.01); G06F 21/77 (2013.01); G06K 19/073 (2013.01); G06K 19/07363 (2013.01); G06Q 20/341 (2013.01); G07F 7/08 (2013.01); G07F 7/082 (2013.01); G07F 7/1008 (2013.01); G09C 1/00 (2013.01); G06F 2207/7223 (2013.01); G06F 2207/7266 (2013.01); H04L 2209/04 (2013.01); H04L 2209/08 (2013.01); H04L 2209/56 (2013.01);
Abstract

Information leaked from smart cards and other tamper resistant cryptographic devices can be statistically analyzed to determine keys or other secret data. A data collection and analysis system is configured with an analog-to-digital converter connected to measure the device's consumption of electrical power, or some other property of the target device, that varies during the device's processing. As the target device performs cryptographic operations, data from the A/D converter are recorded for each cryptographic operation. The stored data are then processed using statistical analysis, yielding the entire key, or partial information about the key that can be used to accelerate a brute force search or other attack.


Find Patent Forward Citations

Loading…