Predicate |
Object |
assignee |
http://rdf.ncbi.nlm.nih.gov/pubchem/patentassignee/MD5_6bd4720aefb28835b9bfc5ff805f891b |
classificationCPCAdditional |
http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04L2209-08 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04L2209-12 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G06F2221-2123 |
classificationCPCInventive |
http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G09C1-00 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04L9-003 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G06F21-85 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G06F9-3836 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G06F9-321 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G06F21-755 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G06F21-72 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G06F9-30101 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G06F9-30181 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G06F9-3001 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04L9-0625 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04L9-0612 |
classificationIPCInventive |
http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/G06F21-00 http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/G06F9-38 http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/G06F9-30 http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/G06F11-30 http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/G06F21-02 http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/H04L9-06 http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/G06F1-00 http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/H04L9-00 |
filingDate |
2005-06-07-04:00^^<http://www.w3.org/2001/XMLSchema#date> |
inventor |
http://rdf.ncbi.nlm.nih.gov/pubchem/patentinventor/MD5_894475e53ca98e8e0414cebc2504c17d http://rdf.ncbi.nlm.nih.gov/pubchem/patentinventor/MD5_937f594b91a32c90bcfebf4c5e39073e http://rdf.ncbi.nlm.nih.gov/pubchem/patentinventor/MD5_4a8d02e03ef25d37217720ea4a55fa1d |
publicationDate |
2008-09-24-04:00^^<http://www.w3.org/2001/XMLSchema#date> |
publicationNumber |
GB-2447804-A |
titleOfInvention |
Cryptographic architecture with instruction masking for thwarting differential power analysis |
abstract |
The invention prevents information leakage attacks that utilise timeline alignment such as Differential Power Analysis (DPA). Data processing in a CPU is concealed by inserting a random number of instruction fetch cycles during execution of a program and, while the random number of instruction fetch cycles is occurring, mimicking the power consumption associated with fetching instructions from memory, executing the instructions in program sequence, and writing results to memory registers. The mimicking of power consumption is achieved by fetching and executing instructions but inhibiting the updating of normal memory locations, for example by updating a dummy memory location instead. At the conclusion of the random number of instructions, normal program execution recommences by re-fetching the same instructions which were initially fetched but this time updating memory locations in the normal way. The insertion of the random number of instruction fetch cycles may be controlled by a Random Instruction Mask (RIM) control flag. Other embodiments are disclosed, including a cryptographic bus architecture that prevents usage of side channel information by randomly toggling the polarity of a target bit at a data bus driver. |
isCitedBy |
http://rdf.ncbi.nlm.nih.gov/pubchem/patent/CN-110098799-A http://rdf.ncbi.nlm.nih.gov/pubchem/patent/CN-110098799-B |
priorityDate |
2004-06-08-04:00^^<http://www.w3.org/2001/XMLSchema#date> |
type |
http://data.epo.org/linked-data/def/patent/Publication |