CPC H04L 9/002 (2013.01) [G06F 9/30007 (2013.01); G06F 21/556 (2013.01); H04L 9/003 (2013.01); H04L 9/0822 (2013.01); H04L 9/0631 (2013.01); H04L 2209/12 (2013.01)] | 17 Claims |
1. A method of executing a cryptographic operation, comprising:
identifying a first data manipulation instruction, the first data manipulation instruction modifying an internal state of a processing device;
identifying a second data manipulation instruction, the second data manipulation instruction interacting with the internal state of the processing device; and
breaking, by a third data manipulation instruction to be inserted between the first data manipulation instruction and the second data manipulation instruction, a detectable interaction of the first data manipulation instruction and the second data manipulation instruction via the internal state, wherein the third data manipulation instruction utilizes an unpredictable data item to modify the internal state of the processing device, wherein at least one of the first data manipulation instruction or the second data manipulation instruction belongs to an enhanced instruction set.
|