Abstract:
A method for evaluating data (28) is based on a computational model, the computational model comprising model data (26), a training function and a prediction function. The method comprises training the computational model by: receiving training data (22) and training result data (24) for training the computational model, and computing the model data (26) from the training data (22) and the training result data (24) with the training function. The method comprises predicting result data (30) by: receiving field data (28) for predicting result data (30); and computing the result data (30) from the field data (28) and the model data (26) with the prediction function. The training data (22) may be plaintext and the training result data (24) may be encrypted with a homomorphic encryption algorithm, wherein the model data (26) may be computed in encrypted form from the training data (22) and the encrypted training result data (24) with the training function. The field data (28) may be plaintext, wherein the result data (30) may be computed in encrypted form from the field data (28) and the encrypted model data (26) with the prediction function.
Abstract:
Disclosed are a method, a mobile terminal, a device, as well as a readable storage medium for preventing accessed data from being tampered with. The mobile terminal can: receive a data server access instruction triggered by a user for an application on the mobile terminal, and acquire from the data server a corresponding configuration file of the application and a version control file carrying verification ciphertext; encrypt the acquired configuration file according to a preset encryption method to obtain a corresponding first encrypted value of the configuration file; extract the verification ciphertext from the acquired version control file and decrypt the verification ciphertext to obtain a corresponding plaintext encrypted value; and analyze the consistency between the first encrypted value and the plaintext encrypted value and finally allow the application to access the corresponding accessed data when determining the first encrypted value and the plaintext encrypted value are consistent. Thus, the security of the offline cached accessed data is improved and the risk of the accessed data being tampered with is reduced, and in addition, the security of accessing with an application is also enhanced.
Abstract:
A method of computing a message authentication code (MAC) for a message having a common part and an independent part using a constrained processor, including: performing a MAC function on the common part of the message using a first secret key to produce a first output; performing a pseudorandom function on the independent part of the message using a second key to produce a second output, wherein the computation time of the pseudorandom function is significantly less than the computation time of the MAC function; and combining the first output and the second output to produce a computed MAC for the message.
Abstract:
Methods, system and devices are provided that generate a sequence of sub-keys for cryptographic operations from a main key. The main key is operated on only once to generate the sub-keys of the sequence, with a transformation comprising one or more one-way functions. The respective bit values of the sub-keys of the sequence are set using respective bit values of the one or more one-way functions. Advantageously, deriving sub-key bits from respective output bits of one or more one-way functions removes or at least reduces correlations between the main key and the sub-keys, as well as between sub-keys, making it harder or even impossible to recover the main key or other sub-keys from a single sub-key, for example as found using a side-channel attack. At the same time, by using the main key only once (rather than using the main key each time a sub-key is generated), the vulnerability of the main key to a side-channel attack is reduced, because the opportunities for recovering physical information that could lead to the discovery of the main key are reduced. Specific embodiments use parallel or chained execution of sub-functions to generate respective sub-keys. Other specific embodiments generate all sub-keys from a single one-way function in one go.
Abstract:
The present disclosure relates to methods and devices for a hearing system. A method for hearing system communication in a hearing system comprising a server device and a hearing device system comprising a hearing device and a user accessory device with a user application installed thereon is disclosed, the method comprising: obtaining hearing device data for the hearing device in the server device; securing the hearing device data using a first security scheme to obtain a first output; securing the first output using a second security scheme to obtain a second output, wherein the second security scheme is different from the first security scheme; transmitting the second output to the user application; validating the second output in the user application using the second security scheme to obtain the first output; transmitting the first output to the hearing device; receiving and validating the first output in the hearing device using the first security scheme to obtain the hearing device data; and operating the hearing device according to the hearing device data.
Abstract:
In some examples, a programmable device may load configuration data into a configuration storage to configure programmable logic of the programmable device. The programmable device may include a key generation logic that may read at least a portion of the configuration data from the configuration storage. The key generation logic may generate a cryptographic key based at least in part on the at least a portion of the configuration data read from the configuration storage.
Abstract:
[Problem] In the prior art, the encryption is based on conversion in the 4 byte unit, and there are "2 to the 32 nd power" types of existing information. Thus, the prior art has a problem that details of conversion in the encryption can be specified in actuality through verification using a method of inputting the "2 to 32 nd power" information which is known in advance so as to examine a conversion result. Thus, the present invention provides an encrypting device which makes decryption virtually impossible by devising an encryption unit. [Solution] An encrypting device for encrypting information into encrypted information is developed, which is composed of: an information obtaining unit for obtaining information; a unitization-for-conversion unit for unitizing the obtained information to unitized information in the 16-byte unit for conversion by a conversion unit which will be described later; and the conversion unit for converting the unitized information unitized in the unitization-for-conversion unit into converted unitized information using a function which cannot be expressed in a single linear expression.
Abstract:
Encryption method, corresponding encryption method, devices and programs. The invention relates to a method of encrypting a code to be encrypted ( Sx ) of a computer program using an encryption key ( Kx ) selected from at least two encryption keys ( Kx, Ky, Kz ). Such a method comprises: - a step of obtaining (11) a descriptive grammar ( G D ) of the language of the code to be encrypted; - a step of coding (13) the code to be encrypted ( Sx ) using the descriptive grammar (G D ) delivering a character string ( Cd C ) in which at least one start instruction (InstrD) of the code to be encrypted (Sx) is coded by a representation ( RInstrD ) in the character string ( Cd C ); - a step of encoding (14) the character string ( CdC ) using an encryption key ( Kx ) belonging to the set of encryption keys ( Kx, Ky, Kz ), delivering an encrypted string ( Cx ). The decryption method comprises the reverse steps and also makes use of the descriptive grammar of the code to be encrypted.
Abstract:
A secure calculation is performed on at least one input value. The calculation includes a number of operations, with a first operation performed on the input value, and subsequent operations performed on results produced by previous operations. An initial encryption rank is set, based on the number of operations to be performed in the calculation. The input value is encoded, together with the initial encryption rank. The calculation is then performed, such that the first operation is performed on the encoded input value to produce an encoded result, and subsequent operations are performed on respective encoded results produced by previous operations to produce further encoded results. A new encryption rank is set when an operation in the calculation is performed on the encoded input value or on an encoded result produced by a previous operation, such that the encoded result of said operation in the calculation has the new encryption rank. A decoding function provides a useable output value from an encoded result only if the encoded result has an encryption rank that has reached a predefined value.