Security patch without changing the key
    21.
    发明授权
    Security patch without changing the key 有权
    安全补丁,无需更改密钥

    公开(公告)号:US09338145B2

    公开(公告)日:2016-05-10

    申请号:US14263308

    申请日:2014-04-28

    Applicant: NXP B.V.

    CPC classification number: H04L63/0428 G06F21/16 H04L63/062

    Abstract: A method of patching a cryptographic implementation without changing a key in a cryptographic system, including: sending a message from a first message set to the cryptographic implementation, wherein the first message uses a first portion of the cryptographic implementation; deciding to patch the cryptographic implementation; sending a second message from a second message set to the cryptographic implementation after deciding to patch the cryptographic implementation, wherein the second message use a second portion of the cryptographic implementation that is not used for any messages in the first message set.

    Abstract translation: 一种在不改变加密系统中的密钥的情况下修补加密实现的方法,包括:将消息从第一消息集合发送到密码实现,其中第一消息使用密码实现的第一部分; 决定修补加密实现; 在决定修补所述加密实现之后,将第二消息从第二消息集发送到所述加密实现,其中所述第二消息使用所述密码实现的第二部分,所述第二部分不用于所述第一消息集中的任何消息。

    PROGRAM CABLE OBFUSCATION BASED UPON RECENTLY EXECUTED PROGRAM CODE
    22.
    发明申请
    PROGRAM CABLE OBFUSCATION BASED UPON RECENTLY EXECUTED PROGRAM CODE 有权
    基于最近执行的程序代码的程序电缆障碍

    公开(公告)号:US20150332027A1

    公开(公告)日:2015-11-19

    申请号:US14281232

    申请日:2014-05-19

    Applicant: NXP B.V.

    CPC classification number: G06F21/14 G06F8/40 G06F2221/0748

    Abstract: A method of obscuring software code including a plurality of instructions, comprising: determining, by a processor, a number N prior instructions to a current instruction; encoding the current instruction based upon a first function, a second function, and the N prior instructions, wherein the second function is based upon the N prior instructions, and wherein the first function is based upon the current instruction and an output of the second function.

    Abstract translation: 一种模糊包括多个指令的软件代码的方法,包括:由处理器确定当前指令的N个先前指令; 基于第一功能,第二功能和N个先前指令对当前指令进行编码,其中第二功能基于N个先前的指令,并且其中第一功能基于当前指令和第二功能的输出 。

    SECURITY PATCH WITHOUT CHANGING THE KEY
    23.
    发明申请
    SECURITY PATCH WITHOUT CHANGING THE KEY 有权
    安全保护,无需更改钥匙

    公开(公告)号:US20150312225A1

    公开(公告)日:2015-10-29

    申请号:US14263308

    申请日:2014-04-28

    Applicant: NXP B.V.

    CPC classification number: H04L63/0428 G06F21/16 H04L63/062

    Abstract: A method of patching a cryptographic implementation without changing a key in a cryptographic system, including: sending a message from a first message set to the cryptographic implementation, wherein the first message uses a first portion of the cryptographic implementation; deciding to patch the cryptographic implementation; sending a second message from a second message set to the cryptographic implementation after deciding to patch the cryptographic implementation, wherein the second message use a second portion of the cryptographic implementation that is not used for any messages in the first message set.

    Abstract translation: 一种在不改变加密系统中的密钥的情况下修补加密实现的方法,包括:将消息从第一消息集合发送到密码实现,其中第一消息使用密码实现的第一部分; 决定修补加密实现; 在决定修补所述加密实现之后,将第二消息从第二消息集发送到所述加密实现,其中所述第二消息使用所述密码实现的第二部分,所述第二部分不用于所述第一消息集中的任何消息。

    REALIZING AUTHORIZATION VIA INCORRECT FUNCTIONAL BEHAVIOR OF A WHITE-BOX IMPLEMENTATION
    24.
    发明申请
    REALIZING AUTHORIZATION VIA INCORRECT FUNCTIONAL BEHAVIOR OF A WHITE-BOX IMPLEMENTATION 有权
    通过白盒实施的不正当功能实现授权

    公开(公告)号:US20150312223A1

    公开(公告)日:2015-10-29

    申请号:US14263191

    申请日:2014-04-28

    Applicant: NXP B.V.

    Abstract: A method of authorization in a cryptographic system that provides separate authorization for a plurality of different input message groups using a single cryptographic key, including: receiving, by the cryptographic system, a first input message from a first input message group; performing, by the cryptographic system, a keyed cryptographic operation mapping the first input message into a first output message, wherein the keyed cryptographic operation produces a correct output message when the cryptographic system is authorized for the first input message group, wherein the keyed cryptographic operation does not produce a correct output when the cryptographic system is not authorized for the first input message group, and wherein each of the plurality of input message groups has an associated set of input messages wherein the sets of input messages do not overlap.

    Abstract translation: 一种加密系统中的授权方法,其使用单个加密密钥为多个不同的输入消息组提供单独的授权,包括:密码系统从第一输入消息组接收第一输入消息; 通过加密系统执行将第一输入消息映射到第一输出消息中的密钥加密操作,其中当密码系统被授权用于第一输入消息组时,密钥密码操作产生正确的输出消息,其中密钥密码操作 当加密系统未被授权用于第一输入消息组时,它不产生正确的输出,并且其中多个输入消息组中的每一个具有相关联的一组输入消息,其中输入消息组不重叠。

    SPLITTING S-BOXES IN A WHITE-BOX IMPLEMENTATION TO RESIST ATTACKS
    25.
    发明申请
    SPLITTING S-BOXES IN A WHITE-BOX IMPLEMENTATION TO RESIST ATTACKS 有权
    将白盒拆分为抵抗攻击的白盒实施

    公开(公告)号:US20150270950A1

    公开(公告)日:2015-09-24

    申请号:US14219734

    申请日:2014-03-19

    Applicant: NXP B.V.

    Abstract: A method of performing a keyed cryptographic operation mapping an input message to an output message, wherein the input message comprises m input data and the output message comprises m output data and wherein the cryptographic operation includes at least one round and the cryptographic operation specifies a substitution box for mapping input data into output data, including: transforming each of the m input data into n output data using n split substitution boxes, wherein the n split substitution boxes sum to the specified substitution box; and mixing and combining the m×n output data.

    Abstract translation: 一种执行将输入消息映射到输出消息的密钥加密操作的方法,其中所述输入消息包括m个输入数据,并且所述输出消息包括m个输出数据,并且其中所述密码操作包括至少一个回合,并且所述密码操作指定替换 用于将输入数据映射到输出数据中,包括:使用n个分割取代框将每个m个输入数据变换为n个输出数据,其中n个分割替换框求和到指定的替换框; 并混合并组合m×n个输出数据。

    Protecting the input/output of modular encoded white-box RSA

    公开(公告)号:US10726108B2

    公开(公告)日:2020-07-28

    申请号:US16391437

    申请日:2019-04-23

    Applicant: NXP B.V.

    Abstract: A method of obscuring the input and output of a modular exponentiation function, including: receiving modular exponentiation parameters including an exponent e having N bits and a modulus m; generating randomly a pre-multiplier; calculating a post-multiplier based upon the pre-multiplier, exponent e, and modulus m; multiplying an input to the modular exponentiation function by the pre-multiplier; performing the modular exponentiation function; and multiplying the output of the modular exponentiation function by the post-multiplier, wherein multiplying an input to the modular exponentiation function by the pre-multiplier, performing the modular exponentiation function, and multiplying the output of the modular exponentiation function by the post-multiplier are split variable operations.

    PROTECTING THE INPUT/OUTPUT OF MODULAR ENCODED WHITE-BOX RSA

    公开(公告)号:US20190251233A1

    公开(公告)日:2019-08-15

    申请号:US16391437

    申请日:2019-04-23

    Applicant: NXP B.V.

    Abstract: A method of obscuring the input and output of a modular exponentiation function, including: receiving modular exponentiation parameters including an exponent e having N bits and a modulus m; generating randomly a pre-multiplier; calculating a post-multiplier based upon the pre-multiplier, exponent e, and modulus m; multiplying an input to the modular exponentiation function by the pre-multiplier; performing the modular exponentiation function; and multiplying the output of the modular exponentiation function by the post-multiplier, wherein multiplying an input to the modular exponentiation function by the pre-multiplier, performing the modular exponentiation function, and multiplying the output of the modular exponentiation function by the post-multiplier are split variable operations.

    Array indexing with modular encoded values

    公开(公告)号:US10140437B2

    公开(公告)日:2018-11-27

    申请号:US14815301

    申请日:2015-07-31

    Applicant: NXP B.V.

    Abstract: A method of obscuring software code including a data array and a plurality of operations, including: identifying, by a processor, a data array with an index to be obscured and an operation using the data array; permutating the identified data array using a permutating function; and replacing the identified operation using the permutated data array and equivalent encoded permutation function.

    WHITE-BOX MODULAR EXPONENTIATION
    30.
    发明申请
    WHITE-BOX MODULAR EXPONENTIATION 审中-公开
    白盒模块化指导

    公开(公告)号:US20160328541A1

    公开(公告)日:2016-11-10

    申请号:US14815381

    申请日:2015-07-31

    Applicant: NXP B.V.

    CPC classification number: G06F21/14 G06F7/723 H04L9/002 H04L2209/16

    Abstract: A method of obscuring software code implementing a modular exponentiation function, including: receiving modular exponentiation parameters including an exponent e having N bits; generating a bitwise exponent array and inverse bitwise exponent array; and generating modular exponentiation function operations using the bitwise exponent array, inverse bitwise exponent array, and N, wherein the generated modular exponentiation function operations are split variable operations.

    Abstract translation: 一种模糊实现模幂运算功能的软件代码的方法,包括:接收包括N比特指数e的模幂运算参数; 产生按位指数阵列和反向按位指数阵列; 以及使用按位指数阵列,逆位指数阵列和N生成模幂运算函数运算,其中生成的模幂运算函数是分割变量运算。

Patent Agency Ranking