Using smartcards or other cryptographic modules for enabling connected devices to access encrypted audio and visual content
    22.
    发明授权
    Using smartcards or other cryptographic modules for enabling connected devices to access encrypted audio and visual content 有权
    使用智能卡或其他加密模块,使连接的设备能够访问加密的音频和视频内容

    公开(公告)号:US07039816B2

    公开(公告)日:2006-05-02

    申请号:US10695256

    申请日:2003-10-27

    IPC分类号: H04N7/167 H04L9/30

    摘要: To prevent piracy, audiovisual content is encrypted prior to transmission to consumers. A low-cost, high-security cryptographic rights module (such as a smartcard) enables devices such as players/displays to decode such content. Security-critical functions may be performed by the cryptographic module in a manner that allows security compromises to be addressed by upgrading or replacing cryptographic modules, thereby avoiding the need to replace or modify other (typically much higher-cost) components. The security module contains cryptographic keys, which it uses to process rights enablement messages (REMs) and key derivation messages (KDMs). From a REM and KDM, the security module derives key data corresponding to content, uses public key and/or symmetric cryptography to re-encrypt the derived key data for another device, and provides the re-encrypted key data to the decoding device. The decoding device then uses cryptographic values derived from the re-encrypted key data to decrypt the content.

    摘要翻译: 为了防止盗版,视听内容在传输给消费者之前被加密。 低成本,高安全性的加密权限模块(如智能卡)可使诸如播放器/显示器等设备解码此类内容。 安全关键功能可以由加密模块以允许通过升级或替换加密模块来解决安全危害的方式来执行,从而避免需要替换或修改其他(通常成本更高的成本)组件。 安全模块包含加密密钥,用于处理权限启用消息(REM)和密钥导出消息(KDM)。 从REM和KDM,安全模块导出与内容对应的密钥数据,使用公开密钥和/或对称密码来对另一设备的导出密钥数据进行重新加密,并将重新加密的密钥数据提供给解码设备。 解码装置然后使用从重新加密的密钥数据导出的加密值来解密内容。

    Method and apparatus for preventing piracy of digital content
    23.
    发明授权
    Method and apparatus for preventing piracy of digital content 有权
    防止数字内容盗版的方法和装置

    公开(公告)号:US06289455B1

    公开(公告)日:2001-09-11

    申请号:US09389268

    申请日:1999-09-02

    IPC分类号: G06F1214

    摘要: A secure cryptographic rights unit for cryptographically regulating access to digital content includes an interface control processor and a specialized cryptographic unit that protects access to a memory. Rights keys, which allow access to content, are added by the cryptographic unit by transforming data received from the control processor and storing the result in the protected memory. The cryptographic unit then produces content decryption keys by using stored rights keys to transform other data received from the control processor. Because the control processor does not have the ability to directly access the protected memory, the security can remain effective even if the control processor is compromised. To prevent reverse engineering of the cryptographic transformations, the invention provides for an algorithm generator that uses random sources to produce algorithm definitions in machine-readable form. Because the generator itself does not contain any secrets, it can be submitted for open review.

    摘要翻译: 用于密码地调节对数字内容的访问的安全加密权限单元包括接口控制处理器和保护对存储器的访问的专用加密单元。 允许访问内容的权限由加密单元通过转换从控制处理器接收的数据并将结果存储在受保护的存储器中来添加。 密码单元然后通过使用存储的权限密钥来转换从控制处理器接收的其他数据来产生内容解密密钥。 由于控制处理器不具备直接访问受保护的存储器的能力,因此即使控制处理器受到威胁,安全性也可以保持有效。 为了防止加密变换的逆向工程,本发明提供了一种使用随机源产生机器可读形式的算法定义的算法生成器。 因为发电机本身不包含任何秘密,所以可以提交公开审查。

    Secure modular exponentiation with leak minimization for smartcards and other cryptosystems
    24.
    发明授权
    Secure modular exponentiation with leak minimization for smartcards and other cryptosystems 有权
    用智能卡和其他密码系统进行泄漏最小化的安全模幂运算

    公开(公告)号:US06298442B1

    公开(公告)日:2001-10-02

    申请号:US09325528

    申请日:1999-06-03

    IPC分类号: G06F1214

    摘要: Methods and apparatuses are disclosed for securing cryptosystems against external monitoring attacks by reducing the amount (and signal to noise ratio) of useful information leaked during processing. In general, this is accomplished by implementing critical operations using “branchless” or fixed execution path routines whereby the execution path does not vary in any manner that can reveal new information about the secret key during subsequent operations. More particularly, various embodiments of the invention include: implementing modular exponentiation without key-dependent conditional jumps; implementing modular exponentiation with fixed memory access patterns; implementing modular multiplication without using leak-prone multiplication-by-one operations; and implementing leak-minimizing multiplication (and other operations) for elliptic curve cryptosystems.

    摘要翻译: 公开了用于通过减少在处理期间泄露的有用信息的量(和信噪比)来保护密码系统免受外部监视攻击的方法和装置。 一般来说,这是通过使用“无分支”或固定执行路径例程实现关键操作来实现的,由此执行路径在随后的操作期间可以以任何可以揭示关于秘密密钥的新信息的方式变化。 更具体地,本发明的各种实施例包括:实现没有密钥依赖条件跳转的模幂运算; 实现具有固定存储器访问模式的模幂运算; 实现模数乘法而不使用易泄漏的乘法运算; 并为椭圆曲线密码系统实施泄漏最小化乘法(和其他操作)。

    Verifiable, leak-resistant encryption and decryption
    26.
    发明授权
    Verifiable, leak-resistant encryption and decryption 有权
    可验证,防漏加密和解密

    公开(公告)号:US08386800B2

    公开(公告)日:2013-02-26

    申请号:US12958570

    申请日:2010-12-02

    IPC分类号: H04L9/32 H04L9/00

    摘要: This patent describes techniques usable by devices to encrypt and decrypt sensitive data to in a manner that provides security from external monitoring attacks. The encrypting device has access to a base secret cryptographic value (key) that is also known to the decrypting device. The sensitive data are decomposed into segments, and each segment is encrypted with a separate encryption key derived from the base key and a message identifier to create a set of encrypted segments. The encrypting device uses the base secret cryptographic value to create validators that prove that the encrypted segments for this message identifier were created by a device with access to the base key. The decrypting device, upon receiving an encrypted segments and validator(s), uses the validator to verify the message identifier and that the encrypted segment are unmodified, then uses a cryptographic key derived from the base key and message identifier to decrypt the segments. Derived keys and validators are produced using methods designed to preserve security even if cipher and hashing operations leak information. Embodiments for systems including SoCs, firmware loading, FPGAs and network communications are described.

    摘要翻译: 本专利描述了可以通过设备加密和解密敏感数据的技术,以提供来自外部监视攻击的安全性的方式。 加密设备可以访问解密设备也是已知的基本密钥加密值(密钥)。 敏感数据被分解为段,并且每个段用来自基本密钥的单独的加密密钥和消息标识符加密,以创建一组加密的段。 加密设备使用基本秘密加密值来创建验证器,证明该消息标识符的加密段由具有访问基本密钥的设备创建。 解密装置在接收到加密的段和验证器时,使用验证器来验证消息标识符,并且加密段未被修改,然后使用从基本密钥和消息标识符导出的加密密钥来解密段。 派生密钥和验证器使用旨在保护安全性的方法生成,即使加密和散列操作泄漏信息。 描述了包括SoC,固件加载,FPGA和网络通信的系统的实施例。

    Leak-resistant cryptographic method and apparatus
    27.
    发明授权
    Leak-resistant cryptographic method and apparatus 有权
    防漏密码方法和装置

    公开(公告)号:US06381699B2

    公开(公告)日:2002-04-30

    申请号:US09737182

    申请日:2000-12-13

    IPC分类号: H04L910

    摘要: The present invention provides a method and apparatus for securing cryptographic devices against attacks involving external monitoring and analysis. A “self-healing” property is introduced, enabling security to be continually re-established following partial compromises. In addition to producing useful cryptographic results, a typical leak-resistant cryptographic operation modifies or updates secret key material in a manner designed to render useless any information about the secrets that may have previously leaked from the system. Exemplary leak-proof and leak-resistant implementations of the invention are shown for symmetric authentication, certified Diffie-Hellman (when either one or both users have certificates), RSA, ElGamal public key decryption, ElGamal digital signing, and the Digital Signature Algorithm.

    摘要翻译: 本发明提供一种用于保护加密装置免受涉及外部监视和分析的攻击的方法和装置。 引入了“自愈”财产,使部分妥协之后不断重新建立安全性。 除了产生有用的加密结果之外,典型的防漏密码操作以设计成使得无用的任何关于可能先前从系统泄露的秘密的信息的方式修改或更新秘密密钥材料。 示出了用于对称认证,经认证的Diffie-Hellman(当一个或两个用户具有证书​​时),RSA,ElGamal公钥解密,ElGamal数字签名和数字签名算法的示例性的防漏和防漏实现。

    Leak-resistant cryptographic payment smartcard
    28.
    发明授权
    Leak-resistant cryptographic payment smartcard 有权
    防漏密码支付智能卡

    公开(公告)号:US07792287B2

    公开(公告)日:2010-09-07

    申请号:US11981495

    申请日:2007-10-30

    IPC分类号: H04L9/30 G06F21/00

    摘要: We disclose methods and apparatuses for securing cryptographic devices against attacks involving external monitoring and analysis. A “self-healing” property is introduced, enabling security to be continually re-established following partial compromises. In addition to producing useful cryptographic results, a typical leak-resistant cryptographic operation modifies or updates secret key material in a manner designed to render useless any information about the secrets that may have previously leaked from the system. Exemplary leak-proof and leak-resistant implementations are shown for symmetric authentication, certified Diffie-Hellman (when either one or both users have certificates), RSA, ElGamal public key decryption.

    摘要翻译: 我们公开了保护加密设备免受外部监控和分析攻击的方法和设备。 引入了“自愈”财产,使部分妥协之后不断重新建立安全性。 除了产生有用的加密结果之外,典型的防漏密码操作以设计成使得无用的任何关于可能先前从系统泄露的秘密的信息的方式修改或更新秘密密钥材料。 示出了用于对称认证,经认证的Diffie-Hellman(当一个或两个用户具有证书​​时),RSA,ElGamal公钥解密的示例性的防漏和防漏实施。

    Leak-resistant cryptographic payment smartcard
    29.
    发明授权
    Leak-resistant cryptographic payment smartcard 有权
    防漏密码支付智能卡

    公开(公告)号:US07506165B2

    公开(公告)日:2009-03-17

    申请号:US10136012

    申请日:2002-04-29

    IPC分类号: G06F21/00

    摘要: We disclose methods and apparatuses for securing cryptographic devices against attacks involving external monitoring and analysis. A “self-healing” property is introduced, enabling security to be continually re-established following partial compromises. In addition to producing useful cryptographic results, a typical leak-resistant cryptographic operation modifies or updates secret key material in a manner designed to render useless any information about the secrets that may have previously leaked from the system. Exemplary leak-proof and leak-resistant implementations are shown for symmetric authentication, certified Diffie-Hellman (when either one or both users have certificates), RSA, ElGamal public key decryption.

    摘要翻译: 我们公开了保护加密设备免受外部监控和分析攻击的方法和设备。 引入了“自愈”财产,使部分妥协之后不断重新建立安全性。 除了产生有用的加密结果之外,典型的防漏密码操作以设计成使得无用的任何关于可能先前从系统泄露的秘密的信息的方式修改或更新秘密密钥材料。 示出了用于对称认证,经认证的Diffie-Hellman(当一个或两个用户具有证书​​时),RSA,ElGamal公钥解密的示例性的防漏和防漏实施。

    Leak-resistant cryptographic method and apparatus
    30.
    发明授权
    Leak-resistant cryptographic method and apparatus 有权
    防漏密码方法和装置

    公开(公告)号:US06304658B1

    公开(公告)日:2001-10-16

    申请号:US09224682

    申请日:1998-12-31

    IPC分类号: H04L930

    摘要: The present invention provides a method and apparatus for securing cryptographic devices against attacks involving external monitoring and analysis. A “self-healing” property is introduced, enabling security to be continually re-established following partial compromises. In addition to producing useful cryptographic results, a typical leak-resistant cryptographic operation modifies or updates secret key material in a manner designed to render useless any information about the secrets that may have previously leaked from the system. Exemplary leak-proof and leak-resistant implementations of the invention are shown for symmetric authentication, certified Diffie-Hellman (when either one or both users have certificates), RSA, ElGamal public key decryption, ElGamal digital signing, and the Digital Signature Algorithm.

    摘要翻译: 本发明提供一种用于保护加密装置免受涉及外部监视和分析的攻击的方法和装置。 引入了“自愈”财产,使部分妥协之后不断重新建立安全性。 除了产生有用的加密结果之外,典型的防漏密码操作以设计成使得无用的任何关于可能先前从系统泄露的秘密的信息的方式修改或更新秘密密钥材料。 示出了用于对称认证,经认证的Diffie-Hellman(当一个或两个用户具有证书​​时),RSA,ElGamal公钥解密,ElGamal数字签名和数字签名算法的示例性的防漏和防漏实现。