Securing cryptographic process keys using internal structures
    2.
    发明授权
    Securing cryptographic process keys using internal structures 有权
    使用内部结构保护加密过程密钥

    公开(公告)号:US08699702B2

    公开(公告)日:2014-04-15

    申请号:US12987933

    申请日:2011-01-10

    IPC分类号: G06F21/00 H04L9/06 H04L9/00

    摘要: In the field of cryptography, such as for a computer enabled block cipher, a cipher or other cryptographic process is hardened against an attack by protecting the cipher key or subkeys by using a masking process for these keys. The subkeys are thereby protected by applying to them a mask or set of masks to hide their contents. This is especially advantageous in a “White Box” computing environment where an attacker has full access to the cipher algorithm, including the algorithm's internal state during execution. Further, this method and the associated apparatus are useful where the key is derived through a process and so is unknown when the software code embodying the cipher is compiled. This is typically the case where there are many users of the cipher and each has his own key or where each user session has its own key.

    摘要翻译: 在密码学领域中,例如对于计算机启用的分组密码,通过使用这些密钥的掩码处理来保护加密密钥或子密钥来加密密码或其他加密过程,从而防止攻击。 因此,通过向它们施加掩模或一组掩码以隐藏其内容来保护子密钥。 这在“白盒”计算环境中特别有利,攻击者可以完全访问密码算法,包括执行过程中算法的内部状态。 此外,该方法和相关联的装置在通过过程导出密钥是有用的,并且当体现密码的软件代码被编译时是未知的。 这通常是存在密码的许多用户并且每个具有他自己的密钥或每个用户会话具有其自己的密钥的情况。

    Multiplicative splits to protect cipher keys
    3.
    发明授权
    Multiplicative splits to protect cipher keys 有权
    乘法分割以保护加密密钥

    公开(公告)号:US08675866B2

    公开(公告)日:2014-03-18

    申请号:US13178410

    申请日:2011-07-07

    IPC分类号: H04L9/06

    摘要: In the field of computer enabled cryptography, such as a keyed block cipher having a plurality of rounds, the cipher is hardened against an attack by a protection process which obscures the round keys using the properties of group field automorphisms and applying masks to the states of the cipher, for encryption or decryption. This is especially advantageous in a “White Box” environment where an attacker has full access to the cipher algorithm, including the algorithm's internal state during its execution. This method and the associated computing apparatus are useful for protection against known attacks on “White Box” ciphers, by eliminating S-box operations, together with improved masking techniques and increasing the cipher's complexity against reverse engineering and key storage attacks.

    摘要翻译: 在计算机启用的密码学领域,例如具有多个回合的密钥分组密码,密码被抵御使用群组域自动生成的属性遮蔽轮密钥的保护过程而被强化,并将掩码应用于 密码,用于加密或解密。 这在“白盒”环境中特别有利,攻击者可以完全访问密码算法,包括算法的执行过程中的内部状态。 该方法和相关联的计算装置对于通过消除S盒操作以及改进的掩蔽技术并增加密码复杂性以逆向工程和密钥存储攻击来防止对“白盒”密码的已知攻击是有用的。

    HASH FUNCTION USING A REPEATED FUNCTION WITH SHIFTS
    4.
    发明申请
    HASH FUNCTION USING A REPEATED FUNCTION WITH SHIFTS 审中-公开
    使用具有移位功能的重复功能的快速功能

    公开(公告)号:US20110302422A1

    公开(公告)日:2011-12-08

    申请号:US12792633

    申请日:2010-06-02

    IPC分类号: H04L9/32

    CPC分类号: H04L9/3242

    摘要: In the data security field, a modular cryptographic hash function process is embodied in a computer system or hardware (circuitry). The process is based on the mode of operation of the known “Shabal” hash function which uses a keyed permutation applied to each word of the message. Here a function is substituted for the permutation and additional final rounds are added to the function. Security is further enhanced over that of the Shabal hash function by avoiding use of the message blocks in computing certain of the data arrays, in order to frustrate known message attacks.

    摘要翻译: 在数据安全领域中,模块化加密散列函数过程体现在计算机系统或硬件(电路)中。 该过程基于已知的“Shabal”散列函数的操作模式,其使用应用于消息的每个单词的密钥置换。 这里一个函数代替排列,并且附加的最后一轮被添加到该函数中。 为了阻止已知的消息攻击,避免在计算某些数据阵列时使用消息块来进一步增强安全性,而不是Shabal散列函数。

    DATA TRANSFORMATION SYSTEM USING CYCLIC GROUPS
    5.
    发明申请
    DATA TRANSFORMATION SYSTEM USING CYCLIC GROUPS 有权
    使用循环组的数据转换系统

    公开(公告)号:US20110255687A1

    公开(公告)日:2011-10-20

    申请号:US12760474

    申请日:2010-04-14

    IPC分类号: H04L9/28

    摘要: An asymmetric (dual key) data obfuscation process, based on the well known ElGamal cryptosystem algorithm, and which uses multiplicative cyclic groups to transform (obfuscate) digital data for security purposes. In the present system the data need not be a member of the cyclic group, unlike in the ElGamal cryptosystem algorithm. Also, any one of several additional mathematical data transformations are further applied to the transformed data, thereby enhancing security of the transformed data.

    摘要翻译: 基于众所周知的ElGamal密码系统算法的非对称(双密钥)数据混淆处理,为了安全起见,使用乘法循环组来转换(混淆)数字数据。 在本系统中,与ElGamal密码系统算法不同,数据不需要是循环组的成员。 而且,数字附加数学变换中的任何一个进一步应用于变换后的数据,从而提高变换数据的安全性。

    OPERATIONAL MODE FOR BLOCK CIPHERS
    7.
    发明申请
    OPERATIONAL MODE FOR BLOCK CIPHERS 有权
    块式搅拌机的运行模式

    公开(公告)号:US20130067211A1

    公开(公告)日:2013-03-14

    申请号:US13232769

    申请日:2011-09-14

    IPC分类号: H04L9/00

    CPC分类号: H04L9/0637

    摘要: In the field of computer enabled cryptography, such as a keyed block cipher having a plurality of sequenced rounds, the cipher is hardened against attack by a protection process. The protection process uses block lengths that are larger or smaller than and not an integer multiple of those of an associated standard cipher, and without using message padding. This is operative in conjunction with standard block ciphers such as the AES, DES or triple DES ciphers, and also with various block cipher cryptographic modes such as CBC or EBC.

    摘要翻译: 在计算机启用密码学领域,例如具有多个顺序循环的密钥分组密码,密码被加强以抵御由保护过程的攻击。 保护过程使用大于或小于相关标准密码的块长度而不是整数倍的块长度,并且不使用消息填充。 这与标准块密码(如AES,DES或三重DES密码)以及各种块密码加密模式(如CBC或EBC)相结合。

    CRYPTOGRAPHIC PROCESS EXECUTION PROTECTING AN INPUT VALUE AGAINST ATTACKS
    8.
    发明申请
    CRYPTOGRAPHIC PROCESS EXECUTION PROTECTING AN INPUT VALUE AGAINST ATTACKS 有权
    保护入侵价值的打击进程执行

    公开(公告)号:US20130016836A1

    公开(公告)日:2013-01-17

    申请号:US13271841

    申请日:2011-10-12

    IPC分类号: H04L9/00

    摘要: A cryptographic process (such as the AES cipher) which uses table look up operations (TLUs) is hardened against reverse engineering attacks intended to recover the table contents and thereby the cipher key. This hardening involves removing any one-to-one correspondence between the TLU inputs and outputs, by altering the output of the TLU dynamically, e.g. at each execution (call) of the TLU. This is done by increasing the size of the tables, applying a dynamically determined mask value to the table input and/or output, or using an inverse of the table.

    摘要翻译: 使用表查找操作(TLU)的加密过程(例如AES密码)被硬化以防止旨在恢复表内容和密码密钥的反向工程攻击。 这种硬化包括通过动态地改变TLU的输出来例如TLU输入和输出之间的一对一的对应关系。 在TLU的每次执行(调用)时。 这是通过增加表的大小,将动态确定的掩码值应用于表输入和/或输出,或使用表的倒数完成的。

    PERFORMING BOOLEAN LOGIC OPERATIONS USING ARITHMETIC OPERATIONS BY CODE OBFUSCATION
    9.
    发明申请
    PERFORMING BOOLEAN LOGIC OPERATIONS USING ARITHMETIC OPERATIONS BY CODE OBFUSCATION 有权
    使用代码欺骗进行算术运算来执行布鲁斯逻辑运算

    公开(公告)号:US20120204038A1

    公开(公告)日:2012-08-09

    申请号:US13024258

    申请日:2011-02-09

    IPC分类号: G06F12/14

    CPC分类号: G06F21/14

    摘要: Method and apparatus for obfuscating computer software code, to protect against reverse-engineering of the code. The obfuscation here is of the part of the code that performs a Boolean logic operation such as an exclusive OR on two (or more) data variables. In the obfuscated code, each of the two variables is first modified by applying to it a function which deconstructs the value of each of the variables, and then the exclusive OR operation is replaced by an arithmetic operation such as addition, subtraction, or multiplication, which is performed on the two deconstructed variables. The non-obfuscated result is recovered by applying a third function to the value generated by the arithmetic operation. This obfuscation is typically carried out by suitably annotating (modifying) the original source code.

    摘要翻译: 用于模糊计算机软件代码的方法和装置,以防止代码的逆向工程化。 这里的混淆是执行布尔逻辑运算的代码的一部分,例如两个(或多个)数据变量上的异或运算。 在混淆代码中,首先通过对两个变量中的每一个进行修改来解构每个变量的值,然后通过诸如加法,减法或乘法的算术运算来代替异或运算, 这是对两个解构变量进行的。 通过对由算术运算产生的值应用第三函数来恢复未混淆的结果。 这种混淆通常通过适当地注释(修改)原始源代码来执行。