OPERATIONAL MODE FOR BLOCK CIPHERS
    1.
    发明申请
    OPERATIONAL MODE FOR BLOCK CIPHERS 有权
    块式搅拌机的运行模式

    公开(公告)号:US20130067211A1

    公开(公告)日:2013-03-14

    申请号:US13232769

    申请日:2011-09-14

    IPC分类号: H04L9/00

    CPC分类号: H04L9/0637

    摘要: In the field of computer enabled cryptography, such as a keyed block cipher having a plurality of sequenced rounds, the cipher is hardened against attack by a protection process. The protection process uses block lengths that are larger or smaller than and not an integer multiple of those of an associated standard cipher, and without using message padding. This is operative in conjunction with standard block ciphers such as the AES, DES or triple DES ciphers, and also with various block cipher cryptographic modes such as CBC or EBC.

    摘要翻译: 在计算机启用密码学领域,例如具有多个顺序循环的密钥分组密码,密码被加强以抵御由保护过程的攻击。 保护过程使用大于或小于相关标准密码的块长度而不是整数倍的块长度,并且不使用消息填充。 这与标准块密码(如AES,DES或三重DES密码)以及各种块密码加密模式(如CBC或EBC)相结合。

    CRYPTOGRAPHIC PROCESS EXECUTION PROTECTING AN INPUT VALUE AGAINST ATTACKS
    2.
    发明申请
    CRYPTOGRAPHIC PROCESS EXECUTION PROTECTING AN INPUT VALUE AGAINST ATTACKS 有权
    保护入侵价值的打击进程执行

    公开(公告)号:US20130016836A1

    公开(公告)日:2013-01-17

    申请号:US13271841

    申请日:2011-10-12

    IPC分类号: H04L9/00

    摘要: A cryptographic process (such as the AES cipher) which uses table look up operations (TLUs) is hardened against reverse engineering attacks intended to recover the table contents and thereby the cipher key. This hardening involves removing any one-to-one correspondence between the TLU inputs and outputs, by altering the output of the TLU dynamically, e.g. at each execution (call) of the TLU. This is done by increasing the size of the tables, applying a dynamically determined mask value to the table input and/or output, or using an inverse of the table.

    摘要翻译: 使用表查找操作(TLU)的加密过程(例如AES密码)被硬化以防止旨在恢复表内容和密码密钥的反向工程攻击。 这种硬化包括通过动态地改变TLU的输出来例如TLU输入和输出之间的一对一的对应关系。 在TLU的每次执行(调用)时。 这是通过增加表的大小,将动态确定的掩码值应用于表输入和/或输出,或使用表的倒数完成的。

    PERFORMING BOOLEAN LOGIC OPERATIONS USING ARITHMETIC OPERATIONS BY CODE OBFUSCATION
    3.
    发明申请
    PERFORMING BOOLEAN LOGIC OPERATIONS USING ARITHMETIC OPERATIONS BY CODE OBFUSCATION 有权
    使用代码欺骗进行算术运算来执行布鲁斯逻辑运算

    公开(公告)号:US20120204038A1

    公开(公告)日:2012-08-09

    申请号:US13024258

    申请日:2011-02-09

    IPC分类号: G06F12/14

    CPC分类号: G06F21/14

    摘要: Method and apparatus for obfuscating computer software code, to protect against reverse-engineering of the code. The obfuscation here is of the part of the code that performs a Boolean logic operation such as an exclusive OR on two (or more) data variables. In the obfuscated code, each of the two variables is first modified by applying to it a function which deconstructs the value of each of the variables, and then the exclusive OR operation is replaced by an arithmetic operation such as addition, subtraction, or multiplication, which is performed on the two deconstructed variables. The non-obfuscated result is recovered by applying a third function to the value generated by the arithmetic operation. This obfuscation is typically carried out by suitably annotating (modifying) the original source code.

    摘要翻译: 用于模糊计算机软件代码的方法和装置,以防止代码的逆向工程化。 这里的混淆是执行布尔逻辑运算的代码的一部分,例如两个(或多个)数据变量上的异或运算。 在混淆代码中,首先通过对两个变量中的每一个进行修改来解构每个变量的值,然后通过诸如加法,减法或乘法的算术运算来代替异或运算, 这是对两个解构变量进行的。 通过对由算术运算产生的值应用第三函数来恢复未混淆的结果。 这种混淆通常通过适当地注释(修改)原始源代码来执行。

    SECURING IMPLEMENTATION OF CRYPTOGRAPHIC ALGORITHMS USING ADDITIONAL ROUNDS
    4.
    发明申请
    SECURING IMPLEMENTATION OF CRYPTOGRAPHIC ALGORITHMS USING ADDITIONAL ROUNDS 审中-公开
    使用附加环保护实体算法的实现

    公开(公告)号:US20130067212A1

    公开(公告)日:2013-03-14

    申请号:US13232853

    申请日:2011-09-14

    IPC分类号: H04L9/00

    CPC分类号: H04L9/0631 H04L2209/12

    摘要: In the field of computer enabled cryptography, such as a keyed block cipher having a plurality of sequenced rounds, the cipher is hardened against an attack by a protection process which adds rounds to the cipher process. This is especially advantageous in a “White Box” environment where an attacker has full access to the cipher algorithm (process), including the algorithm's internal state during its execution. In one version, a specific number of rounds are added over those of a standard version of the cipher to both encryption and the complementary decryption. The added rounds are inserted immediately after the last of the standard rounds in the sequence. In another version, the added rounds are one or more opposing paired rounds of encryption/decryption or decryption/encryption which effectively cancel each other out, and may be inserted anywhere in the sequence of standard rounds.

    摘要翻译: 在计算机启用密码学领域,例如具有多个排序轮次的密钥分组密码,密码被针对加密进程加密的保护过程的攻击强化。 这在白盒环境中特别有利,在这种情况下,攻击者可以完全访问密码算法(进程),包括算法执行过程中的内部状态。 在一个版本中,将特定数量的回合相对于密码的标准版本的加法加密和互补解密相加。 添加的回合将在序列中的最后一个标准回合之后立即插入。 在另一个版本中,添加的回合是一个或多个相对配对的加密/解密或解密/加密,其有效地彼此抵消,并且可以插入到标准轮次的任何地方。

    PROTECTING LOOK UP TABLES BY MIXING CODE AND OPERATIONS
    5.
    发明申请
    PROTECTING LOOK UP TABLES BY MIXING CODE AND OPERATIONS 有权
    通过混合代码和操作来保护表格

    公开(公告)号:US20130061061A1

    公开(公告)日:2013-03-07

    申请号:US13286117

    申请日:2011-10-31

    IPC分类号: G06F12/14

    摘要: In the field of computer enabled cryptography, such as a cipher using lookup tables, the cipher is hardened against an attack by a protection process which obscures the lookup tables using the properties of bijective functions and applying masks to the tables' input and output values, for encryption or decryption. This is especially advantageous in a “White Box” environment where an attacker has full access to the cipher algorithm, including the algorithm's internal state during its execution. This method and the associated computing apparatus are useful for protection against known attacks on “White Box” ciphers, by obfuscating lookup table data, thereby increasing the cipher's complexity against reverse engineering and other attacks.

    摘要翻译: 在计算机启用密码学领域,例如使用查找表的密码,密码被针对使用双射函数的属性遮蔽查找表并且将掩码应用于表的输入和输出值的保护过程的攻击加强, 用于加密或解密。 这在白盒环境中特别有利,在这种情况下,攻击者可以完全访问密码算法,包括算法执行过程中的内部状态。 该方法和相关联的计算装置对于通过模糊查找表数据来防止对白盒密码的已知攻击是有用的,从而增加了对逆向工程和其他攻击的密码复杂性。

    SECURING KEYS OF A CIPHER USING PROPERTIES OF THE CIPHER PROCESS
    6.
    发明申请
    SECURING KEYS OF A CIPHER USING PROPERTIES OF THE CIPHER PROCESS 有权
    使用碳水化合物工艺的性质来保护油罐

    公开(公告)号:US20120155638A1

    公开(公告)日:2012-06-21

    申请号:US12972145

    申请日:2010-12-17

    IPC分类号: H04L9/28 H04L9/14

    摘要: In the field of computer enabled cryptography, such as a block cipher, the cipher is hardened against an attack by protecting the cipher key, by applying to it a predetermined linear permutation before using one key to encrypt or decrypt a message. This is especially advantageous in a “White Box” environment where an attacker has full access to the cipher algorithm, including the algorithm's internal state during its execution. This method and the associated computing apparatus are useful where the key is derived through a process and so is unknown when the software code embodying the cipher is compiled. This is typically the case where there are many users of the cipher and each has his own key, or where each user session has its own key.

    摘要翻译: 在诸如分组密码的计算机启用的密码学领域中,通过在使用一个密钥加密或解密消息之前,通过保护加密密钥对其进行预定的线性置换,来抵御攻击而加密密码。 这在“白盒”环境中特别有利,攻击者可以完全访问密码算法,包括算法的执行过程中的内部状态。 该方法和相关联的计算装置在通过过程导出密钥是有用的,并且当体现密码的软件代码被编译时是未知的。 通常情况下,密码的用户很多,每个用户都有自己的密钥,或者每个用户会话都有自己的密钥。

    MULTIPLICATIVE SPLITS TO PROTECT CIPHER KEYS
    7.
    发明申请
    MULTIPLICATIVE SPLITS TO PROTECT CIPHER KEYS 有权
    多用途保护皮夹克

    公开(公告)号:US20130010963A1

    公开(公告)日:2013-01-10

    申请号:US13178410

    申请日:2011-07-07

    IPC分类号: H04L9/28 H04L9/16

    摘要: In the field of computer enabled cryptography, such as a keyed block cipher having a plurality of rounds, the cipher is hardened against an attack by a protection process which obscures the round keys using the properties of group field automorphisms and applying masks to the states of the cipher, for encryption or decryption. This is especially advantageous in a “White Box” environment where an attacker has full access to the cipher algorithm, including the algorithm's internal state during its execution. This method and the associated computing apparatus are useful for protection against known attacks on “White Box” ciphers, by eliminating S-box operations, together with improved masking techniques and increasing the cipher's complexity against reverse engineering and key storage attacks.

    摘要翻译: 在计算机启用的密码学领域,例如具有多个回合的密钥分组密码,密码被抵御使用群组域自动生成的属性遮蔽轮密钥的保护过程而被强化,并将掩码应用于 密码,用于加密或解密。 这在白盒环境中特别有利,在这种情况下,攻击者可以完全访问密码算法,包括算法执行过程中的内部状态。 该方法和相关联的计算装置对于通过消除S盒操作以及改进的掩蔽技术并增加密码的复杂度来逆向工程和密钥存储攻击来防止对白盒密码的已知攻击是有用的。

    SECURING THE IMPLEMENTATION OF A CRYPTOGRAPHIC PROCESS USING KEY EXPANSION
    8.
    发明申请
    SECURING THE IMPLEMENTATION OF A CRYPTOGRAPHIC PROCESS USING KEY EXPANSION 有权
    使用主要扩展来保护实施流程的实施

    公开(公告)号:US20120159186A1

    公开(公告)日:2012-06-21

    申请号:US12975123

    申请日:2010-12-21

    IPC分类号: G06F12/14

    摘要: In the field of computer enabled cryptography, such as a keyed block cipher having a plurality of rounds, the cipher is hardened against an attack by protecting the cipher key by means of a key expansion process which obscures the cipher and/or the round keys by increasing their lengths to provide an expanded version of the keys for carrying out encryption or decryption using the cipher. This is especially advantageous in a “White Box” environment where an attacker has full access to the cipher algorithm, including the algorithm's internal state during its execution. This method and the associated computing apparatus are useful where the key is derived through a process and so is unknown when the software code embodying the cipher is compiled. This is typically the case where there are many users of the cipher and each has his own key, or where each user session has its own key.

    摘要翻译: 在诸如具有多个回合的密钥分组密码的计算机启用密码学领域中,通过利用通过密钥扩展处理来保护密码密码来抵御攻击来加密密码,该密钥扩展过程掩盖了密码和/或循环密钥, 增加其长度以提供用于使用密码进行加密或解密的密钥的扩展版本。 这在“白盒”环境中特别有利,攻击者可以完全访问密码算法,包括算法的执行过程中的内部状态。 该方法和相关联的计算装置在通过过程导出密钥是有用的,并且当体现密码的软件代码被编译时是未知的。 通常情况下,密码的用户很多,每个用户都有自己的密钥,或者每个用户会话都有自己的密钥。

    HASH FUNCTION USING A CUE SPORTS GAME PROCESS
    9.
    发明申请
    HASH FUNCTION USING A CUE SPORTS GAME PROCESS 审中-公开
    HASH功能使用CUE SPORTS游戏过程

    公开(公告)号:US20100304805A1

    公开(公告)日:2010-12-02

    申请号:US12475337

    申请日:2009-05-29

    IPC分类号: A63F9/24

    CPC分类号: G06F21/64

    摘要: In the computer data security field, a cryptographic hash function process embodied in a computer system and which is typically keyless, but is highly secure. The process is based on the type of randomness exhibited by well known table “cue sports” games such as billiards, snooker, and pool played on a billiards table involving the players striking one of a plurality of balls with a cue, the struck ball then hitting other balls, the raised sides of the table, and in some cases one or more balls going into pockets in the corners and/or sides of the table. Computation of the hash value (digest) is the result of providing a model (such as expressed in computer code) of such a game algorithm and using the message as an input to the game algorithm, then executing the game algorithm. A state of the game after a “shot” gives the hash digest value.

    摘要翻译: 在计算机数据安全领域中,加密散列函数过程体现在计算机系统中,并且通常是无钥匙的,但是是高度安全的。 该过程是基于众所周知的表“提示运动”游戏所显示的随机性类型,例如台球,斯诺克和在台球桌上玩的游泳池,其涉及玩家以提示的方式击打多个球中的一个,然后击球 击中其他球,桌子的凸起部分,以及在某些情况下一个或多个球进入桌子的角落和/或侧面的口袋。 哈希值(摘要)的计算是提供这种游戏算法的模型(例如以计算机代码表示)的结果,并且使用该消息作为游戏算法的输入,然后执行游戏算法。 “拍摄”后的游戏状态给出了散列摘要值。

    HASH FUNCTION BASED ON PAINTING TECHNIQUES
    10.
    发明申请
    HASH FUNCTION BASED ON PAINTING TECHNIQUES 审中-公开
    基于绘画技术的HASH功能

    公开(公告)号:US20110055581A1

    公开(公告)日:2011-03-03

    申请号:US12551067

    申请日:2009-08-31

    IPC分类号: H04L9/32

    CPC分类号: G06F21/64 H04L9/3236

    摘要: In the computer data security field, this disclosure is of cryptographic hash function processes embodied in a computer system and which may be keyless, but are highly secure. The processes are based on the type of randomness exhibited by painting or drawing a picture. Computation of the hash value (digest) is the result of executing in computer code or logic circuitry an algorithm which models such a picture painting process using the message as an input to the picture painting algorithm, then executing the algorithm. A state of the resulting picture gives the hash digest value of the message. Message expansion or a derivation function (e.g., a pseudo random number generation process) may be applied to the message prior to execution of the picture painting process, for enhanced security.

    摘要翻译: 在计算机数据安全领域中,本公开是在计算机系统中体现的加密散列函数过程,其可以是无钥匙的,但是是高度安全的。 这些过程基于通过绘画或绘制图片显示的随机性类型。 哈希值(摘要)的计算是在计算机代码或逻辑电路中执行使用该消息作为图片绘画算法的输入来对这样的图片绘画过程进行建模的算法的结果,然后执行该算法。 所得图像的状态给出消息的散列摘要值。 消息扩展或导出功能(例如,伪随机数生成处理)可以在执行画面绘制处理之前应用于消息,以增强安全性。