Performing boolean logic operations using arithmetic operations by code obfuscation
    3.
    发明授权
    Performing boolean logic operations using arithmetic operations by code obfuscation 有权
    使用代码混淆的算术运算执行布尔逻辑运算

    公开(公告)号:US08707053B2

    公开(公告)日:2014-04-22

    申请号:US13024258

    申请日:2011-02-09

    IPC分类号: G06F12/14

    CPC分类号: G06F21/14

    摘要: Method and apparatus for obfuscating computer software code, to protect against reverse-engineering of the code. The obfuscation here is of the part of the code that performs a Boolean logic operation such as an exclusive OR on two (or more) data variables. In the obfuscated code, each of the two variables is first modified by applying to it a function which deconstructs the value of each of the variables, and then the exclusive OR operation is replaced by an arithmetic operation such as addition, subtraction, or multiplication, which is performed on the two deconstructed variables. The non-obfuscated result is recovered by applying a third function to the value generated by the arithmetic operation. This obfuscation is typically carried out by suitably annotating (modifying) the original source code.

    摘要翻译: 用于模糊计算机软件代码的方法和装置,以防止代码的逆向工程化。 这里的混淆是执行布尔逻辑运算的代码的一部分,例如两个(或多个)数据变量上的异或运算。 在混淆代码中,首先通过对两个变量中的每一个进行修改来解构每个变量的值,然后通过诸如加法,减法或乘法的算术运算来代替异或运算, 这是对两个解构变量进行的。 通过对由算术运算产生的值应用第三函数来恢复未混淆的结果。 这种混淆通常通过适当地注释(修改)原始源代码来执行。

    Data transformation system using cyclic groups
    5.
    发明授权
    Data transformation system using cyclic groups 有权
    数据转换系统采用循环群

    公开(公告)号:US08553878B2

    公开(公告)日:2013-10-08

    申请号:US12760474

    申请日:2010-04-14

    IPC分类号: H04K1/00 H04L9/00 H04L9/24

    摘要: An asymmetric (dual key) data obfuscation process, based on the well known ElGamal cryptosystem algorithm, and which uses multiplicative cyclic groups to transform (obfuscate) digital data for security purposes. In the present system the data need not be a member of the cyclic group, unlike in the ElGamal cryptosystem algorithm. Also, any one of several additional mathematical data transformations are further applied to the transformed data, thereby enhancing security of the transformed data.

    摘要翻译: 基于众所周知的ElGamal密码系统算法的非对称(双密钥)数据混淆处理,为了安全起见,使用乘法循环组来转换(混淆)数字数据。 在本系统中,与ElGamal密码系统算法不同,数据不需要是循环组的成员。 而且,数字附加数学变换中的任何一个进一步应用于变换后的数据,从而提高变换数据的安全性。

    System and method for data obfuscation based on discrete logarithm properties
    8.
    发明授权
    System and method for data obfuscation based on discrete logarithm properties 有权
    基于离散对数特性的数据混淆系统和方法

    公开(公告)号:US08386803B2

    公开(公告)日:2013-02-26

    申请号:US12621153

    申请日:2009-11-18

    摘要: Disclosed herein are systems, computer-implemented methods, and computer-readable storage media for obfuscating data based on a discrete logarithm. A system practicing the method identifies a clear value in source code, replaces the clear value in the source code with a transformed value based on the clear value and a discrete logarithm, and updates portions of the source code that refer to the clear value such that interactions with the transformed value provide a same result as interactions with the clear value. This discrete logarithm approach can be implemented in three variations. The first variation obfuscates some or all of the clear values in loops. The second variation obfuscates data in a process. The third variation obfuscates data pointers, including tables and arrays. The third variation also preserves the ability to use pointer arithmetic.

    摘要翻译: 本文公开的是基于离散对数来混淆数据的系统,计算机实现的方法和计算机可读存储介质。 实施该方法的系统识别源代码中的明确值,基于清除值和离散对数,用源代码替换变换值,并更新引用清除值的源代码部分,使得 与变换值的交互提供与清除值的交互相同的结果。 这种离散对数方法可以在三个变体中实现。 第一个变体模糊了循环中的一些或全部清除值。 第二个变体在一个过程中模糊数据。 第三个变体模糊数据指针,包括表和数组。 第三个变体也保留了使用指针算术的能力。

    Hash function based on polymorphic code
    9.
    发明授权
    Hash function based on polymorphic code 有权
    基于多态代码的哈希函数

    公开(公告)号:US08380991B2

    公开(公告)日:2013-02-19

    申请号:US12433757

    申请日:2009-04-30

    IPC分类号: H04L29/06

    CPC分类号: H04L9/3236

    摘要: In the field of computer data security, a hash process which is typically keyless and embodied in a computing apparatus is highly secure in terms of being resistant to attack. The hash process uses computer code (software) polymorphism, wherein computation of the hash value for a given message is partly dependent on the content (data) of the message. Hence the computer code changes dynamically while computing each hash value.

    摘要翻译: 在计算机数据安全领域,通常无钥匙和体现在计算设备中的散列过程在抵御攻击方面是高度安全的。 散列过程使用计算机代码(软件)多态,其中给定消息的散列值的计算部分地取决于消息的内容(数据)。 因此,计算机代码在计算每个散列值时动态变化。

    SECURING IMPLEMENTATION OF A CRYPTOGRAPHIC PROCESS HAVING FIXED OR DYNAMIC KEYS
    10.
    发明申请
    SECURING IMPLEMENTATION OF A CRYPTOGRAPHIC PROCESS HAVING FIXED OR DYNAMIC KEYS 有权
    保护具有固定或动态键的克隆过程的实施

    公开(公告)号:US20120179919A1

    公开(公告)日:2012-07-12

    申请号:US12987931

    申请日:2011-01-10

    IPC分类号: G06F12/14

    摘要: In the field of computer enabled cryptography, such as a keyed block cipher having a plurality of rounds, the cipher is hardened against attack by protecting the round keys by (1) combining several cipher operations using a pair of sub-keys (round keys) into one table look-up, or (2) a key masking process which obscures the round keys by providing a masked version of the key operations for carrying out encryption or decryption using the cipher. This approach is especially advantageous in an insecure “White Box” environment where an attacker has full access to execution of the cipher algorithm, including the algorithm's internal state during its execution.

    摘要翻译: 在诸如具有多个回合的密钥分组密码的计算机启用密码学领域中,通过(1)使用一对子密钥(循环密钥)组合若干密码操作来保护循环密钥来加密密码, 进入一个表查找,或者(2)通过提供用于使用密码进行加密或解密的密钥操作的掩蔽版本来掩盖轮密钥的密钥掩蔽处理。 这种方法在不安全的“白盒”环境中特别有利,攻击者可以完全访问密码算法的执行,包括算法的执行过程中的内部状态。