摘要:
The invention relates to a booting device (2) for a computer element (1) for booting the computer element (1), wherein the booting device (2) comprises a memory unit (3) for storing a protection code (4), and a protection unit (5) for checking the integrity of a software component (6) of the computer element (1) based on the protection code (4), wherein the booting device (2) is suitable for executing the software component (6) to boot the computer element (1), wherein the protection code (4) can be at least partially changed from outside the booting device (2). The protection code, which serves to check the integrity of a booting process, can be changed and/or updated from outside the booting device, e.g. by a user.
摘要:
A method and system for confidentially providing a software component which is encrypted using a secret cryptographic key of a software component manufacturer, and the key is then encrypted using a first cryptographic system key, wherein the encrypted software component and the encrypted key are transported by the software component manufacturer to a destination system device. After decrypting the transported encrypted key using a second cryptographic system key, the transported encrypted software component is decrypted using the decrypted key, wherein the decrypted software component is provided for execution on the destination system device. The method can be used to protect source codes or object codes of a developed software component from access by a third party and still allows for processing using standard tools.
摘要:
A method and a system for naming-conflict-free integration of software components originating from software component manufacturers (OEM), comprising software development devices from different software component manufacturers (OEM) that manufacture and encrypt software components with the respective cryptographic key, wherein when a naming conflict occurs during the integration of encrypted software components, at least one of the encrypted software components in which the naming conflict occurred is expanded by a naming conflict resolution rule to thereby allows for the resolution of naming conflicts in encrypted software components that can originate from different software component manufacturers without the source code of the software components becoming visible to third parties.
摘要:
An apparatus for generating random bits includes a plurality of mapping devices. A respective mapping device is configured to map a predefined number of input signals, with the aid of a combinatorial mapping, into a predefined number of output signals. The plurality of mapping devices are concatenated with one another, and at least one combinatorial mapping is configured such that a state change of an input signal of a respective mapping device is mapped on average onto more than one output signal of the respective mapping device. No feedback loop is present such that a state change of at least one feedback output signal of a specific mapping device is fed as a state change of at least one input signal to another mapping device such that one or a plurality of output signals of the specific mapping device is influenced by the state change of the feedback output signal.
摘要:
A method and system for confidentially providing a software component which is encrypted using a secret cryptographic key of a software component manufacturer, and the key is then encrypted using a first cryptographic system key, wherein the encrypted software component and the encrypted key are transported by the software component manufacturer to a destination system device. After decrypting the transported encrypted key using a second cryptographic system key, the transported encrypted software component is decrypted using the decrypted key, wherein the decrypted software component is provided for execution on the destination system device. The method can be used to protect source codes or object codes of a developed software component from access by a third party and still allows for processing using standard tools.
摘要:
A device (1) for generating a random bit sequence has a digital ring oscillator circuit (2) having at least one first feedback path (R8) and one second feedback path (R14). To this end, a changeover is performed between the feedback paths (R8, R14) at times which can be predetermined, and a random signal (OS) having a random level history can be tapped at an output node (4) of the ring oscillator circuit (2).
摘要:
Random numbers can be generated in a statistically independent manner and with identical probability if the bits generated by a controlled bit generator are stored by a storage in a plurality of memory regions, wherein the bits are each stored in such memory regions associated with a difference of the bits of the values 1 and 0 generated up to the time of storage, and if all the bits stored within a memory region are subjected to algorithmic post-processing as soon as a predetermined number of bits within a memory region is exceeded. The fact that the bits are not stored and processed sequentially, i.e. in the order of generation, allows using a sequence of bits within which the individual bits are statistically independent of one another for the algorithmic post-processing. Thus, a way of performing algorithmic post-processing of the bits without reducing the entropy is provided.
摘要:
A method for protecting an item of software, wherein at least one challenge means is associated with said protected item of software, and at least one response means accesses one private keying material. The challenge means has no access to said private keying material. The response means proves to the challenge means that the response means has access to the private keying material using an asymmetric probabilistic proof, e.g., zero knowledge proof. The challenge means validates this proof using the public keying material that corresponds to the response means' private keying material.
摘要:
A method for recognizing a manipulation of at least one electrical line includes determining a parameter that is dependent on a resistance and a capacity, a resistance and an inductivity, or a resistance, a capacity, and an inductivity of the electrical line; comparing the determined parameter to a reference parameter to provide a comparison result; and recognizing a manipulation of the electrical line based on the provided comparison result.
摘要:
A method and system for accelerated decryption of a cryptographically protected user data unit, wherein a transmitter initially generates a cryptographic key that is provided with a related key identification. The transmitter then performs asymmetrical encryption of the generated cryptographic key using a public cryptographic key and encryption of at least one user data unit using the generated cryptographic key. The encrypted user data unit, the asymmetrically encrypted cryptographic key and the related key identification of the cryptographic key are transported to a receiver that decrypts the received asymmetrically encrypted key using a private key, if verification of the received related key identification of the cryptographic key indicates the cryptographic key is not present in a decrypted state in the receiver. The receiver then decrypts the received cryptographically encrypted user data unit using the cryptographic key in the receiver or with the cryptographic key decrypted using the private key.