Block cryptographic method for encrypting/decrypting messages and cryptographic devices for implementing this method

    公开(公告)号:US11418321B2

    公开(公告)日:2022-08-16

    申请号:US15532932

    申请日:2015-12-01

    申请人: NAGRAVISION S.A.

    发明人: Brecht Wyseur

    IPC分类号: H04L9/06 H04L9/32 G06F21/60

    摘要: A block cipher method and apparatus using round repetition for providing, from a plaintext message, a ciphertext message and a global tag is disclosed; the plaintext message is converted into a plurality of ordered plaintext blocks which are successively processed during a round for computing: a cryptogram by encrypting input data using a single cryptographic key, said cryptogram comprising a first segment and a second segment; a ciphertext block by performing a first operation using, as operands: said first segment said current plaintext block and said second segment; at each next round said input data is newly determined based on the current ciphertext block and an updated reproducible data; the ciphertext message is determined by concatenating the ciphertext blocks and the global tag by a second operation using computed authentication local tags as operands.

    Key sequence generation for cryptographic operations

    公开(公告)号:US10742394B2

    公开(公告)日:2020-08-11

    申请号:US15772933

    申请日:2016-11-02

    申请人: NAGRAVISION S.A.

    IPC分类号: H04L9/28 H04L9/06

    摘要: Methods, system and devices are provided that generate a sequence of sub-keys for cryptographic operations from a main key. The main key is operated on only once to generate the sub-keys of the sequence, with a transformation comprising one or more one-way functions. The respective bit values of the sub-keys of the sequence are set using respective bit values of the one or more one-way functions. Advantageously, deriving sub-key bits from respective output bits of one or more one-way functions removes or at least reduces correlations between the main key and the sub-keys, as well as between sub-keys, making it harder or even impossible to recover the main key or other sub-keys from a single sub-key, for example as found using a side-channel attack. At the same time, by using the main key only once (rather than using the main key each time a sub-key is generated), the vulnerability of the main key to a side-channel attack is reduced, because the opportunities for recovering physical information that could lead to the discovery of the main key are reduced. Specific embodiments use parallel or chained execution of sub-functions to generate respective sub-keys. Other specific embodiments generate all sub-keys from a single one-way function in one go.

    On demand code decryption
    3.
    发明授权

    公开(公告)号:US11336448B2

    公开(公告)日:2022-05-17

    申请号:US16313273

    申请日:2017-06-29

    申请人: NAGRAVISION S.A.

    摘要: A system and a method for protecting code are provided. Extraction of code to be protected takes place during an object-to-object transformation and that code is replaced with fake binary code. The extracted code to be protected may then be encrypted or otherwise obscured and stored in a separate region of an object file. A prior source-to-source file transformation can be provided to isolate and mark the code to be protected, and to inject additional source code to handle later decryption.

    Method for converting a conditional access content and receiver for the implementation for said method

    公开(公告)号:US09641331B2

    公开(公告)日:2017-05-02

    申请号:US14572438

    申请日:2014-12-16

    申请人: Nagravision S.A.

    IPC分类号: H04L9/00 H04L9/14 H04L9/06

    摘要: A method is disclosed for converting a conditional access content. This method includes receiving, by a cryptographic module of a first receiver, the content encrypted according to the first encryption mode; choosing a first entry data of the combination of the first encryption mode choosing a second entry data of the combination of the second encryption mode inverting the first and second input data in order to process the content received by the cryptographic module of the first receiver, this processing including a decryption operation according to the first encryption mode, by using the entry data corresponding to the second encryption mode, and to process the content obtained during the previous processing step, this processing including an encryption operation according to the second encryption mode, by using the entry data corresponding to the first encryption mode.

    Method to verify the execution integrity of an application in a target device

    公开(公告)号:US11526616B1

    公开(公告)日:2022-12-13

    申请号:US17099814

    申请日:2020-11-17

    申请人: NAGRAVISION S.A.

    发明人: Brecht Wyseur

    摘要: The present invention concerns the field of software verification, in particular to check whether the run-time integrity of a software application can be demonstrated. It is therefore proposed a method to verify, by a verification server, the execution integrity of an application in a target device wherein the verification server receives an application signature generated from run time application information on the target device, said signature being used to verify the execution integrity of the application in the target device, said application comprising an array of blocks, each block producing a digest, thus producing an array of digests related to the array of blocks, comprising the steps of: —sending to the target device a message comprising a challenge and a first function, said first function defining an aggregation method, said challenge defining an aggregation instruction, —receiving an attestation from the target device, this attestation being generated by the target device by determining for each block, the corresponding digest for said block, aggregating the digests of the blocks according to the aggregation method of the first function and the challenge to produce the attestation related to the application, —applying a second function to the attestation by the verification server, said second function undoing the effect of the challenge thus producing an application signature independent of the challenge, —verifying the execution integrity of the application by comparing the produced application signature with a reference signature.

    Key sequence generation for cryptographic operations

    公开(公告)号:US11546135B2

    公开(公告)日:2023-01-03

    申请号:US16918426

    申请日:2020-07-01

    申请人: NAGRAVISION S.A.

    IPC分类号: H04L9/06

    摘要: Methods, system and devices are provided that generate a sequence of sub-keys for cryptographic operations from a main key. The main key is operated on only once to generate the sub-keys of the sequence, with a transformation comprising one or more one-way functions. The respective bit values of the sub-keys of the sequence are set using respective bit values of the one or more one-way functions. Advantageously, deriving sub-key bits from respective output bits of one or more one-way functions removes or at least reduces correlations between the main key and the sub-keys, as well as between sub-keys, making it harder or even impossible to recover the main key or other sub-keys from a single sub-key, for example as found using a side-channel attack. At the same time, by using the main key only once (rather than using the main key each time a sub-key is generated), the vulnerability of the main key to a side-channel attack is reduced, because the opportunities for recovering physical information that could lead to the discovery of the main key are reduced. Specific embodiments use parallel or chained execution of sub-functions to generate respective sub-keys. Other specific embodiments generate all sub-keys from a single one-way function in one go.

    Data transmission method, transmitter and receiver

    公开(公告)号:US11297170B2

    公开(公告)日:2022-04-05

    申请号:US16958081

    申请日:2018-12-26

    申请人: NAGRAVISION S.A.

    摘要: A method of transmitting data to a receiver via a network includes transmitting a sequence of first data packets to the receiver via the network, each first data packet including payload data and identification data, the identification data identifying the respective first data packet, the identification data being different for each first data packet. The method also includes transmitting a corresponding second data packet for each first data packet to the receiver via the network, each second data packet including the data enabling identification of the corresponding first data packet and additional data related to the corresponding first data packet, the data enabling identification of the corresponding first data packet enabling the receiver to associate each second data packet with the corresponding first data packet.