PROTECTING WHITE-BOX FEISTEL NETWORK IMPLEMENTATION AGAINST FAULT ATTACK

    公开(公告)号:US20180262326A1

    公开(公告)日:2018-09-13

    申请号:US15975119

    申请日:2018-05-09

    Applicant: NXP B.V.

    CPC classification number: H04L9/0625 H04L9/004 H04L2209/16

    Abstract: A method of implementing a method of mapping an input message to an output message by a keyed cryptographic operation, wherein the keyed cryptographic operation includes a plurality of rounds using a Feistel network, including: receiving an input having a first half and a second half; performing, by a basic block, a portion of a round function on the second half to produce a portion of an encoded output, and wherein the basic block provides a portion of the second half as a portion of an encoded first input to a next round; and XORing the portion of the encoded output and a portion the first half to produce a portion of an encoded second input to the next round.

    USING SECURE KEY STORAGE TO BIND A WHITE-BOX IMPLEMENTATION TO ONE PLATFORM

    公开(公告)号:US20170373828A1

    公开(公告)日:2017-12-28

    申请号:US15194001

    申请日:2016-06-27

    Applicant: NXP B.V.

    CPC classification number: H04L9/002 G06F21/75 H04L2209/16

    Abstract: A method for performing a secure function in a data processing system is provided. In accordance with one embodiment, the method includes generating and encoding an encryption key. The encoded encryption key may be encrypted in a key store in a trusted execution environment (TEE) of the data processing system. The encrypted encryption key may encrypted, stored, and decrypted in the key store in the TEE, but used in a white-box implementation to perform a secure function. The secure function may include encrypting a value in the white-box implementation for securing a monetary value on, for example, a smart card. In one embodiment, each time an encryption key or decryption key is used, it is changed to a new key. The method makes code lifting and rollback attacks more difficult for an attacker because the key is stored separately from, for example, a white-box implementation in secure storage.

    METHOD FOR MAKING A MACHINE LEARNING MODEL MORE DIFFICULT TO COPY

    公开(公告)号:US20200026885A1

    公开(公告)日:2020-01-23

    申请号:US16040992

    申请日:2018-07-20

    Applicant: NXP B.V

    Abstract: A method for protecting a machine learning model from copying is provided. The method includes providing a neural network architecture having an input layer, a plurality of hidden layers, and an output layer. Each of the plurality of hidden layers has a plurality of nodes. A neural network application is provided to run on the neural network architecture. First and second types of activation functions are provided. Activation functions including a combination of the first and second types of activation functions are provided to the plurality of nodes of the plurality of hidden layers. The neural network application is trained with a training set to generate a machine learning model. Using the combination of first and second types of activation functions makes it more difficult for an attacker to copy the machine learning model. Also, the neural network application may be implemented in hardware to prevent easy illegitimate upgrading of the neural network application.

    PROTECTION AGAINST RELAY ATTACKS IN A WHITE-BOX IMPLEMENTATION

    公开(公告)号:US20180351743A1

    公开(公告)日:2018-12-06

    申请号:US15607730

    申请日:2017-05-30

    Applicant: NXP B.V.

    Abstract: A method is provided for performing a cryptographic operation in a white-box implementation on a mobile device. The cryptographic operation is performed in the mobile device for a response to a challenge from a mobile device reader. The mobile device reader includes a time-out period within which the cryptographic operation must be completed by the mobile device. In accordance with an embodiment, a first time period to complete the cryptographic operation on the mobile device is determined. A predetermined number of dummy computations are added to the cryptographic operation to increase the first time period to a second time period. The second time period is only slightly less than the time-out period by a predetermined safety value to make it less likely a relay attack with be successful.

Patent Agency Ranking