摘要:
Die Erfindung schafft eine Prozessor-Einrichtung mit einer darauf implementierten ausführbaren White Box maskierten Implementierung eines kryptographischen Algorithmus. Die White Box Maskierung umfasst eine affine Abbildung A, die so gestaltet ist, dass jedes Bit in den Ausgabewerten w der affinen Abbildung A von mindestens einem Bit aus den Verschleierungswerten y abhängt, wodurch erreicht wird, dass die Ausgabewerte w der affinen Abbildung A statistisch ausgeglichen sind.
摘要:
Die Erfindung schafft eine Prozessor-Einrichtung mit einer darauf implementierten ausführbaren mit einer Funktion f White Box maskierten Implementierung eines kryptographischen Algorithmus. Die Implementierung umfasst einen implementierten Rechenschritt S, durch den Eingabewerte x auf Ausgabewerte s = S[x] abgebildet werden, und der mittels einer invertierbaren Funktion f zu einem White Box maskierten Rechenschritt T' maskiert ist. Als Abbildung f ist eine Kombination ( f = (c1, c2,... )*A) aus einer affinen Abbildung A mit einer Eingangsbreite BA und einer Anzahl von einer oder mehreren invertierbaren Abbildungen c1, c2,... mit je einer Eingangsbreite Bc1, Bc2,... vorgesehen, wobei BA = Bc1 + Bc2 +.... Durch die Abbildung f werden insgesamt Ausgabewerte w erzeugt. Aus Ausgabewerten a der affinen Abbildung A werden Mehrzahlen von Mengen Mxi, i = 1,2,... = Mx11, Mx12,... Mx21, Mx22,... gebildet. Aus Ausgabewerten W der invertierbaren Abbildungen c1, c2 werden Mengen Lxi, i = 1,2,... = Lx11, Lx12,... Lx21, Lx22,... gebildet. Weiter werden Mengen M1 = {Mx11, Mx21, Mx31...}, M2 = {Mx12, Mx22, Mx32...}... und L1 = {Lx11, Lx21, Lx31...}, L2 = {Lx12, Lx22, Lx32...}... gebildet. Die ein oder mehreren invertierbaren Abbildungen c1, c2,... werden derart ausgewählt oder gebildet, dass die Mengen M1, M2... auf die Mengen L1, L2... abgebildet werden.
摘要:
A computing device configured to compute a data function (f) on a function-input value (w), the device comprising an electronic storage storing a first table network configured for the data function (f), - the computing device comprising an electronic processor coupled to the storage and configured to obtain multiple first table inputs for the first table network, the multiple first table inputs (x=E(w, s)) including the function- input value (w), and to compute the data function (f) by applying the first table network to the multiple first table inputs (x) to produce multiple first table outputs (u=E(f(w), g(w,s)), the multiple first table outputs (u) including a function-output value (f(w)), the function-output value (f(w)) corresponding to the result of applying the data function (f) to the function- input value (w), - the electronic storage is further storing a second table network configured to cooperate with the first table network for countering modifications made to the first table network, the electronic processor being configured to obtain multiple second table inputs for the second table network, the second table inputs including the multiple first table outputs (u) and at least one of the multiple first table inputs (w; s), and to apply the second table network to the multiple second table inputs, the second table network being configured to verify for at least a specific one (f(w) or g(w,s)) of the multiple first table outputs if an unmodified first table network could obtain the specific one of the multiple first table outputs (f(w); g(w,s)) from the given at least one of the multiple first table inputs (w; s), - the second table network produces second table outputs (v= E(w', s')) including a protected function output (w'), the protected function output being equal to the function output (f(w)) in case the verification is successful and the protected function output (w') being unequal to the function output in case the verification is unsuccessful.
摘要:
An interpretive garment marking system and method allows for one or more garments to be used to convey messages or information, or otherwise provide forms of interaction with a first group of humans. Conveyance and interaction with the first group is done without conveyance and interaction with a second different group of humans even though the humans of both groups have substantially similar access to visually perceive the garments. Implementations include encryption, keying, camouflage, authentication, masking, selection, signing, manipulation, and/or combination.
摘要:
This invention provides an automated system for the processing of data packets, composed of personal identifiers and personal data, such that the personally identifiable data sent by one party may be considered anonymous once received by a second party. The invention uses secret sharing techniques to facilitate distributed key management of the mapping functions and strong authentication to allow the system to be operated remotely.
摘要:
This invention concerns a consumable authentication protocol for validating the existence of an untrusted authentication chip, as well as ensuring that the authentication chip lasts only as long as the consumable. In a further aspect it concerns a consumable authentication system for the protocol. A trusted authentication chip has a test function; and the untrusted authentication chip has a read function to test data from the trusted chip, including a random number and its signature, encrypted using a first key, by comparing the decrypted signature with a signature calculated from the decrypted random number. In the event that the two signatures match, it returns a data message and an encrypted version of the data message in combination with the random number, encrypted using the second key. The test function operates to encrypt the random number together with the data message using a second secret key, compare the two versions of the random number encrypted together with the data message using the second key. In the event that the two versions match, the untrusted authentication chip and the data message are considered to be valid; otherwise, they are considered to be invalid.
摘要:
Various features pertain to cryptographic ciphers such as Advanced Encryption Standard (AES) block ciphers. In some examples described herein, a modified masked AES SubBytes procedure uses a static lookup table that is its own inverse in GF (2 2 ). The static lookup table facilitates computation of the multiplicative inverse during nonlinear substitution operations in GF (2 2 ). In an AES encryption example, the AES device combines plaintext with a round key to obtain combined data, then routes the combined data through an AES SubBytes substitution stage that employs the static lookup table and a dynamic table to perform a masked multiplicative inverse in GF (2 2 ) to obtain substituted data. The substituted data is then routed through additional cryptographic AES stages to generate ciphertext. The additional stages may include further SubBytes stages that also exploit the static and dynamic tables. Other examples employ either a static lookup table or a dynamic lookup table but not both.
摘要:
An authentication controller coupled to a first communication port of a portable computing device is allowed to provide authentication on behalf of an accessory device coupled to a second communication port of the portable computing device. In one embodiment, a dongle that includes an authentication controller can be coupled with the portable computing device. Accessory devices can also be coupled with the potable computing device through other ports, including wireless ports. The dongle can provide cross-transport authentication for accessories that do not include authentication controllers. Once the dongle had been properly authenticated, the permissions granted to the dongle port can be transferred to a communication port coupled with an accessory.
摘要:
A system for security purposes comprising: - an inner structure that is accessible by a plurality of terminals, - wherein the system allows a measurement on the inner structure of the system by using a challenge signal comprising a plurality of input signals applied in parallel to the terminals and by receiving a response signal dependent on a setting of the challenge signal and dependent on the inner structure of the system, wherein - the system comprises at least two features of the group containing: > the ability to process non-binary input signals, > a bandwidth at the terminals and an information content ensuring a incomplete readout of the information content within a predefined access time period, > a spatial and/or logical disorder of the inner structure, > a non-linear relation between the input signals and output signals appearing at the terminals, and that - from the knowledge of a subset of the predefined settings and of associated response signals, the response signal associated with a particular setting outside the subset is not predictable with a probability higher than the probability for guessing the response signal.
摘要:
To authenticate a user of a communications network, credentials from the user are centrally receiving. An authentication sequence is retrieved from a plurality of retrievable authentication sequences, and the retrieved authentication sequence is performed to authenticate the user based on the received credentials.