Abstract:
Some embodiments are directed to an electronic computation device (100) arranged for obfuscated execution of a multiplication. The device comprises a storage (120) arranged for storing multiple variables used in the execution of an arithmetic operation, a variable ( x: y ; 2) of the multiple variables being represented as multiple multiplicative shares ( X = ( x 0 , x 1 ,..., x m-1 ); Y = ( y 0 , y 1 ,..., y m-1 ); 20), said multiplicative shares being represented in the storage as multiple additive shares ( x i = (x i,0 ,x i,1 ,..., x i,n-1 ) ; Yi = ( y i ,0, y i,1 ,..., y i,n-1 ); 210, 220).
Abstract:
A method is described for transferring secrets from a first cryptographic system installed on a computing device to a second cryptographic system installed on the computing device to enable the second cryptographic system to replace the first cryptographic system. The first cryptographic system has an identity, and a trusted party is trusted by the first cryptographic system and has a trusted party private key and a trusted party public key. The second cryptographic system provides a signature under the trusted party private key of the first cryptographic system identity and a second cryptographic system public key, the second cryptographic system having a second cryptographic system private key. The first cryptographic system confirms that the signature comprises the identity and uses a first cryptographic system private key and a first cryptographic system public key to establish a shared secret with the second cryptographic system. The first cryptographic system and the second cryptographic system use the shared secret to transfer secrets.
Abstract:
Technologies for secure certificate management include a computing device that receives a keystore command related to an encryption key, converts the keystore command into an encrypted database command, unlocks an encrypted database stored by the computing device with an obfuscated passphrase, and executes the encrypted database command. The encrypted database includes a key table to store binary copies of encryption keys and a metadata table to store metadata related to the encryption keys. The computing device returns a response to the keystore command in response to executing the encrypted database command. The keystore command may be received and the response may be returned via a command-line interface or a machine-to-machine interface. The computing device may load multiple encoded passphrase segments from corresponding predetermined file system locations, decode the encoded passphrase segments, and compound the decoded passphrase segments to generate the passphrase. Other embodiments are described and claimed.
Abstract:
The present invention relates to a method to intrinsically protect a computer program having a driving value (DV) dedicated to handle sensitive data, said driving value (DV) comprising a plurality of N computation units (A,B) to perform computations using sensitive data and susceptible to let sensitive data leak, each unit having V possible values, said method comprising the step (S1) of unrolling k parts of P units, with P>1 and P
Abstract:
A calculating device (100) arranged to perform calculations on elements of a ring (R), a ring addition and a ring multiplication being defined on the ring The calculating device comprises an operator module (120) comprising multiple operator units, and a calculation manager (130) arranged to perform a ring multiplication by applying a sequence of the multiple operator units, and perform a ring addition be applying a sequence of the multiple operator units, wherein the sequence for the ring multiplication is the same as the sequence for the ring addition.
Abstract:
A computer implemented method of access control for a restricted resource of a resource provider in a network connected computer system, wherein a blockchain data structure accessible via the network stores digitally signed records validated by network connected miner software components, the method comprising: identifying an access control role definition for access to the resource, the role including a specification of access permissions; defining a cryptocurrency for indicating authorisation to access the resource, the cryptocurrency being formed of tradeable units of value associated with records in the blockchain and wherein transfer of the cryptocurrency between records in the blockchain is validated by the miners; receiving a request from an authenticated resource consumer for authorisation to access the resource; and submitting a blockchain transaction to the miner components to transfer a quantity of cryptocurrency to a consumer record in the blockchain, the transaction including an identification of the role, such that the consumer record identifies that the consumer is authorised to access the resource in accordance with the role definition.
Abstract:
Procédé de chiffrement, procédé de chiffrement, dispositifs et programmes correspondants. L'invention se rapporte à un procédé de Procédé de chiffrement d'un code à chiffrer ( Sx ) d'un programme informatique à l'aide d'une clé de chiffrement ( Kx ) sélectionnée parmi au moins deux clés de chiffrement ( Kx, Ky, Kz ). Un tel procédé comprend: - une étape d'obtention (11) d'une grammaire descriptive ( G D ) du langage du code à chiffrer; - une étape de codage (13) du code à chiffrer ( Sx ) à l'aide de la grammaire descriptive (G D ) délivrant une chaine de caractères ( Cd C ) au sein de laquelle au moins une instruction de départ (InstrD) du code à chiffrer (Sx) est codée en une représentation ( RInstrD ) dans la chaine de caractères ( Cd C ); - une étape de chiffrement (14) de la chaine de caractères ( CdC ) à l'aide d'une clé de chiffrement ( Kx )appartenant à l'ensemble de clés de chiffrement ( Kx, Ky, Kz ), délivrant une chaine chiffrée ( Cx ). Le procédé de déchiffrement comprend les étapes inverses et fait également appel à la grammaire descriptive du code à chiffrer.
Abstract:
A technique is introduced that can securely displaying decrypted images while preventing these decrypted images against an attempt to capture such. Some aspects of the technique include loading a cryptographic shader into a graphics processor unit (GPU) in the recipient's computer device separate from the CPU in the recipient's computer device. In some embodiments, the cryptographic shader that is loaded includes instructions that implement a white-box cryptographic algorithm to decrypt encrypted images. A cryptographic key is integrated within the white-box cryptographic algorithm so that the cryptographic key is protected from extraction. When the GPU receives the encrypted images, the cryptographic shader can perform decryption processes to generate decrypted images. The decrypted images are loaded by the GPU directly from the GPU into a frame buffer such that the decrypted images are to be displayed without any portion of the decrypted images passing through the CPU.
Abstract:
A method and user device for preventing unauthorized viewing of at least one entity, e.g. character, digit, image and/or shape, is provided. The method comprises splitting up the entity in at least two parts, after which one of the split parts are sent to a first display unit and the remaining split part(s) is/are sent to at least one other display unit.
Abstract:
Die Erfindung schafft eine Prozessor-Einrichtung mit einer darauf implementierten ausführbaren White Box maskierten Implementierung eines kryptographischen Algorithmus. Die White Box Maskierung umfasst eine affine Abbildung A, die so gestaltet ist, dass jedes Bit in den Ausgabewerten w der affinen Abbildung A von mindestens einem Bit aus den Verschleierungswerten y abhängt, wodurch erreicht wird, dass die Ausgabewerte w der affinen Abbildung A statistisch ausgeglichen sind.