BR112013004010A2 - "aparelho e método para processo de cifragem de bloco para ambientes inseguros" - Google Patents
"aparelho e método para processo de cifragem de bloco para ambientes inseguros"Info
- Publication number
- BR112013004010A2 BR112013004010A2 BR112013004010A BR112013004010A BR112013004010A2 BR 112013004010 A2 BR112013004010 A2 BR 112013004010A2 BR 112013004010 A BR112013004010 A BR 112013004010A BR 112013004010 A BR112013004010 A BR 112013004010A BR 112013004010 A2 BR112013004010 A2 BR 112013004010A2
- Authority
- BR
- Brazil
- Prior art keywords
- tables
- environments
- encryption process
- block encryption
- encryption
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0618—Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
- H04L9/0631—Substitution permutation network [SPN], i.e. cipher composed of a number of stages or rounds each involving linear and nonlinear transformations, e.g. AES algorithms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/04—Masking or blinding
- H04L2209/043—Masking or blinding of tables, e.g. lookup, substitution or mapping
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/16—Obfuscation or hiding, e.g. involving white box
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Storage Device Security (AREA)
- Emergency Protection Circuit Devices (AREA)
Abstract
aparelho e método para processo de cifragem de bloco para ambientes inseguros. a presente invenção refere-se a método e aparelho para aumentar segurança de um algoritmo criptográfico tal como quando decifrando, cifrando ou de uma assinatura digital usando um cifrador do tipo de bloco tal como aes implementado, por exemplo, em um modelo de "caixa branca" com a chave de cifragem conhecida ou desconhecida no tempo de compilação. este método é seguro para uso em ambientes de transmitir com confiança, particularmente para garantir chaves criptográficas. as tabelas de consulta características de tais algoritmos são aqui protegidas contra ataque ao fazer todas as tais tabelas do mesmo tamanho e indistinguíveis, e adicionalmente ao mascarar os valores de saída de tais tabelas, tipicamente onde a tabelas executam uma função de permutação ou uma operação or exclusiva lógica.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US12/806,768 US8644500B2 (en) | 2010-08-20 | 2010-08-20 | Apparatus and method for block cipher process for insecure environments |
PCT/US2011/046483 WO2012024086A1 (en) | 2010-08-20 | 2011-08-03 | Apparatus and method for block cipher process for insecure environments |
Publications (1)
Publication Number | Publication Date |
---|---|
BR112013004010A2 true BR112013004010A2 (pt) | 2016-06-28 |
Family
ID=44583403
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
BR112013004010A BR112013004010A2 (pt) | 2010-08-20 | 2011-08-03 | "aparelho e método para processo de cifragem de bloco para ambientes inseguros" |
Country Status (10)
Country | Link |
---|---|
US (1) | US8644500B2 (pt) |
EP (1) | EP2606603A1 (pt) |
KR (1) | KR20130041353A (pt) |
CN (1) | CN103119888A (pt) |
AU (1) | AU2011292312B2 (pt) |
BR (1) | BR112013004010A2 (pt) |
CA (1) | CA2807636A1 (pt) |
DE (1) | DE112011102765T5 (pt) |
SE (1) | SE1350203A1 (pt) |
WO (1) | WO2012024086A1 (pt) |
Families Citing this family (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8644500B2 (en) | 2010-08-20 | 2014-02-04 | Apple Inc. | Apparatus and method for block cipher process for insecure environments |
US9274976B2 (en) * | 2010-11-05 | 2016-03-01 | Apple Inc. | Code tampering protection for insecure environments |
US9654279B2 (en) * | 2014-03-20 | 2017-05-16 | Nxp B.V. | Security module for secure function execution on untrusted platform |
US9641337B2 (en) * | 2014-04-28 | 2017-05-02 | Nxp B.V. | Interface compatible approach for gluing white-box implementation to surrounding program |
SG10201405852QA (en) | 2014-09-18 | 2016-04-28 | Huawei Internat Pte Ltd | Encryption function and decryption function generating method, encryption and decryption method and related apparatuses |
US9665699B2 (en) * | 2015-03-13 | 2017-05-30 | Nxp B.V. | Implementing padding in a white-box implementation |
US10015009B2 (en) * | 2015-11-25 | 2018-07-03 | Nxp B.V. | Protecting white-box feistel network implementation against fault attack |
US10171234B2 (en) * | 2015-12-16 | 2019-01-01 | Nxp B.V. | Wide encoding of intermediate values within a white-box implementation |
DE102016008456B4 (de) * | 2016-07-12 | 2018-03-29 | Giesecke+Devrient Mobile Security Gmbh | White Box AES Implementierung |
EP3300291A1 (en) * | 2016-09-27 | 2018-03-28 | Gemalto SA | Method to counter dca attacks of order 2 and higher |
FR3061822B1 (fr) | 2017-01-10 | 2019-05-10 | Safran Identity & Security | Procede de chiffrement ou de dechiffrement d'un n-uplet de donnees avec un n-uplet de cles secretes predeterminees |
CN109962768B (zh) * | 2017-12-26 | 2022-03-15 | 中国航空工业集团公司西安航空计算技术研究所 | 一种基于白盒aes的航电系统加解密方法 |
US20200313850A1 (en) * | 2019-03-29 | 2020-10-01 | Irdeto Canada Corporation | Method and apparatus for implementing a white-box cipher |
Family Cites Families (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6518896B1 (en) * | 2000-01-15 | 2003-02-11 | Sony Electronics, Inc. | Multiple symbol length lookup table |
JP2002261751A (ja) * | 2001-03-02 | 2002-09-13 | Hitachi Ltd | 暗号処理方法 |
US7577250B2 (en) * | 2004-08-12 | 2009-08-18 | Cmla, Llc | Key derivation functions to enhance security |
US8077861B2 (en) * | 2004-08-12 | 2011-12-13 | Cmla, Llc | Permutation data transform to enhance security |
EP2082524B1 (en) * | 2006-11-15 | 2013-08-07 | Certicom Corp. | Implicit certificate verification |
US20100080395A1 (en) * | 2006-11-17 | 2010-04-01 | Koninklijke Philips Electronics N.V. | Cryptographic method for a white-box implementation |
US7822207B2 (en) * | 2006-12-22 | 2010-10-26 | Atmel Rousset S.A.S. | Key protection mechanism |
JP2010515945A (ja) * | 2007-01-11 | 2010-05-13 | コーニンクレッカ フィリップス エレクトロニクス エヌ ヴィ | 実装のコピーの追跡 |
US8165286B2 (en) | 2008-04-02 | 2012-04-24 | Apple Inc. | Combination white box/black box cryptographic processes and apparatus |
US8175265B2 (en) | 2008-09-02 | 2012-05-08 | Apple Inc. | Systems and methods for implementing block cipher algorithms on attacker-controlled systems |
US8644500B2 (en) | 2010-08-20 | 2014-02-04 | Apple Inc. | Apparatus and method for block cipher process for insecure environments |
-
2010
- 2010-08-20 US US12/806,768 patent/US8644500B2/en active Active
-
2011
- 2011-08-03 CN CN201180045342XA patent/CN103119888A/zh active Pending
- 2011-08-03 CA CA2807636A patent/CA2807636A1/en not_active Abandoned
- 2011-08-03 EP EP11741738.6A patent/EP2606603A1/en not_active Withdrawn
- 2011-08-03 SE SE1350203A patent/SE1350203A1/sv not_active Application Discontinuation
- 2011-08-03 DE DE112011102765T patent/DE112011102765T5/de not_active Withdrawn
- 2011-08-03 KR KR1020137006977A patent/KR20130041353A/ko active IP Right Grant
- 2011-08-03 BR BR112013004010A patent/BR112013004010A2/pt not_active IP Right Cessation
- 2011-08-03 AU AU2011292312A patent/AU2011292312B2/en not_active Ceased
- 2011-08-03 WO PCT/US2011/046483 patent/WO2012024086A1/en active Application Filing
Also Published As
Publication number | Publication date |
---|---|
AU2011292312A1 (en) | 2013-03-14 |
DE112011102765T5 (de) | 2013-09-19 |
SE1350203A1 (sv) | 2013-05-20 |
US20120045050A1 (en) | 2012-02-23 |
WO2012024086A1 (en) | 2012-02-23 |
US8644500B2 (en) | 2014-02-04 |
CA2807636A1 (en) | 2012-02-23 |
KR20130041353A (ko) | 2013-04-24 |
CN103119888A (zh) | 2013-05-22 |
EP2606603A1 (en) | 2013-06-26 |
AU2011292312B2 (en) | 2014-09-11 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
BR112013004010A2 (pt) | "aparelho e método para processo de cifragem de bloco para ambientes inseguros" | |
MX336828B (es) | Dispositivo para compartir clave y sistemas para configuracion del mismo. | |
AU2017269736A1 (en) | Multiple-link cryptologic blockchain | |
MX2016001900A (es) | Criptografia nado utilizando funciones unidireccionales. | |
NZ755535A (en) | Puf based composite security marking for anti-counterfeiting | |
PH12018501745A1 (en) | Personal device security using elliptic curve cryptography for secret sharing | |
BR112013028844A2 (pt) | método para manejar dados de privacidade | |
BR112015026182A2 (pt) | método para criptografar dados | |
TW200723818A (en) | Method and system for deriving an encryption key using joint randomness not shared by others | |
BR112016024453A2 (pt) | transporte seguro de máquinas virtuais criptografadas com acesso contínuo do proprietário | |
MX2018005700A (es) | Generación de secuencia de claves para operaciones criptográficas. | |
BRPI0700267A (pt) | método de comunicação entre um roteador e um hospedeiro, roteador para comunicação com um hospedeiro, e, hospedeiro para comunicação com um roteador | |
UA122327C2 (uk) | Nado- криптографія з генераторами ключів | |
MX356293B (es) | Sistemas y métodos con seguridad de programa de criptografía y resistencia a uso indebido. | |
AU2011355202B2 (en) | Device and method for protecting a security module from manipulation attempts in a field device | |
Moradi et al. | On the Portability of Side-Channel Attacks-An Analysis of the Xilinx Virtex 4, Virtex 5, and Spartan 6 Bitstream Encryption Mechanism | |
CN107070633B (zh) | 一种抗高阶功耗分析的aes掩码加密方法 | |
BR112013001733A2 (pt) | dispositivo e método de autenticação, e, programa | |
IN2015CH01905A (pt) | ||
CN102968598A (zh) | 数字文件的解密方法 | |
CN103475466A (zh) | 一种USBKey总线保护实现方法 | |
IN2015CH00976A (pt) | ||
Luck | Classification of the CAESAR Candidates | |
Kumar et al. | Data Protection Using Random Number In Association With ASCII Values | |
CN104685823B (zh) | 随机化电流注入电路以遮蔽栅极噪声以获得附加安全性 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
B08F | Application dismissed because of non-payment of annual fees [chapter 8.6 patent gazette] |
Free format text: REFERENTE A 5A ANUIDADE. |
|
B08K | Patent lapsed as no evidence of payment of the annual fee has been furnished to inpi [chapter 8.11 patent gazette] |
Free format text: EM VIRTUDE DO ARQUIVAMENTO PUBLICADO NA RPI 2377 DE 26-07-2016 E CONSIDERANDO AUSENCIA DE MANIFESTACAO DENTRO DOS PRAZOS LEGAIS, INFORMO QUE CABE SER MANTIDO O ARQUIVAMENTO DO PEDIDO DE PATENTE, CONFORME O DISPOSTO NO ARTIGO 12, DA RESOLUCAO 113/2013. |