CN106031079B - 加密算法中的运算符提升 - Google Patents

加密算法中的运算符提升 Download PDF

Info

Publication number
CN106031079B
CN106031079B CN201480076008.4A CN201480076008A CN106031079B CN 106031079 B CN106031079 B CN 106031079B CN 201480076008 A CN201480076008 A CN 201480076008A CN 106031079 B CN106031079 B CN 106031079B
Authority
CN
China
Prior art keywords
data value
obscure
expression
operator
component
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201480076008.4A
Other languages
English (en)
Chinese (zh)
Other versions
CN106031079A (zh
Inventor
P.M.H.M.A.戈里斯森
L.M.G.M.托胡伊泽恩
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Koninklijke Philips NV
Original Assignee
Koninklijke Philips NV
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Koninklijke Philips NV filed Critical Koninklijke Philips NV
Publication of CN106031079A publication Critical patent/CN106031079A/zh
Application granted granted Critical
Publication of CN106031079B publication Critical patent/CN106031079B/zh
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/008Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols involving homomorphic encryption
    • HELECTRICITY
    • H03ELECTRONIC CIRCUITRY
    • H03MCODING; DECODING; CODE CONVERSION IN GENERAL
    • H03M13/00Coding, decoding or code conversion, for error detection or error correction; Coding theory basic assumptions; Coding bounds; Error probability evaluation methods; Channel models; Simulation or testing of codes
    • H03M13/03Error detection or forward error correction by redundancy in data representation, i.e. code words containing more digits than the source words
    • H03M13/05Error detection or forward error correction by redundancy in data representation, i.e. code words containing more digits than the source words using block codes, i.e. a predetermined number of check bits joined to a predetermined number of information bits
    • H03M13/21Non-linear codes, e.g. m-bit data word to n-bit code word [mBnB] conversion with error detection or error correction
    • HELECTRICITY
    • H03ELECTRONIC CIRCUITRY
    • H03MCODING; DECODING; CODE CONVERSION IN GENERAL
    • H03M13/00Coding, decoding or code conversion, for error detection or error correction; Coding theory basic assumptions; Coding bounds; Error probability evaluation methods; Channel models; Simulation or testing of codes
    • H03M13/03Error detection or forward error correction by redundancy in data representation, i.e. code words containing more digits than the source words
    • H03M13/23Error detection or forward error correction by redundancy in data representation, i.e. code words containing more digits than the source words using convolutional codes, e.g. unit memory codes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/04Masking or blinding
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/16Obfuscation or hiding, e.g. involving white box
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0618Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0618Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
    • H04L9/0631Substitution permutation network [SPN], i.e. cipher composed of a number of stages or rounds each involving linear and nonlinear transformations, e.g. AES algorithms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0618Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
    • H04L9/0637Modes of operation, e.g. cipher block chaining [CBC], electronic codebook [ECB] or Galois/counter mode [GCM]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/065Encryption by serially and continuously modifying data stream elements, e.g. stream cipher systems, RC4, SEAL or A5/3
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/065Encryption by serially and continuously modifying data stream elements, e.g. stream cipher systems, RC4, SEAL or A5/3
    • H04L9/0656Pseudorandom key sequence combined element-for-element with data sequence, e.g. one-time-pad [OTP] or Vernam's cipher
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/065Encryption by serially and continuously modifying data stream elements, e.g. stream cipher systems, RC4, SEAL or A5/3
    • H04L9/0656Pseudorandom key sequence combined element-for-element with data sequence, e.g. one-time-pad [OTP] or Vernam's cipher
    • H04L9/0662Pseudorandom key sequence combined element-for-element with data sequence, e.g. one-time-pad [OTP] or Vernam's cipher with particular pseudorandom sequence generator

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Percussion Or Vibration Massage (AREA)
  • Storage Device Security (AREA)
  • Measuring And Recording Apparatus For Diagnosis (AREA)
  • Image Processing (AREA)
CN201480076008.4A 2013-12-20 2014-12-17 加密算法中的运算符提升 Expired - Fee Related CN106031079B (zh)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
EP13198943 2013-12-20
EP13198943.6 2013-12-20
PCT/EP2014/078107 WO2015091583A1 (en) 2013-12-20 2014-12-17 Operator lifting in cryptographic algorithm

Publications (2)

Publication Number Publication Date
CN106031079A CN106031079A (zh) 2016-10-12
CN106031079B true CN106031079B (zh) 2019-10-11

Family

ID=49955140

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201480076008.4A Expired - Fee Related CN106031079B (zh) 2013-12-20 2014-12-17 加密算法中的运算符提升

Country Status (5)

Country Link
US (1) US10075290B2 (enExample)
EP (1) EP3085004A1 (enExample)
JP (1) JP6397921B2 (enExample)
CN (1) CN106031079B (enExample)
WO (1) WO2015091583A1 (enExample)

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2016505891A (ja) 2012-12-21 2016-02-25 コーニンクレッカ フィリップス エヌ ヴェKoninklijke Philips N.V. テーブルネットワークを有する計算装置
US10270598B2 (en) * 2016-08-26 2019-04-23 Intel Corporation Secure elliptic curve cryptography instructions
JP7383985B2 (ja) * 2019-10-30 2023-11-21 富士電機株式会社 情報処理装置、情報処理方法及びプログラム
US12099997B1 (en) 2020-01-31 2024-09-24 Steven Mark Hoffberg Tokenized fungible liabilities
WO2023097026A2 (en) * 2021-11-23 2023-06-01 Strong Force TX Portfolio 2018, LLC Transaction platforms where systems include sets of other systems

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2006012638A2 (en) * 2004-07-29 2006-02-02 Vadium Technology, Inc. Techniques to strengthen one-time pad encryption
WO2006058561A1 (en) * 2004-12-01 2006-06-08 Telecom Italia S.P.A. Method and related device for hardware-oriented conversion between arithmetic and boolean random masking
CN1890914A (zh) * 2003-12-11 2007-01-03 皇家飞利浦电子股份有限公司 块加密系统、利用置换隐藏各加密轮的核心加密函数
CN1926800A (zh) * 2003-10-20 2007-03-07 伊索普株式会社 信息的加密发送接收方法
CN101093627A (zh) * 2007-08-07 2007-12-26 威盛电子股份有限公司 密码编译码装置
CN101242275A (zh) * 2008-03-07 2008-08-13 四川虹微技术有限公司 基于流密码加密的安全传输方法
CN101578813A (zh) * 2007-01-11 2009-11-11 皇家飞利浦电子股份有限公司 跟踪实现的拷贝
CN101969374A (zh) * 2010-10-27 2011-02-09 北京航空航天大学 分组密码算法中混淆层的实现方法
CN102460404A (zh) * 2009-06-01 2012-05-16 起元技术有限责任公司 生成混淆数据

Family Cites Families (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US3849760A (en) * 1971-07-12 1974-11-19 Hitachi Ltd Multi-dimensional pattern recognition processor
JP2000115157A (ja) * 1998-10-02 2000-04-21 Nippon Telegr & Teleph Corp <Ntt> 紛失通信方法
US6448910B1 (en) * 2001-03-26 2002-09-10 Morpho Technologies Method and apparatus for convolution encoding and viterbi decoding of data that utilize a configurable processor to configure a plurality of re-configurable processing elements
US20060291650A1 (en) * 2001-05-22 2006-12-28 Viswanath Ananth State-varying hybrid stream cipher
WO2006046187A1 (en) * 2004-10-28 2006-05-04 Koninklijke Philips Electronics N.V. Method and system for obfuscating a cryptographic function
JP4618684B2 (ja) * 2006-06-14 2011-01-26 日本電信電話株式会社 透かし埋め込み処理方法、透かし埋め込み処理システム、サービス提供者装置および顧客装置、並びにプログラム
US7630982B2 (en) * 2007-02-24 2009-12-08 Trend Micro Incorporated Fast identification of complex strings in a data stream
US20080235802A1 (en) * 2007-03-21 2008-09-25 Microsoft Corporation Software Tamper Resistance Via Integrity-Checking Expressions
ATE513377T1 (de) * 2007-12-13 2011-07-15 Oberthur Technologies Verfahren für kryptografische datenverarbeitung, insbesondere unter verwendung einer s box und diesbezügliche einrichtung und software
EP2382536B1 (en) * 2009-01-29 2018-04-25 Fortress Applications Ltd. System and methods for encryption with authentication integrity
CA2761889A1 (en) * 2009-05-13 2010-11-18 Eric Myron Smith System and method for securely identifying and authenticating devices in a symmetric encryption system
US8718280B2 (en) 2010-12-17 2014-05-06 Apple Inc. Securing keys of a cipher using properties of the cipher process

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1926800A (zh) * 2003-10-20 2007-03-07 伊索普株式会社 信息的加密发送接收方法
CN1890914A (zh) * 2003-12-11 2007-01-03 皇家飞利浦电子股份有限公司 块加密系统、利用置换隐藏各加密轮的核心加密函数
WO2006012638A2 (en) * 2004-07-29 2006-02-02 Vadium Technology, Inc. Techniques to strengthen one-time pad encryption
WO2006058561A1 (en) * 2004-12-01 2006-06-08 Telecom Italia S.P.A. Method and related device for hardware-oriented conversion between arithmetic and boolean random masking
CN101578813A (zh) * 2007-01-11 2009-11-11 皇家飞利浦电子股份有限公司 跟踪实现的拷贝
CN101093627A (zh) * 2007-08-07 2007-12-26 威盛电子股份有限公司 密码编译码装置
CN101242275A (zh) * 2008-03-07 2008-08-13 四川虹微技术有限公司 基于流密码加密的安全传输方法
CN102460404A (zh) * 2009-06-01 2012-05-16 起元技术有限责任公司 生成混淆数据
CN101969374A (zh) * 2010-10-27 2011-02-09 北京航空航天大学 分组密码算法中混淆层的实现方法

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
efficient aggregation of encrypted data in wireless sensor networks;Claude Castelluccia, Einar Mykletun, Gene Tsudik;《The second annual international conference on Mobile and Ubiquitous System:Networking and Services》;20051121;第1-9页 *

Also Published As

Publication number Publication date
US10075290B2 (en) 2018-09-11
CN106031079A (zh) 2016-10-12
US20160315761A1 (en) 2016-10-27
WO2015091583A1 (en) 2015-06-25
EP3085004A1 (en) 2016-10-26
JP6397921B2 (ja) 2018-09-26
JP2017501445A (ja) 2017-01-12

Similar Documents

Publication Publication Date Title
US12101415B2 (en) Method of RSA signature or decryption protected using a homomorphic encryption
US12445418B2 (en) Affine masking for secure encryption schemes
US7764785B2 (en) Method for communicating securely over an insecure communication channel
JP5599728B2 (ja) ホワイトボックス実装
US20210036849A1 (en) Methods and systems for encryption and homomorphic encryption systems using geometric algebra and hensel codes
JP7123959B2 (ja) 楕円曲線点乗算デバイス及び方法
US8976960B2 (en) Methods and apparatus for correlation protected processing of cryptographic operations
Moon et al. IoT application protection against power analysis attack
JP6517436B2 (ja) 暗号化デバイス及び符号化デバイス
JP2012129993A (ja) 暗号装置の保護方法及び保護システム
US10826694B2 (en) Method for leakage-resilient distributed function evaluation with CPU-enclaves
CN106031079B (zh) 加密算法中的运算符提升
US20220417000A1 (en) Random position cipher encryption using scrambled ascii strings
CN115549891B (zh) 同态加密方法、同态解密方法、同态计算方法及设备
JP2020515093A (ja) 符号化加算のための計算デバイス
CN115865348B (zh) 数据加密方法、同态计算方法及设备
Reyad et al. Image encryption using koblitz’s encoding and new mapping method based on elliptic curve random number generator
CN106603224B (zh) 基于白盒加密的安全运行方法及系统
JP4706811B2 (ja) 依頼計算を用いた演算装置、及び記録媒体
KR20220079522A (ko) 기하 대수 및 헨젤 코드들을 이용한 암호화를 위한 방법들 및 시스템들과 동형 암호화 시스템들
US12143491B2 (en) Secured performance of an elliptic curve cryptographic process
CN110874479B (zh) 安全处理决策树模型的方法、系统、数据终端及处理终端
Shi et al. Obfuscatable multi-recipient re-encryption for secure privacy-preserving personal health record services
Chaouch et al. Enhanced Image Security in Cloud Computing Using Hybrid Encryption with ECC and Spatiotemporal Cryptography
Elamir et al. Review of Advanced Techniques for Data Security Technology and Applications

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20191011

Termination date: 20201217