CN107592963B - 用于执行安全计算的方法和计算设备 - Google Patents

用于执行安全计算的方法和计算设备 Download PDF

Info

Publication number
CN107592963B
CN107592963B CN201680028803.5A CN201680028803A CN107592963B CN 107592963 B CN107592963 B CN 107592963B CN 201680028803 A CN201680028803 A CN 201680028803A CN 107592963 B CN107592963 B CN 107592963B
Authority
CN
China
Prior art keywords
input value
encryption level
result
encoded
calculation
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201680028803.5A
Other languages
English (en)
Chinese (zh)
Other versions
CN107592963A (zh
Inventor
H.J.J.H.舍佩斯
P.M.H.M.A.戈里斯森
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Koninklijke Philips NV
Original Assignee
Koninklijke Philips NV
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Koninklijke Philips NV filed Critical Koninklijke Philips NV
Publication of CN107592963A publication Critical patent/CN107592963A/zh
Application granted granted Critical
Publication of CN107592963B publication Critical patent/CN107592963B/zh
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/002Countermeasures against attacks on cryptographic mechanisms
    • GPHYSICS
    • G09EDUCATION; CRYPTOGRAPHY; DISPLAY; ADVERTISING; SEALS
    • G09CCIPHERING OR DECIPHERING APPARATUS FOR CRYPTOGRAPHIC OR OTHER PURPOSES INVOLVING THE NEED FOR SECRECY
    • G09C1/00Apparatus or methods whereby a given sequence of signs, e.g. an intelligible text, is transformed into an unintelligible sequence of signs by transposing the signs or groups of signs or by replacing them by others according to a predetermined system
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0618Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0618Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
    • H04L9/0631Substitution permutation network [SPN], i.e. cipher composed of a number of stages or rounds each involving linear and nonlinear transformations, e.g. AES algorithms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/16Obfuscation or hiding, e.g. involving white box

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Storage Device Security (AREA)
CN201680028803.5A 2015-05-19 2016-05-05 用于执行安全计算的方法和计算设备 Active CN107592963B (zh)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
EP15168069.1 2015-05-19
EP15168069 2015-05-19
PCT/EP2016/060121 WO2016184695A1 (en) 2015-05-19 2016-05-05 Computing with encrypted values

Publications (2)

Publication Number Publication Date
CN107592963A CN107592963A (zh) 2018-01-16
CN107592963B true CN107592963B (zh) 2020-05-19

Family

ID=53189697

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201680028803.5A Active CN107592963B (zh) 2015-05-19 2016-05-05 用于执行安全计算的方法和计算设备

Country Status (5)

Country Link
US (1) US10680796B2 (enExample)
EP (1) EP3298720B1 (enExample)
JP (1) JP6499323B2 (enExample)
CN (1) CN107592963B (enExample)
WO (1) WO2016184695A1 (enExample)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP7132926B2 (ja) * 2017-01-05 2022-09-07 コーニンクレッカ フィリップス エヌ ヴェ コンパイルデバイス及びコンパイル方法
US11190336B2 (en) * 2019-05-10 2021-11-30 Sap Se Privacy-preserving benchmarking with interval statistics reducing leakage
US10976965B1 (en) * 2020-10-14 2021-04-13 First Capitol Consulting, Inc. Optimization of in-memory processing of data represented by an acyclic graph so that the removal and re-materialization of data in selected nodes is minimized

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8175265B2 (en) * 2008-09-02 2012-05-08 Apple Inc. Systems and methods for implementing block cipher algorithms on attacker-controlled systems
CN103745253A (zh) * 2013-12-23 2014-04-23 宁波立芯射频股份有限公司 基于双芯片电子标签的加密校验方法
CN104580160A (zh) * 2014-12-16 2015-04-29 上海天奕达电子科技有限公司 一种信息交互方法及系统

Family Cites Families (20)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4278837A (en) 1977-10-31 1981-07-14 Best Robert M Crypto microprocessor for executing enciphered programs
JPS58116571A (ja) 1981-12-29 1983-07-11 富士通株式会社 マイクロコンピユ−タに於ける命令暗号化方式及びその実施に使用されるマイクロコンピユ−タ
US6594761B1 (en) 1999-06-09 2003-07-15 Cloakware Corporation Tamper resistant software encoding
CA2327911A1 (en) * 2000-12-08 2002-06-08 Cloakware Corporation Obscuring functions in computer software
DE10201449C1 (de) 2002-01-16 2003-08-14 Infineon Technologies Ag Rechenwerk, Verfahren zum Ausführen einer Operation mit einem verschlüsselten Operanden, Carry-Select-Addierer und Kryptographieprozessor
FR2875318A1 (fr) * 2004-09-15 2006-03-17 St Microelectronics Sa Protection d'un algorithme des
US8150029B2 (en) 2005-12-29 2012-04-03 Proton World International N.V. Detection of a disturbance in a calculation performed by an integrated circuit
IL180020A (en) 2006-12-12 2013-03-24 Waterfall Security Solutions Ltd Encryption -and decryption-enabled interfaces
TWI385557B (zh) 2006-12-25 2013-02-11 Via Tech Inc 應用於控制晶片之程式碼開發程式中之資料保護方法與工具程式
JP2008233683A (ja) * 2007-03-22 2008-10-02 Toshiba Corp 暗号処理装置及びプログラム
US8625794B2 (en) * 2009-06-19 2014-01-07 Irdeto Corporate B.V. White-box cryptographic system with configurable key using intermediate data modification
WO2011080487A1 (fr) * 2009-12-30 2011-07-07 France Telecom Procede de generation de table de correspondance pour une boite blanche cryptographique
US8600048B1 (en) * 2010-06-28 2013-12-03 Voltage Security, Inc. Format-translating encryption systems
US8718280B2 (en) * 2010-12-17 2014-05-06 Apple Inc. Securing keys of a cipher using properties of the cipher process
US8775826B2 (en) 2011-02-09 2014-07-08 Apple Inc. Counteracting memory tracing on computing systems by code obfuscation
US9189425B2 (en) * 2011-09-01 2015-11-17 Apple Inc. Protecting look up tables by mixing code and operations
US10191754B2 (en) 2012-01-09 2019-01-29 Koninklijke Philips N.V. Virtual machine device having key driven obfuscation and method
US9094471B2 (en) * 2012-08-22 2015-07-28 Certicom Corp. Method of lawful interception for UMTS
JP5861018B1 (ja) * 2012-12-21 2016-02-16 コーニンクレッカ フィリップス エヌ ヴェKoninklijke Philips N.V. テーブルネットワークによって構成されたコンピューティングデバイス
JP2016505891A (ja) 2012-12-21 2016-02-25 コーニンクレッカ フィリップス エヌ ヴェKoninklijke Philips N.V. テーブルネットワークを有する計算装置

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8175265B2 (en) * 2008-09-02 2012-05-08 Apple Inc. Systems and methods for implementing block cipher algorithms on attacker-controlled systems
CN103745253A (zh) * 2013-12-23 2014-04-23 宁波立芯射频股份有限公司 基于双芯片电子标签的加密校验方法
CN104580160A (zh) * 2014-12-16 2015-04-29 上海天奕达电子科技有限公司 一种信息交互方法及系统

Also Published As

Publication number Publication date
JP2018515812A (ja) 2018-06-14
US10680796B2 (en) 2020-06-09
JP6499323B2 (ja) 2019-04-10
CN107592963A (zh) 2018-01-16
EP3298720B1 (en) 2019-03-06
WO2016184695A1 (en) 2016-11-24
US20180139038A1 (en) 2018-05-17
EP3298720A1 (en) 2018-03-28

Similar Documents

Publication Publication Date Title
CN107005404B (zh) 实现密码算法的可执行的白盒掩码实施的处理器装置
US9838198B2 (en) Splitting S-boxes in a white-box implementation to resist attacks
CN110663215B (zh) 在白盒场景中的椭圆曲线点乘设备和方法
EP3632032B1 (en) Cryptographic device and method
US10790962B2 (en) Device and method to compute a block cipher
US9819486B2 (en) S-box in cryptographic implementation
EP2936727A1 (en) Computing device comprising a table network
RU2692419C1 (ru) Криптографическое устройство и кодирующее устройство
EP3125462A1 (en) Balanced encoding of intermediate values within a white-box implementation
US8699702B2 (en) Securing cryptographic process keys using internal structures
CN110784306B (zh) Sm4算法白盒实现方法、装置、电子设备及计算机介质
CN106888081A (zh) 白盒实施方案内中间值的宽编码
Ajmal et al. Cloud computing platform: Performance analysis of prominent cryptographic algorithms
CN105184115A (zh) 用于将隐式完整性或可信性检查包括到白箱实现中的方法
CN105721134B (zh) 使用带有多个外部编码的单个白盒实现
CN107592963B (zh) 用于执行安全计算的方法和计算设备
CN105978680A (zh) 在白盒实现方案中实现填充
EP3078154A1 (en) A computing device for iterative application of table networks
US10412054B2 (en) Method for introducing dependence of white-box implementation on a set of strings
CN117424699A (zh) 基于cbc加密模式的aes对称加密优化方法及系统
US12206778B2 (en) Method for performing cryptographic operations in a processing device, corresponding processing device and computer program product
JP6735062B2 (ja) 乱数列生成装置、方法及びプログラム

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant