WO2014095772A1 - Computing device comprising a table network - Google Patents

Computing device comprising a table network Download PDF

Info

Publication number
WO2014095772A1
WO2014095772A1 PCT/EP2013/076782 EP2013076782W WO2014095772A1 WO 2014095772 A1 WO2014095772 A1 WO 2014095772A1 EP 2013076782 W EP2013076782 W EP 2013076782W WO 2014095772 A1 WO2014095772 A1 WO 2014095772A1
Authority
WO
WIPO (PCT)
Prior art keywords
value
function
state
input
output
Prior art date
Application number
PCT/EP2013/076782
Other languages
French (fr)
Other versions
WO2014095772A9 (en
Inventor
Ludovicus Marinus Gerardus Maria Tolhuizen
Paulus Mathias Hubertus Mechtildis Antonius Gorissen
Mina DENG
Alphons Antonius Maria Lambertus Bruekers
Original Assignee
Koninklijke Philips N.V.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Koninklijke Philips N.V. filed Critical Koninklijke Philips N.V.
Priority to EP13811877.3A priority Critical patent/EP2936727A1/en
Priority to CN201380067505.3A priority patent/CN105453481B/en
Priority to BR112015014470A priority patent/BR112015014470A2/en
Priority to JP2015548419A priority patent/JP2016505891A/en
Priority to MX2015007707A priority patent/MX2015007707A/en
Priority to US14/443,409 priority patent/US10180824B2/en
Priority to RU2015129742A priority patent/RU2676454C2/en
Publication of WO2014095772A1 publication Critical patent/WO2014095772A1/en
Publication of WO2014095772A9 publication Critical patent/WO2014095772A9/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/40Transformation of program code
    • G06F8/41Compilation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/002Countermeasures against attacks on cryptographic mechanisms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0618Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/16Obfuscation or hiding, e.g. involving white box

Definitions

  • Computing device comprising a table network
  • the invention relates to a computing device configured to compute a data function on a function- input value
  • the device comprising an electronic storage storing a table network configured for the data function and an electronic processor coupled to the storage and configured to compute the data function by applying the table network, wherein the device is configured to obtain the function- input value as an encoded input value, the table network is configured to take as input the encoded input value and produce as output an encoded output value, the encoded function-output value, the function-output value equals the result of applying the data function to the function-input value.
  • the invention further relates to a corresponding method and compiler.
  • US 2012/0300922 discloses a method for generating a correspondence table suitable for use in a cryptographic processing method and comprising storing a plurality of input data and of output data in the table, each input datum being associated with at least one output datum in the table. For each input datum, at least one of the output data is obtained by applying a coding function to a first subsidiary datum and to an encrypted intermediate datum depending on the input datum.
  • US 2012/0155638 discloses that in the field of computer enabled cryptography, such as a block cipher, the cipher is hardened against an attack by protecting
  • the cipher key by applying to it a predetermined linear permutation before using one key to encrypt or decrypt a message.
  • This is especially advantageous in a "White Box" environment where an attacker has full access to the cipher algorithm, including the algorithm's internal state during its execution.
  • This method and the associated computing apparatus are useful where the key is derived through a process and so is unknown when the software code embodying the cipher is compiled. This is typically the case where there are many users of the cipher and each has his own key, or where each user session has its own key.
  • a computer system may not provide any useful information on sensitive information, such as secret keys used by the computer system.
  • a computer system has other channels that may be observed, e.g., its power consumption or electromagnetic radiation; these channels are referred to as side- channels.
  • side- channels For example, small variations in the power consumed by different instructions and variations in power consumed while executing instructions may be measured. The measured variation may be correlated to sensitive information, such as cryptographic keys.
  • This additional information on secret information, beyond the observable and intended input- output behavior is termed a side-channel.
  • a computer system may 'leak' secret information during its use. Observing and analyzing a side-channel may give an attacker access to better information than may be obtained from cryptanalysis of input-output behavior only.
  • DP A differential power analysis
  • one way to obfuscate a computer program is to encode the input values and to operate as much as possible on encoded values.
  • One may even use so-called table networks to perform computations.
  • Such table network may be crafted by hand, or by specialized programs, e.g. in the case of white-box cryptography, or by general purpose compilers. It was believed that, generally speaking, a table obfuscates the type of operation that is performed. However, the inventors have found that the latter is generally not true. Even if the input(s) and output (s) of a function are encoded, statistical properties of the input/output relations may reveal which function is being encoded. An example of this phenomenon follows.
  • a first aspect of the invention concerns a compiler configured for compiling a computer program, the compiler being configured for parsing the computer program to identify multiple operators, including a data function (f) and a state function (g), and for producing a table network configured for the data function and the state function, wherein the table network is configured to take as input an encoded input value and produce as output an encoded output value, the encoded output value combines a function-output value together with a state-output value encrypted together into a single value, wherein the function-output value equals the result of applying the data function to the function- input value, and the state- output value equals the result of applying the state function to the state-input value, wherein the encoded input value combines the function- input value together with a state-input value encrypted together into a single value.
  • a computing device configured to compute run a computer program compiled by such a compiler.
  • the computing device comprises an electronic storage storing a table network configured for the data function and an electronic processor coupled to the storage and configured to compute the data function by applying the table network.
  • the device is configured to obtain the function- input value as an encoded input value, the encoded input value combines the function- input value together with a state- input value encrypted together into a single value.
  • the table network is further configured to take as input the encoded input value and produce as output an encoded output value, the encoded output value combines a function-output value together with a state-output value encrypted together into a single value, wherein the function-output value equals the result of applying the data function to the function- input value, and, the state-output value equals the result of applying a state function to the state-input value.
  • Obtain a function- input value as an encoded input value means that the device receives the function- input because it receives the encoded input value in which it is encoded together with another value.
  • the device computes two functions: a data function that takes as input a function- input value and produces a function-output value, and a state function that takes as input a state-input value and produces a state-output value.
  • a data function that takes as input a function- input value and produces a function-output value
  • a state function that takes as input a state-input value and produces a state-output value.
  • the one table network receives a single encoded input value into which both the function input value and state input value are encrypted.
  • the state-input value can attain at least two different values.
  • An encryption (often referred to as ' ⁇ ') is reversible, that is from an encoded pair of a function input value and a state input value, both the function input value and the state input value may be recovered. Likewise, from an encoded pair of function output value and state output value, both the function output value and the state output value may be recovered.
  • An encryption is private, that is, different implementations of the system may use a different way to encrypt input or output values together. Furthermore, the encryption adheres at least in part to the principle of diffusion. The values in the encoded value depend on a large part of the encoded value.
  • the input/output value when an input/output value is recovered from an encoded input/output value, then the input/output value depends preferably on all of the encoded input/output value; at least it depends on more bits than the bit size of the input/output value itself. This has the effect that the information on the input/output value is distributed over many bits. Preferably, if one has access to only part of an encoded value, it is impossible to recover the values it encodes, even if one had perfect knowledge of the encoding/decoding function. Note that traditionally, encryption frequently makes use of a key. Using a keyed encoding is an attractive possibility, but due the relatively small size of the input/output values it is also possible to represent the encoding as a table. For this reason encoding and encrypting in the context of variable values, such as input/output values or intermediates values are used interchangeably.
  • the table network may represent two functions, and indeed the encoded input values contains two inputs (the function and state), it is impossible to tell from the table network if it is an encoded version of the data function or of the state function.
  • table network is fully equipped to compute either function and indeed does compute both functions on an independent variable, or set of variables (in embodiments of data functions and-or state functions having multiple inputs).
  • the data function may take one or multiple input values.
  • the state function may take one or multiple input values.
  • the number of input values of the data and state function is the same.
  • the device may be configured to obtain the multiple function-input values as multiple encoded input values.
  • Each one of multiple encoded input values combines a function- input value of the multiple input values together with a state-input value of the multiple state input values encrypted together into a single value.
  • the table network is configured to take as input the multiple encoded input values and produce as output an encoded output value.
  • the encoded output value combines a function- output value together with a state-output value encrypted together into a single value.
  • the function-output value equals the result of applying the data function to the multiple function- input values
  • the state-output value equals the result of applying a state function to the multiple state-input values.
  • this property also holds for the state input variable, although it may be needed to make concessions at this point in order to satisfy competing demands on the available resources.
  • one way to have this property is to create a table network comprising a single table taking as input the encoded input value and producing as output the encoded output value.
  • the table network may comprise a state extractor table and a state function table.
  • the state extractor table is configured such that the state extractor table applied to the encoded input value produces the state-input value.
  • the state function table is configured such that the state function table applied to state-input value produces the state-output value. Note that even if the state value is obtained in the table network, the function input value remains encoded.
  • state extractor tables may produce the state value in an encoded form, although an encoded form which does not depend on the input value, e.g., an encoded state value obtainable by encrypting the state value only.
  • a re-encoding table takes as input an encoded value and produces an encoded value, however the encoding has changed.
  • the re-encoding table may be configured to receiving as input the encoded input value and the state-output value and producing as output a recoded input value.
  • the recoded input value combines the function- input value together with the state-output value encrypted together into a single value.
  • a data function table may be applied to the recoded input value to obtain the encoded output value.
  • the data function table may be configured for receiving as input the recoded input value and as output the encoded output value.
  • the table network may comprise a reduced state function table and a first re-encoding table.
  • the reduced state function table is configured for receiving the state-input value and for producing as output an intermediate state value equal to the result of a reduced state function applied to state-input value, the range of the reduced state function being larger than a single value and smaller than the range of the state function.
  • the first re-encoding table configured for receiving as input the encoded input value and the intermediate state value and producing as output a recoded input value, the recoded input value combines the function- input value together with the intermediate state value encrypted together into a single value.
  • the table network thus computes three functions, the state function, the reduced state function and the data function. Because the reduced state function has a range smaller than the state function, the table for the data function is reduced. Note that the range of the reduced state function has a size larger than 1, so that each input data value has more than one representative even with the reduced state space. In an embodiment, the size, i.e., number of values, of the reduced state space, is at least 2, 4 or 8.
  • the table network may comprise a data function table and a second re-encoding table.
  • the data function table is configured for receiving as input the recoded input value and as output a recoded output value, the recoded output value combines the function-output value together with the intermediate state value encrypted together into a single value.
  • the second re-encoding table is configured for receiving as input the recoded output value and the state-output value and producing as output the encoded output value.
  • the table network is configured for data-input values having at least 4, preferably at least 8 bits. In an embodiment, the table network is configured for state-input values having at least 4, preferably at least 8 bits.
  • the data-input values and state input values have the same bit size. If the data function and the state function have equal input size they are
  • the data-output values and state output values have the same bit size.
  • the data-input values and state value have the same bit size and have 4 bits or more. In an embodiment, the data-input values and state value have the same bit size and have 6 bits or more. In an embodiment, the data-input values and state value have the same bit size and have 8 bits or more.
  • An aspect of the invention concerns a method for run a computer program compiled by a compiler according to the first aspect of the invention, the method comprising computing the data function by applying a table network to an encoded input value and producing as output an encoded output value, the encoded input value combines the function- input value together with a state-input value encrypted together into a single value, the encoded output value combines a function-output value together with a state-output value encrypted together into a single value, wherein the function-output value equals the result of applying the data function to the function- input value, and the state-output value equals the result of applying a state function to the state-input value.
  • the computing device is an electronic device, e.g., a mobile electronic device, mobile phone, set-top box, computer, or the like.
  • a method according to the invention may be implemented on a computer as a computer implemented method, or in dedicated hardware, or in a combination of both.
  • Executable code for a method according to the invention may be stored on a computer program product.
  • Examples of computer program products include memory devices, optical storage devices, integrated circuits, servers, online software, etc.
  • the computer program product comprises non-transitory program code means stored on a computer readable medium for performing a method according to the invention when said program product is executed on a computer.
  • the computer program comprises computer program code means adapted to perform all the steps of a method according to the invention when the computer program is run on a computer.
  • the computer program is embodied on a computer readable medium.
  • Figure 1 is schematic chart illustrating a table network implementing a data function and a state function
  • Figure 2 is schematic chart illustrating a table network implementing a data function and a state function
  • Figure 3 a is schematic chart illustrating a table network implementing a data function and a state function
  • Figure 3b is schematic chart illustrating a table network implementing a data function and a state function
  • Figure 3 c is schematic chart illustrating a table network implementing a data function and a state function
  • Figure 4 is a block diagram illustrating table networks in general
  • Figure 5 is a block diagram illustrating a computing device
  • Figure 6 is a flowchart illustrating a compiler
  • Figure 7 is a flowchart illustrating a method for computing a data function.
  • Figure 4 illustrates the general concept of table network, shown is table network 400.
  • Most functions may be expressed as a network of tables. In particular any composition of arithmetic and logic operations may be so expressed.
  • the network of tables may be an implementation, e.g. of a cipher. Shown are 8 tables of multiple tables.
  • a table transforms an input value to an output value by table-lookup of the input value. Shown are three of the input tables 410, for receiving input from outside the function implementation. Shown is one of the output tables 430.
  • the output tables 430 together form the output of the function implementation, e.g. by concatenation.
  • the tables together form a network.
  • the cipher may be a block cipher; the block cipher may be configured for encryption or for decryption.
  • the block cipher encrypts a block cipher, say AES.
  • the implementation may be for a particular key, in which case the tables may depend on the particular key.
  • Look-up table 426 represents an operator having two inputs and one output. The construction of look-up tables for monadic operators may be extended to dyadic operators.
  • the second input may be 'curried out'; referring to the function transformation technique, currying is the technique of transforming a function that takes n multiple arguments (or an n-tuple of arguments) in such a way that it can be called as a chain of functions, each with a single argument.
  • the look-up table 426 is implemented as multiple monadic look-up tables.
  • one may also generate bit strings for each input and concatenate the results. In this way the look-up table is generated directly, and one single but larger look-up table is obtained.
  • the layout of the look-up tables may differ based on the construction, they have equal size and the same properties. Note that it is not necessary that the multiple input values are encoded according to the same encoding.
  • the table network may use multiple tables encoding two functions or have as sub network table networks that encode for two functions.
  • the system may be configured to use that state or data function of a network table depending on the current encoding.
  • Table network obfuscation techniques may be applied, also in table networks as described herein.
  • the output of a first table may be encoded with a secret, e.g. randomly chosen, encoding, and the input of a second table may be encoded with the inverse encoding.
  • Figure 1 shows a table network 180 embedded in a larger table network 100.
  • Table network 180 contains only a single table 130.
  • Table network 180 is configured to take multiple encoded input values as input, shown are encoded input values 122 and 124. Table network 180 is configured to produce as output an encoded output value 160.
  • data functions and state functions having two input values and a single output value. However, the embodiments may be extended to any number of input values and/or output values. In particular data/state functions with one input and one output are possible and data/state functions with two inputs and one output are possible.
  • Table network 180 is configured for the data function and is stored in an electronic storage, coupled to an electronic processor configured to compute the data function by applying the table network.
  • the encoded value 122 is obtained from a function input value 102 and a state input value 112. For example, this may be done by an encoder 110. Encoder 110 may be included in the same device which stores table network 180, but this is not needed. Input values may be received already in encoded form and/or be transmitted in encoded form. Or they may be received/transmitted in un-encoded form. In the latter case they may be encoded and used internally in encoded form. There may also be a re-encoding, e.g., if outside of the device a different encoding is used. For example, function output value 162 and state output value 164 may be obtained from a decoder 170.
  • Encoded input of the data function may be the output of another table or table network.
  • the latter may or may not be a table network configured for two functions.
  • table networks configured for different data functions By combining table networks configured for different data functions, entire programs may be built up.
  • Encoder/decoder 1 10 and 170 may be obtained as each other's inverse.
  • the encoded input value contains the function input value 102 and state input value 1 12 in an interdependent way, e.g., the function input depends on all bits of the encoded input. Thus, knowing only part of encoded input value 122 will generally not allow one to find either function input value 102 or state input value 1 12.
  • Function/ refers to the data function and g to the state function.
  • the function f is encoded into F such that a value in the domain of F has multiple representatives.
  • input(s) and output(s) of f have multiple representations in the domain and range of the encoded version F of/
  • the function F is designed such that whenever X is a representative of x, then F(X) is a representative offlx).
  • W denote the set of operands we wish to encode.
  • the elements of W x ⁇ are mapped in a one-to-one manner to V by a secret encoding function E.
  • the representatives of the element w in W are the members of the set
  • ⁇ ( ⁇ ) ⁇ E w, a) I ⁇ E ⁇ ⁇ .
  • the number of representatives of each element in W thus equals the cardinality of ⁇ .
  • F maps any pair of representatives of w and w 2 to a representative of f(w , w 2 ).
  • the state of the representative of f(w lt w 2 ) can depend on both operands w and w 2 and could even depend on both states a and ⁇ 2 , in either a deterministic or in a randomized manner. More specifically, the state can depend only on the states a and 2 , which can be implemented by taking a function ⁇ : ⁇ x ⁇ and by defining
  • a table for F thus implements the function/ if the encoding E is being used, and the function g if E is being used as encoding function. In this way, it is proven that from table 130 alone one cannot tell which function is being used, since it could encode for at least two functions.
  • the table for F can serve to compute both f and g. Indeed, if E is used, then, as said before, the table for F implements f.
  • the encoded input values may be input values to a computer program, possibly containing or represented by the data function.
  • the computer program may be running on a computer.
  • the instructions of the computer program may be represented by the data function.
  • the encodings and decodings may be under control of a secret key.
  • a preferred embodiment for executing a sequence of operations with our inventions is the following.
  • "short" variables are transformed to "long” variables. Randomisation is involved to make sure that the "long” variables occur approximately equally often. This can for example be achieved by having a device that generates a random state ⁇ E ⁇ , and mapping the variable x on ⁇ ⁇ , ⁇ ) where E k is an encoding of the "long" variables.
  • the decoding Z3 ⁇ 4 is applied at the secure side, and next, the "short” variable corresponding to the decoded long variable is determined.
  • the decoding and determination of the short variable is done in one combined step.
  • the letter k denotes a secret, e.g. a secret key.
  • Figure 2 shows a way to reduce the impact of combining data and state representation on the table size.
  • Table network 200 computes the same data function and the same state function as in figure 1.
  • Table network 200 is configured for the data function and is stored in an electronic storage, coupled to an electronic processor configured to compute the data function by applying the table network.
  • Table network 200 comprises state extractor tables 212 and 214 configured to extract from encoded input values 122 and 124 the corresponding state values 112 and 114.
  • state values are used as inputs to a state function table 230.
  • State function table 230 represents the state function. Note that state extractor table 212, state extractor table 214 and state function table 230 could use an encoding for the state values, possibly even a different encoding for values 112 and 114; however this encoding only depends on the state value and not on the input value; the encoding may be secret, e.g., private to the particular
  • Table network 200 further comprises re-encoding tables 242, 244. These tables accept the encoded input values 122 and 124 but re-encode them to have a common state value in this particular embodiment state output 232. This means that data function table
  • FIG. 160 is obtained as in figure 1.
  • a function/ of m operands As a first step, we may determine representations of the operands of/ such that at least two operands have the same state. To show the advantages, we consider the case that the operands can attain w values and each value of the operand has s representations.
  • the approach of figure 1 results in a table with (sw) m entries. If all operands of/ are forced to the same state, we may use a table with only sw m entries.
  • at least two operands off's multiple operands are forced to a common state in a state space.
  • the number of representatives of each element in W thus equals the cardinality of ⁇ .
  • F maps any pair of representatives of w and w 2 to a representative of f(w lt w 2 ).
  • state extractor tables 212 and 214 represent these state-extractor functions S e . Note that it is possible that a different state encoding was used in encoded input value 122 than in encoded input value 124. We also use a table for computing the function g implemented in 230 in Figure 2. Also, we use (secret) encodings E ⁇ .W x ⁇ W and E 2 : W x ⁇ W, and tables
  • the penultimate line above corresponds to tables 242,244, 252 and 254 of Figure 2.
  • the last line above corresponds to table 260 of Figure 2.
  • the table for S e has
  • the table for g has
  • the tables for e and e 2 both have
  • the table for ⁇ has
  • Figure 3 a shows how table size and security may be exchanged in a trade off.
  • table network 300 comprises a reduced state function table 310.
  • Reduced state function table 310 computes a different function on state input values 112 and 114 than state function table 230.
  • reduced state function table 310 could compute any function on the 112 and 114, e.g. a random function, except that reduced state function table 310 has a smaller range than state function table 230. That is, the number of possible output values of reduced state function table 310 is smaller than the number of possible output values of state function table 230.
  • Reduced state function table 310 produces a reduced state value 320.
  • state output value 232 may be 4 bits and reduced state output value may be 2 bits. To simplify one may select the bits of value 320 from the bits of state output value 232; however preferably, tables 310 and 230 are distinct and not correlated, especially not in this linear fashion.
  • table network 300 re-encodes to the reduced state value 320.
  • Table network 300 comprises re-encoding tables 332 and 334 configured to accept as input the encoded input values 122 and 124 respectively and produce new encoded values encoded for reduced state value 320 instead of state output value 164.
  • the results are recoded input value 342, 344 respectively. So recoded input values 342 combines their function- input value in encoded input 122 with the reduced state value 320 (instead of state input value 112) encrypted together into a single value; the same holds for recoded input value 344.
  • data function table 350 is like data function table 260 except that it accepts a reduced range of state values.
  • the function computed on the input value corresponds to the data function; the function on the state function could be anything, say random, or the identity.
  • the result is re-encoded with re-encoding table 360, so that the encoded output value corresponds to state output value 164 as well as function output value 162.
  • Re-encoding table 332 and re-encoding table 334 are also referred to as first re- encoding tables.
  • Re-encoding table 360 is also referred to as second re-encoding table 360.
  • the recoded input 342 and recoded input 344 both contain the reduced state, this means that part of the of input of table 350 is duplicated, as a result the table may be sparse, and thus, say, compresses well if data compression is applied to it.
  • Table network 300 is configured for the data function and is stored in an electronic storage, coupled to an electronic processor configured to compute the data function by applying the table network.
  • Figure 3b shows how a different way in which table size and security may be exchanged in a trade off.
  • table network 300 comprises a reduced state function table 310.
  • figure 3b does not include re-encoding tables 332 and 334. Instead, state dependent re-encoding tables 372 and 374 are used.
  • State dependent re-encoding tables 372 takes as input encoded input value 122, which combines a function input value and state input value but in encoded (encrypted) form.
  • the State dependent re-encoding tables 372 extracts the function input and encodes it in a different manner, the re-encoding being dependent upon reduced state value 320. A different way to say this is, that the function input in encoded input value 122 is encrypted with the reduced state value 320 as key.
  • State dependent re-encoding table 374 does the same thing but for encoded input value 124.
  • the results of tables 372 and 374 are recoded input values 382 and 384.
  • the exemplifying values such as bits width 4 and 2, may be varied.
  • a disadvantage of a small state space is the following.
  • T may have 4 elements or 8 or 16.
  • the first two columns lists all possible combinations of function input values and state input values.
  • An encoding table is obtained by sorting on the first two columns, the resulting table shows how to obtain the last column (encoding) from the first two.
  • a table is obtained that decodes instead of encodes.
  • a state extractor function is obtained. Note that generally, it is not needed to store both the input and output column. For example, if the input column is sorted and contains all possible combinations, it may be omitted.
  • Figure 3 c shows state dependent re-encoding without using a reduced state function.
  • the state dependent re-encoding tables 372 and 374 of figure 3 c are the same as those of figure 3b except that they have as input the state output value 232 instead of the reduced state value. This means that the re-encoding which takes places is more secure.
  • the tables in 372, 374 and 385 have a wide input.
  • data function table 385 of figure 3c has a larger input, than that of figure 3b, no re-encoding table 360 is needed since table 385 now has the correct state output value to incorporate in the output (although this is possible, which would reduce table size).
  • FIG. 5 shows a computing device 500, having a storage device 510.
  • Storage device 510 is typically one or more non- volatile memories, but may also be a hard disc, optical disc, etc.
  • Storage device 510 may also be a volatile memory comprising downloaded or otherwise received data.
  • Computing device 500 comprises a processor 550.
  • the processor typically executes code 555 stored in a memory.
  • the code may be stored in storage device y 510.
  • the code causes the processor to execute a computation.
  • Device 500 may comprise an optional I/O device 560 to receive input values and/or transmit results. I/O device 560 may be a network connection, removable storage device, etc.
  • Storage device 510 contains one or more table networks according to one of the figures 1 to 3.
  • the computing device may work as follows during operation: computing device 500 receives input values.
  • the input values are encoded, e.g. by using the encoding table 541, e.g. table 110.
  • the input values are obtained as encoded input values.
  • the input values could be obtained as encoded input values directly, e.g. through device 560.
  • Encoding an input value to an encoded input value implies that a state input has to be chosen. There are several ways to do so, for example the state input may be chosen randomly, e.g., by a random number generator.
  • the state input may be chosen according to an algorithm; the algorithm may be complicated and add to the obfuscation.
  • the state input value may also be constant, or taken sequentially from a sequence of numbers, say the sequence of integers having a constant increment, say of 1, and starting at some starting point; the starting point may be zero, a random number, etc. Choosing the state inputs as a random number and increasing with 1 for each next state input choice is a particular advantageous choice. If the state inputs are chosen off-device the attacker has no way to track where state input values are chosen and what they are.
  • Processor 550 executes a program 555 in memory 510.
  • the program causes the processor to apply look-up tables to the encoded input values, or to resulting output values.
  • Look-up tables may be created for any logic or arithmetic function thus any computation may be performed by using a sequence of look-up tables. This helps to obfuscate the program.
  • the look-up tables are encoded for obfuscation and so are the intermediate values.
  • the obfuscation is particularly advantageous because a single function input value may be represented by muliptle encoded input values.
  • table and/or table networks have the multiple function property.
  • result value is found. If needed the result may be decoded, e.g. using the decoding table 542, e.g. table 170. But the result may also be exported in encoded form. Input values may also be obtained from input devices, and output values may be used to show on a screen.
  • the computation is performed on encoded data words.
  • the computation is done by applying a sequence of table look-up accesses.
  • the input values used may be input values received from outside the computing device, but may also be obtained by previous look-up table access. In this way intermediate results are obtained which may then be used for new look-up table accesses. At some point one of the intermediate results is the encoded result of the function.
  • Computing device 500 may comprise a random number generator for assigning state input values to data function inputs.
  • Figure 6 illustrates as flow chart a compiling method 600.
  • a first computer program is received by a receiver.
  • a lexical analysis is performed, e.g., to identify tokens, by a lexical analyzer. Possibly processing such as macro expansion is also done.
  • the program is parsed by a parser. For example, the parser generates a parsing tree according to a formal grammar of the programming language of the first program. The parser identifies the different language constructs in the program and calls appropriate code generation routines. In particular, an operator or multiple operators are identified. In that case, in step 640 code generation is done by a code generator. During code generation some code is generated and if needed accompanying tables.
  • the accompanying tables include tables that are configured for two functions: one for the needed operator and a state function.
  • the generated code does not need, and generally will not, contain the operator as it is replaced by one or more look-up tables.
  • the state function may be chosen at random.
  • the state function may also be chosen as a result of the program, for example, the state function may be another needed operator, which will allow the table to be re-used.
  • the parser will identify and add operation and translate this into a look-up table for the add instruction and in generated code for applying the look-up table to the correct values.
  • the compiler may select a random function.
  • the compiler may also select at random a function from a set of functions, say addition, subtraction, multiplication and the like.
  • step 655 the generated tables are merged to a table base, since it may well happen that some tables are generated multiple times, in that case it is not needed to store them multiple times. E.g. an add-table may be needed and generated only once.
  • the compiler uses encoded domains, i.e., sections of the program in which all value, or at least all values corresponding to some criteria, are encoded, i.e., have code word bit size (n).
  • n code word bit size
  • operations may be executed by look-up table execution.
  • a criterion may be that the value is correlated, or depends on, security sensitive information, e.g., a cryptographic key.
  • step 630 an intermediate compilation is done. This may be to an intermediate language, e.g. register transfer language or the like, but may also be a machine language code compilation. This means that for steps 610-630 of figure 6 a conventional compiler may be used, which is does not produce table networks. However in step 640 code generation is done based on the intermediate compilation. For example, if machine language code was used, each instruction is replaced by a corresponding operator free implementation of that instruction, i.e., a table- based implementation of that instruction. This represents a particular straightforward way to create the compiler. Figures 6 may also be used to generate a compiler that produces not machine language but a second programming language.
  • the compiler is a compiler for compiling a first computer program written in a first computer programming language into a second computer program
  • the compiler comprises a code generator to generate the second computer program by generating tables and machine language code, the generated tables and the generated machine language code together forming the second computer program, the generated machine language code referencing the tables
  • the compiler is configured to identify an arithmetic or logical expression in the first computer program, the expression depending on at least one variable
  • the code generator is configured to generate one or more tables representing pre-computed results of the identified expression for multiple values of the variable and representing at least one other expression, and to generate machine language code to implement the identified expression in the second computer program by accessing the generated one or more tables representing pre-computed results.
  • the machine language code generated to implement the identified expression does not contain arithmetic or logic machine instructions itself, at least no arithmetic or logic machine instructions related to sensitive information.
  • An attacker who reverse engineered the tables may find that it may represent the identified expression, but that it may also represent the other expression.
  • Figure 7 illustrates in a flowchart a method 700 for computing a data function on a function- input value.
  • a function- input value is combined together with a state-input value in an encoded input value. This combination is done in an encrypting manner. Note that the encoding of input values may be done at a different location and/or by a different party.
  • a table network is applied to the encoded input value to produce as output an encoded output value.
  • the function-output value is obtained from the encoded output value. Note that the state-output value could also be obtained from the encoded output value but this may not be needed.
  • the function-output value equals the result of applying the data function to the function-input value
  • the state-output value equals the result of applying a state function to the state-input value.
  • a method according to the invention may be executed using software, which comprises instructions for causing a processor system to perform method 700.
  • Software may only include those steps taken by a particular sub-entity of the system.
  • the software may be stored in a suitable storage medium, such as a hard disk, a floppy, a memory etc.
  • the software may be sent as a signal along a wire, or wireless, or using a data network, e.g., the Internet.
  • the software may be made available for download and/or for remote usage on a server.
  • the invention also extends to computer programs, particularly computer programs on or in a carrier, adapted for putting the invention into practice.
  • the program may be in the form of source code, object code, a code intermediate source and object code such as partially compiled form, or in any other form suitable for use in the implementation of the method according to the invention.
  • An embodiment relating to a computer program product comprises computer executable instructions corresponding to each of the processing steps of at least one of the methods set forth. These instructions may be subdivided into subroutines and/or be stored in one or more files that may be linked statically or dynamically.
  • Another embodiment relating to a computer program product comprises computer executable instructions corresponding to each of the means of at least one of the systems and/or products set forth.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • General Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • Storage Device Security (AREA)
  • Devices For Executing Special Programs (AREA)
  • Small-Scale Networks (AREA)
  • Input From Keyboards Or The Like (AREA)
  • Logic Circuits (AREA)

Abstract

A computing device is provided configured to compute a data function on a function-input value comprising an electronic storage storing a table network configured for the data function and an electronic processor coupled to the storage and configured to compute the data function by applying the table network, wherein the device is configured to obtain the function-input value as an encoded input value, the encoded input value combines the function-input value together with a state-input value encrypted together into a single value, the table network is configured to take as input the encoded input value and produce as output an encoded output value, the encoded output value combines a function-output value together with a state-output value encrypted together into a single value, wherein the function-output value equals the result of applying the data function to the function-input value, and the state-output value equals the result of applying a state function to the state-input value.

Description

Computing device comprising a table network
FIELD OF THE INVENTION
The invention relates to a computing device configured to compute a data function on a function- input value, the device comprising an electronic storage storing a table network configured for the data function and an electronic processor coupled to the storage and configured to compute the data function by applying the table network, wherein the device is configured to obtain the function- input value as an encoded input value, the table network is configured to take as input the encoded input value and produce as output an encoded output value, the encoded function-output value, the function-output value equals the result of applying the data function to the function-input value.
The invention further relates to a corresponding method and compiler.
BACKGROUND OF THE INVENTION
US 2012/0300922 discloses a method for generating a correspondence table suitable for use in a cryptographic processing method and comprising storing a plurality of input data and of output data in the table, each input datum being associated with at least one output datum in the table. For each input datum, at least one of the output data is obtained by applying a coding function to a first subsidiary datum and to an encrypted intermediate datum depending on the input datum.
US 2012/0155638 discloses that in the field of computer enabled cryptography, such as a block cipher, the cipher is hardened against an attack by protecting
the cipher key, by applying to it a predetermined linear permutation before using one key to encrypt or decrypt a message. This is especially advantageous in a "White Box" environment where an attacker has full access to the cipher algorithm, including the algorithm's internal state during its execution. This method and the associated computing apparatus are useful where the key is derived through a process and so is unknown when the software code embodying the cipher is compiled. This is typically the case where there are many users of the cipher and each has his own key, or where each user session has its own key.
In traditional cryptography it was typically assumed that an attacker only gains access to the input and output values of a secure system. For example, the attacker would be able to observe a plain text going into a system and observe an encrypted text going out of the system. Although an attacker could try to gain an advantage by analyzing such
input/output pairs, possibly even using computationally intense methods, he was not thought to have direct access to the system that implemented the input/output behavior.
Recently, it has become necessary to take threat models into account in which it is assumed that an attacker has some knowledge of the implementations. For example, one may consider the threat of side-channel analysis and of reverse engineering. Furthermore, the concerns that previously were mostly associated with security problems have extended to other fields, such as privacy. Although cryptographic systems processing security
information such as cryptographic keys remain a prime concern, protection of other programs, e.g., those processing privacy relevant information has also become important.
It has long been known that computer systems leak some information through so-called side-channels. Observing the input-output behavior of a computer system may not provide any useful information on sensitive information, such as secret keys used by the computer system. But a computer system has other channels that may be observed, e.g., its power consumption or electromagnetic radiation; these channels are referred to as side- channels. For example, small variations in the power consumed by different instructions and variations in power consumed while executing instructions may be measured. The measured variation may be correlated to sensitive information, such as cryptographic keys. This additional information on secret information, beyond the observable and intended input- output behavior is termed a side-channel. Through a side-channel a computer system may 'leak' secret information during its use. Observing and analyzing a side-channel may give an attacker access to better information than may be obtained from cryptanalysis of input-output behavior only. One known type of side-channel attack is the so-called differential power analysis (DP A).
Current approaches to the side-channel problem introduce randomness in the computation. For example, in between real operations that execute the program dummy instructions may be inserted to blur the relationship between power consumption and the data the program is working on.
An even stronger attack on a computer is so called reverse engineering. In many security scenarios attackers may have full access to the computer. This gives them the opportunity to disassemble the program and obtain any information about the computer and program. Given enough effort any key hidden say in a program may be found by an attacker. Protecting against this attack scenario has proven very difficult. One type of counter measure is so-called white-box cryptography. In white-box cryptography, the key and algorithm are combined. The resulting algorithm only works for one particular key. Next the algorithm may be implemented as a so-called, lookup table network. Computations are transformed into a series of lookups in key-dependent tables. See for example, "White-Box Cryptography and an AES Implementation", by S. Chow, P. Eisen, H. Johnson, P.C. van Oorschot, for an example of this approach.
SUMMARY OF THE INVENTION
The known countermeasures against computer systems are not entirely satisfactory. For example, the introduction of randomness may countered by statistical analysis. The obfuscation of software may be countered by more advanced analysis of the operation of the program. There is thus a need for more and better countermeasures.
For example, one way to obfuscate a computer program is to encode the input values and to operate as much as possible on encoded values. One may even use so-called table networks to perform computations. Such table network may be crafted by hand, or by specialized programs, e.g. in the case of white-box cryptography, or by general purpose compilers. It was believed that, generally speaking, a table obfuscates the type of operation that is performed. However, the inventors have found that the latter is generally not true. Even if the input(s) and output (s) of a function are encoded, statistical properties of the input/output relations may reveal which function is being encoded. An example of this phenomenon follows.
Consider W= {0,1 ,...,N-1 } , an encoding E, and its corresponding decoding D=E_1. Let F and G denote encoded modulo N addition and encoded modulo N multiplication, respectively. That is, define F: W x W→ W as F{x, y) = E (D (X) 0w D (y)), where 0W denotes modulo N addition, and G : W x W→ W as G (x, y) = E (D (X) *N D (y)), where *N denotes modulo N multiplication.
For each fixed x, we have that {F(x,y) | y £ W] = W. Also, for each non-zero x £ W, and N prime, we have that{ G (x, y) | y £ W ] = W, and { G (0, y) | y £ W ] = £"(0). For N non-prime similar patterns occur.
As a consequence, independent of the encoding E, one can determine that F cannot be an encoded modulo N multiplication, and that G cannot be an encoded modulo N addition. An attacker has at least two methods to do so. He could fix two different elements x\ and X2 in W and for H £ {F, G], compare H xlt y) and H(x2, y) for all y. If these quantities are equal for all y, then H cannot represent modulo N multiplication; if these quantities agree for all y, then H cannot represent modulo N addition. An attacker who cannot choose which table entries to read, but can observe the results of table accesses of a running software program can use the fact that each element of W occurs equally often as output of while with G, the element E(0) occurs as an output much more frequently. So if an element of W occurs much more often than other elements of W as output of H, then H is more likely to be an obfuscated modulo N multiplication than an obfuscated modulo N addition.
In other words, if one uses one of the best software obfuscations methods available, i.e., if one that uses full encoding of the input and output values and table- networks for the computations, then still some information may be obtained by inspection of the program. This situation is highly undesirable.
It would be advantageous to have device or method that address some of the issues discuses above. The invention is defined by the independent claims. The dependent claims define advantageous embodiments.
A first aspect of the invention concerns a compiler configured for compiling a computer program, the compiler being configured for parsing the computer program to identify multiple operators, including a data function (f) and a state function (g), and for producing a table network configured for the data function and the state function, wherein the table network is configured to take as input an encoded input value and produce as output an encoded output value, the encoded output value combines a function-output value together with a state-output value encrypted together into a single value, wherein the function-output value equals the result of applying the data function to the function- input value, and the state- output value equals the result of applying the state function to the state-input value, wherein the encoded input value combines the function- input value together with a state-input value encrypted together into a single value.
Also, a computing device is provided configured to compute run a computer program compiled by such a compiler. The computing device comprises an electronic storage storing a table network configured for the data function and an electronic processor coupled to the storage and configured to compute the data function by applying the table network.
The device is configured to obtain the function- input value as an encoded input value, the encoded input value combines the function- input value together with a state- input value encrypted together into a single value. The table network is further configured to take as input the encoded input value and produce as output an encoded output value, the encoded output value combines a function-output value together with a state-output value encrypted together into a single value, wherein the function-output value equals the result of applying the data function to the function- input value, and, the state-output value equals the result of applying a state function to the state-input value.
Obtain a function- input value as an encoded input value means that the device receives the function- input because it receives the encoded input value in which it is encoded together with another value.
The device computes two functions: a data function that takes as input a function- input value and produces a function-output value, and a state function that takes as input a state-input value and produces a state-output value. However, although two, possibly different, functions are computed on independent input values, producing respective independent output values, only one table-network is needed. The one table network receives a single encoded input value into which both the function input value and state input value are encrypted. The state-input value can attain at least two different values.
Implementing two functions in a single table network, in which the function input values are encoded together with one of multiple state values has the advantage that a function input values corresponds to multiple different encoded input values. This means that attacks which are based on listing the correspondence between input values and intermediate values are thwarted. In addition it is an advantage that the data function and state function are independent, i.e., the state function does not depend on any one of the (possibly multiple) function inputs and the data function does not depend on any one of the (possibly multiple) state inputs. This means that the same table network may be used for different functions at different times; to different functions at the same time; or to one but not the other.
Furthermore these three options may be used in the same program for different table networks. This adds considerably to the difficulty of reverse engineering. Indeed, even from an information theoretic viewpoint, having a table network which encodes two different functions makes it impossible to judge from the network itself for which function it is used, since network is actually configured for two, anyone of which could be or could not be used. Thus the attacker is forced to analyze much larger portions of the program at the same time.
An encryption (often referred to as 'Ε') is reversible, that is from an encoded pair of a function input value and a state input value, both the function input value and the state input value may be recovered. Likewise, from an encoded pair of function output value and state output value, both the function output value and the state output value may be recovered. An encryption is private, that is, different implementations of the system may use a different way to encrypt input or output values together. Furthermore, the encryption adheres at least in part to the principle of diffusion. The values in the encoded value depend on a large part of the encoded value. For example, when an input/output value is recovered from an encoded input/output value, then the input/output value depends preferably on all of the encoded input/output value; at least it depends on more bits than the bit size of the input/output value itself. This has the effect that the information on the input/output value is distributed over many bits. Preferably, if one has access to only part of an encoded value, it is impossible to recover the values it encodes, even if one had perfect knowledge of the encoding/decoding function. Note that traditionally, encryption frequently makes use of a key. Using a keyed encoding is an attractive possibility, but due the relatively small size of the input/output values it is also possible to represent the encoding as a table. For this reason encoding and encrypting in the context of variable values, such as input/output values or intermediates values are used interchangeably.
Because the table network may represent two functions, and indeed the encoded input values contains two inputs (the function and state), it is impossible to tell from the table network if it is an encoded version of the data function or of the state function.
Indeed the table network is fully equipped to compute either function and indeed does compute both functions on an independent variable, or set of variables (in embodiments of data functions and-or state functions having multiple inputs).
For example, applied to the example above, one would obtain a table network which could be used to perform addition and multiplication. By inspection of the table network one cannot tell which one is used, since in fact the table network can perform either one.
The data function may take one or multiple input values. The state function may take one or multiple input values. In an embodiment, the number of input values of the data and state function is the same. For example, the device may be configured to obtain the multiple function-input values as multiple encoded input values. Each one of multiple encoded input values combines a function- input value of the multiple input values together with a state-input value of the multiple state input values encrypted together into a single value. The table network is configured to take as input the multiple encoded input values and produce as output an encoded output value. The encoded output value combines a function- output value together with a state-output value encrypted together into a single value. The function-output value equals the result of applying the data function to the multiple function- input values, and the state-output value equals the result of applying a state function to the multiple state-input values.
Several different ways to produce such table networks will be shown below. Any intermediate value that equals or depends on the function input value, including the function output value only occurs in an encoded form, i.e., encrypted together with a state variable. Ideally, this property also holds for the state input variable, although it may be needed to make concessions at this point in order to satisfy competing demands on the available resources. For example, one way to have this property is to create a table network comprising a single table taking as input the encoded input value and producing as output the encoded output value.
It possible to split off the state computation to a certain extent, for example the table network may comprise a state extractor table and a state function table. The state extractor table is configured such that the state extractor table applied to the encoded input value produces the state-input value. The state function table is configured such that the state function table applied to state-input value produces the state-output value. Note that even if the state value is obtained in the table network, the function input value remains encoded. Also note that state extractor tables may produce the state value in an encoded form, although an encoded form which does not depend on the input value, e.g., an encoded state value obtainable by encrypting the state value only.
Once the state-output value is available, possibly in encoded form, one may use a re-encoding table. A re-encoding table takes as input an encoded value and produces an encoded value, however the encoding has changed. For example, the re-encoding table may be configured to receiving as input the encoded input value and the state-output value and producing as output a recoded input value. The recoded input value combines the function- input value together with the state-output value encrypted together into a single value. A data function table may be applied to the recoded input value to obtain the encoded output value. For example, the data function table may be configured for receiving as input the recoded input value and as output the encoded output value.
This reduces the size of the needed tables. Yet it remains the case that the table network computes two functions: the data function and the state function. An attacker cannot know for which function the table network is used. Furthermore, even though the state value occurs in a form which is not encoded together with the input value, the input value only occurs in encoded form. It is possible to reduce the size of the tables even further. For example, the table network may comprise a reduced state function table and a first re-encoding table. The reduced state function table is configured for receiving the state-input value and for producing as output an intermediate state value equal to the result of a reduced state function applied to state-input value, the range of the reduced state function being larger than a single value and smaller than the range of the state function. The first re-encoding table configured for receiving as input the encoded input value and the intermediate state value and producing as output a recoded input value, the recoded input value combines the function- input value together with the intermediate state value encrypted together into a single value.
The table network thus computes three functions, the state function, the reduced state function and the data function. Because the reduced state function has a range smaller than the state function, the table for the data function is reduced. Note that the range of the reduced state function has a size larger than 1, so that each input data value has more than one representative even with the reduced state space. In an embodiment, the size, i.e., number of values, of the reduced state space, is at least 2, 4 or 8.
For example, the table network may comprise a data function table and a second re-encoding table. The data function table is configured for receiving as input the recoded input value and as output a recoded output value, the recoded output value combines the function-output value together with the intermediate state value encrypted together into a single value. The second re-encoding table is configured for receiving as input the recoded output value and the state-output value and producing as output the encoded output value.
In an embodiment, the table network is configured for data-input values having at least 4, preferably at least 8 bits. In an embodiment, the table network is configured for state-input values having at least 4, preferably at least 8 bits.
In an embodiment, the data-input values and state input values have the same bit size. If the data function and the state function have equal input size they are
indistinguishable on this front. In an embodiment, the data-output values and state output values have the same bit size.
In an embodiment, the data-input values and state value have the same bit size and have 4 bits or more. In an embodiment, the data-input values and state value have the same bit size and have 6 bits or more. In an embodiment, the data-input values and state value have the same bit size and have 8 bits or more.
An aspect of the invention concerns a method for run a computer program compiled by a compiler according to the first aspect of the invention, the method comprising computing the data function by applying a table network to an encoded input value and producing as output an encoded output value, the encoded input value combines the function- input value together with a state-input value encrypted together into a single value, the encoded output value combines a function-output value together with a state-output value encrypted together into a single value, wherein the function-output value equals the result of applying the data function to the function- input value, and the state-output value equals the result of applying a state function to the state-input value.
The computing device is an electronic device, e.g., a mobile electronic device, mobile phone, set-top box, computer, or the like.
A method according to the invention may be implemented on a computer as a computer implemented method, or in dedicated hardware, or in a combination of both.
Executable code for a method according to the invention may be stored on a computer program product. Examples of computer program products include memory devices, optical storage devices, integrated circuits, servers, online software, etc. Preferably, the computer program product comprises non-transitory program code means stored on a computer readable medium for performing a method according to the invention when said program product is executed on a computer.
In a preferred embodiment, the computer program comprises computer program code means adapted to perform all the steps of a method according to the invention when the computer program is run on a computer. Preferably, the computer program is embodied on a computer readable medium.
BRIEF DESCRIPTION OF THE DRAWINGS
These and other aspects of the invention are apparent from and will be elucidated with reference to the embodiments described hereinafter. In the drawings,
Figure 1 is schematic chart illustrating a table network implementing a data function and a state function,
Figure 2 is schematic chart illustrating a table network implementing a data function and a state function,
Figure 3 a is schematic chart illustrating a table network implementing a data function and a state function,
Figure 3b is schematic chart illustrating a table network implementing a data function and a state function, Figure 3 c is schematic chart illustrating a table network implementing a data function and a state function,
Figure 4 is a block diagram illustrating table networks in general,
Figure 5 is a block diagram illustrating a computing device,
Figure 6 is a flowchart illustrating a compiler,
Figure 7 is a flowchart illustrating a method for computing a data function.
It should be noted that items which have the same reference numbers in different Figures, have the same structural features and the same functions, or are the same signals. Where the function and/or structure of such an item has been explained, there is no necessity for repeated explanation thereof in the detailed description.
DETAILED EMBODIMENTS
While this invention is susceptible of embodiment in many different forms, there is shown in the drawings and will herein be described in detail one or more specific embodiments, with the understanding that the present disclosure is to be considered as exemplary of the principles of the invention and not intended to limit the invention to the specific embodiments shown and described.
In the figures, tables are illustrated with rectangles, and values are illustrated with a rectangle with the upper right corner cut-off.
Figure 4 illustrates the general concept of table network, shown is table network 400. Most functions may be expressed as a network of tables. In particular any composition of arithmetic and logic operations may be so expressed. For example, the network of tables, may be an implementation, e.g. of a cipher. Shown are 8 tables of multiple tables. A table transforms an input value to an output value by table-lookup of the input value. Shown are three of the input tables 410, for receiving input from outside the function implementation. Shown is one of the output tables 430. The output tables 430 together form the output of the function implementation, e.g. by concatenation. Shown are four tables of the intermediate tables 420, 422, 424, 426, who receive at least one input from another one of the tables, and who produce an output for use as an input for at least one other table. The tables together form a network. The cipher may be a block cipher; the block cipher may be configured for encryption or for decryption. The block cipher encrypts a block cipher, say AES. The implementation may be for a particular key, in which case the tables may depend on the particular key. Look-up table 426 represents an operator having two inputs and one output. The construction of look-up tables for monadic operators may be extended to dyadic operators. For example, the second input may be 'curried out'; referring to the function transformation technique, currying is the technique of transforming a function that takes n multiple arguments (or an n-tuple of arguments) in such a way that it can be called as a chain of functions, each with a single argument. When this approach is used the look-up table 426 is implemented as multiple monadic look-up tables. On the other hand one may also generate bit strings for each input and concatenate the results. In this way the look-up table is generated directly, and one single but larger look-up table is obtained. Although, the layout of the look-up tables may differ based on the construction, they have equal size and the same properties. Note that it is not necessary that the multiple input values are encoded according to the same encoding.
The table network may use multiple tables encoding two functions or have as sub network table networks that encode for two functions. The system may be configured to use that state or data function of a network table depending on the current encoding. Table network obfuscation techniques may be applied, also in table networks as described herein.
For example, suppose a second table receives as input the output of a first table, then the output of a first table may be encoded with a secret, e.g. randomly chosen, encoding, and the input of a second table may be encoded with the inverse encoding.
Figure 1 shows a table network 180 embedded in a larger table network 100.
Table network 180 contains only a single table 130.
Table network 180 is configured to take multiple encoded input values as input, shown are encoded input values 122 and 124. Table network 180 is configured to produce as output an encoded output value 160. In the description below we will assume data functions and state functions having two input values and a single output value. However, the embodiments may be extended to any number of input values and/or output values. In particular data/state functions with one input and one output are possible and data/state functions with two inputs and one output are possible.
Table network 180 is configured for the data function and is stored in an electronic storage, coupled to an electronic processor configured to compute the data function by applying the table network.
The encoded value 122 is obtained from a function input value 102 and a state input value 112. For example, this may be done by an encoder 110. Encoder 110 may be included in the same device which stores table network 180, but this is not needed. Input values may be received already in encoded form and/or be transmitted in encoded form. Or they may be received/transmitted in un-encoded form. In the latter case they may be encoded and used internally in encoded form. There may also be a re-encoding, e.g., if outside of the device a different encoding is used. For example, function output value 162 and state output value 164 may be obtained from a decoder 170.
Encoded input of the data function may be the output of another table or table network. The latter may or may not be a table network configured for two functions. By combining table networks configured for different data functions, entire programs may be built up.
Encoder/decoder 1 10 and 170 may be obtained as each other's inverse.
Encoder 1 10 may be obtained as follows. Each possible combination of function input value and state input value is listed. For example, if both are 4 bit wide, than there are 16* 16=256 possible combinations. The 256 combinations may be mapped to itself in a random bijective order. The same applies to other sizes. Also an encryption function may be used, e.g., an 8 bit block cipher may be applied, using some secret encoding key.
The encoded input value contains the function input value 102 and state input value 1 12 in an interdependent way, e.g., the function input depends on all bits of the encoded input. Thus, knowing only part of encoded input value 122 will generally not allow one to find either function input value 102 or state input value 1 12.
Below we will give a number of embodiments using mathematical language.
One advantage of combining function inputs values with state values is that the function inputs have multiple representations. Function/ refers to the data function and g to the state function. The function f is encoded into F such that a value in the domain of F has multiple representatives. In order to hide which function /is being encoded, input(s) and output(s) of f have multiple representations in the domain and range of the encoded version F of/ The function F is designed such that whenever X is a representative of x, then F(X) is a representative offlx). In the sequel we sometimes speak about "long" variables (input/output of F) and "short" variables (input/output of f) to emphasize that each input/output of/ corresponds to multiple input/output of F, so that we need in general more bits to represent inputs/outputs from F than to represent inputs/outputs from / One way, to obtain multiple representations for operands is described below. . Again note that for simplicity, we consider functions with equal input and output symbols; this may be generalized.
Let W denote the set of operands we wish to encode. We introduce a finite set ∑ of "states" and a finite set V with cardinality equal to the product of the cardinalities of W and∑. The elements of W x∑ are mapped in a one-to-one manner to V by a secret encoding function E. The representatives of the element w in W are the members of the set
Ω( ν) = { E w, a) I σ E∑ }.
The number of representatives of each element in W thus equals the cardinality of∑. As a result, data paths carrying symbols from V are wider than data paths for carrying symbols from W. For example, if W is the set of 16-bits integers and the state space ∑ has 16 =24 elements, data paths for V use 16+4=20 bits, while data paths for W use 16 bits.
The embodiment below encodes a function of two variables. Consider a function f: W x W→ W that we wish to encode. We construct a function F: V x V→ V such that for all wlt w2 E W and σχ, σ2 E ∑ we have that
F (E (w1, a1), E(w2, a2)) E Q.{f{w1, w2)).
Or, stated in words: F maps any pair of representatives of w and w2 to a representative of f(w , w2).
The state of the representative of f(wlt w2) can depend on both operands w and w2 and could even depend on both states a and σ2, in either a deterministic or in a randomized manner. More specifically, the state can depend only on the states a and 2, which can be implemented by taking a function ^:∑x∑→∑ and by defining
F E (w1, a1), E(w2, a2)) = E f(wlt w2), g (alt a2)).
An interesting special case of the embodiment above arises if we take∑ = W. Then the function F that encodes/ using the function E also encodes the function g, albeit with a different encoding function E. That is, it cannot be deduced which of the two functions, f or g, is being implemented by F. We define E(x, y) = E(y, x). By computation we find that
;( 1, w1), £; ( 2, w2)) = F{E {W1, σ- , E (w2, σ2)) = E {f{w1, w2), g {a1, a2))
= E (,g( 1, 2), (w1, w2)).
A table for F thus implements the function/ if the encoding E is being used, and the function g if E is being used as encoding function. In this way, it is proven that from table 130 alone one cannot tell which function is being used, since it could encode for at least two functions.
The table for F can serve to compute both f and g. Indeed, if E is used, then, as said before, the table for F implements f. The same table can also be used for implementing g by pre- and post processing inputs and output with the function E E~ . To be precise, let W-L, w2 £ W, σΐ 5 σ2 E∑, and write vt = E(w σ ), i = 1,2. Then we have that F (^EE-1 (_v1), EE-1 (_v2)^) = F ^E w1, a1), E w2, a2)^ = F(E (a1, w1), E(a2, w2))
= E(f (o1, o2), g (w1, w2))
Consequently, we have that
ΕΕ- ^ΕΕ^Μ, ΕΕ- νζ))] = {g (w1, w2), f .a1, a2)).
The encoded input values may be input values to a computer program, possibly containing or represented by the data function. The computer program may be running on a computer. The instructions of the computer program may be represented by the data function. The encodings and decodings may be under control of a secret key. The encoding and decoding table themselves may be regarded as such a key. If an instruction / operating on data encoded with encoding Ek is applied, then it first decodes the data, then / is applied on the decoded data, and subsequently the result is encoded again. That is, the data x results in the output F (x) = Ek(/ (¾(x)). By direct storage of the function F, for example as a lookup table, the function/ and its semantics are hidden. In a specific embodiment, the decoding is the left inverse of encoding, , that is, i¾(Ek(X)) = x for all x. This has the advantage if two functions / and g are encoded and decoded with the same functions Ek and Dk, then encoded version of the function /(g(x)) can be done by using successively using the tables for G (x) = Ek( g (¾(x)) and F (x) = Ek( (¾(x)). Indeed, it can be seen that for each x we have that Ek (/(g(Dk(x)) = F(G(x)), so that the encoded version for f(g(x)) can be obtained from subsequent accesses of tables for G and for F. In this way, sequences of operations can be applied without encoding and decoding between successive operations, thus greatly enhancing the security. In an embodiment of, encoding and decoding only take place at the secure side, while all encoded operations take place at an open, insecure side. The output(s) of one or more encoded functions may serve as input(s) to another encoded function. As we have seen this can be conveniently arranged if the encodings and decodings are each other's inverses. A preferred embodiment for executing a sequence of operations with our inventions is the following. First, in the secure domain, "short" variables are transformed to "long" variables. Randomisation is involved to make sure that the "long" variables occur approximately equally often. This can for example be achieved by having a device that generates a random state σ E∑, and mapping the variable x on Ε ί,σ) where Ek is an encoding of the "long" variables. After all computations at the open side, all operating using "long" variables, the decoding Z¾ is applied at the secure side, and next, the "short" variable corresponding to the decoded long variable is determined. Alternatively, the decoding and determination of the short variable is done in one combined step. The letter k denotes a secret, e.g. a secret key.
Having multiple representatives for variables implies that data-paths become longer. Also, it implies that the table for implementing the encoded version F of/becomes larger. For example, consider a function/(x,j ) which has as input two 16-bits variables x and y and as output a 16-bits variable. A table for implementing an encoded version oif, without having multiple representatives, uses a table with 216 x 216 entries, each table entry being 16 bits wide, which amounts to a table size of 236 bits. Now assume that each 16-bits variable has 16 representatives; the set of representatives thus can be represented with 20 bits. We now use a table with 220 x 220 entries, each table entry being 20 bits wide, which amounts to a table of size 5 x 242 bits. That is, the table is 5 x 26 = 320 times as large as without having multiple representatives.
Figure 2 shows a way to reduce the impact of combining data and state representation on the table size. Table network 200 computes the same data function and the same state function as in figure 1.
Table network 200 is configured for the data function and is stored in an electronic storage, coupled to an electronic processor configured to compute the data function by applying the table network.
Table network 200 comprises state extractor tables 212 and 214 configured to extract from encoded input values 122 and 124 the corresponding state values 112 and 114.
Note that this does not imply that the input values are obtained in plain form at any moment.
The state values are used as inputs to a state function table 230. State function table 230 represents the state function. Note that state extractor table 212, state extractor table 214 and state function table 230 could use an encoding for the state values, possibly even a different encoding for values 112 and 114; however this encoding only depends on the state value and not on the input value; the encoding may be secret, e.g., private to the particular
implementation. From state function table 230 the state output value 232 is now known.
Table network 200 further comprises re-encoding tables 242, 244. These tables accept the encoded input values 122 and 124 but re-encode them to have a common state value in this particular embodiment state output 232. This means that data function table
260 may be significantly simplified since it no longer needs to be configured for the possibility that it receives two different state values. Note that the same encoded output value
160 is obtained as in figure 1. Below we will give a number of embodiments using mathematical language. We consider a function/ of m operands. As a first step, we may determine representations of the operands of/ such that at least two operands have the same state. To show the advantages, we consider the case that the operands can attain w values and each value of the operand has s representations. The approach of figure 1 results in a table with (sw)m entries. If all operands of/ are forced to the same state, we may use a table with only swm entries. In an embodiment of figure 2 at least two operands off's multiple operands are forced to a common state in a state space.
One way to obtain multiple representations for operands is the following. Let W denote the set of operands we wish to encode. We introduce a finite set∑ of "states" and a finite set V with cardinality equal to the product of the cardinalities of W and∑. The elements of W x∑ are mapped in a one-to-one manner to V by a secret encoding function E. The representatives of the element w in W are the members of the set Ω( ν) = { E (w, σ) \ σ E∑}.
The number of representatives of each element in W thus equals the cardinality of∑. As a result, data paths carrying symbols from V are wider than data paths for carrying symbols from W. For example, if W is the set of 16-bits integers and the state space ∑ has 16 =24 elements, data paths for V use 16+4=20 bits, while data paths for W use 16 bits.
Now we consider a function f: W x W→ W that we wish to encode. We construct a function F: V x V→ V such that for all wlt w2 E W and σχ, σ2 E ∑ we have that
F(E (w1, a1), E (w2, a2)) E Q.{f{w1, w2)).
Or, stated in words: F maps any pair of representatives of w and w2 to a representative of f(wlt w2). We now consider the situation that the state of a representative only depends on the states a and σ2, which can be implemented by taking a function
^:∑x∑→∑ and by defining
F E (w1, a1), E(w2, a2)) = E f(wlt w2), g (alt a2)).
We note that this function F has two input variables from V. A table for F thus has I V I2 entries, and that each entry in an element from V. Below we show how to reduce the table size significantly. We use a table for the state-extractor Se : V→∑ defined as
Figure imgf000017_0001
In Figure 2, state extractor tables 212 and 214 represent these state-extractor functions Se . Note that it is possible that a different state encoding was used in encoded input value 122 than in encoded input value 124. We also use a table for computing the function g implemented in 230 in Figure 2. Also, we use (secret) encodings E^.W x∑→ W and E2: W x∑→ W, and tables
(corresponding to tables 242 and 244 in Figure 2) for implementing the functions e : V x∑→ W and e2: V x∑→ W, which are such that for i=l,2 and all w £ W, σ, τ £∑, we have 6£(£(νι/,σ),τ) = ££(νι/,τ).
And finally, we use a table for implementing the function φ: W x W x T→ V such that for all w £ W, w2 £ W and τ £∑, we have that
Figure imgf000018_0001
Now consider inputs v = E(wlt a and v2 = E(w2, στ)· Note that an attacker can observe v and v2, but cannot observe w and w2.
We run the following program.
Si- = Se[v^ ; s2: = Se[v2]; τ: = g[s1}s2]; (** so s = a1,s2 = σ2 **)
y := e^v^r]; y2:= e2[v2,r]; (** so yt = Ei(wi}r) **)
ζ:=Φγι,γ2>τ]· (** so z = w2),^( 1, 2)
The penultimate line above corresponds to tables 242,244, 252 and 254 of Figure 2. The last line above corresponds to table 260 of Figure 2.
We now determine the total size of the required tables. The table for Se has |V| entries, each of which is an element of∑: | V | log2 |∑ | bits. The table for g has |∑|2 entries, each of which is an element of∑: |∑|2 log21∑| bits. The tables for e and e2 both have |V||∑| entries, each of which is an element of W: | V 11∑| log2|I | bits per table. The table for φ has |I |2|∑| entries, each of which is an element of V: |I |2|∑| log2|F| bits. The total number of required bits thus equals
( \V\ +|∑ I2 ) log2 I∑ I + 2\V\ |∑| log2 \W\ + \ W\2 \∑| log2|7|.
So, if I W\ =|∑ I, then we find, using that | V| = \W\ |∑| , that the number of required bits equals (4|I |3 + 2|I |2) log2 \ W\. Figure 1 uses
\V\2 log2 I V I = 21 W 1 log2 I W \ bits. So in this example, the table size is reduced with nearly a factor of | W|/2.
Figure 3 a shows how table size and security may be exchanged in a trade off.
In addition to the state function table 230 as in figure 2, table network 300 comprises a reduced state function table 310. Reduced state function table 310 computes a different function on state input values 112 and 114 than state function table 230. In fact reduced state function table 310 could compute any function on the 112 and 114, e.g. a random function, except that reduced state function table 310 has a smaller range than state function table 230. That is, the number of possible output values of reduced state function table 310 is smaller than the number of possible output values of state function table 230. Reduced state function table 310 produces a reduced state value 320. For example, state output value 232 may be 4 bits and reduced state output value may be 2 bits. To simplify one may select the bits of value 320 from the bits of state output value 232; however preferably, tables 310 and 230 are distinct and not correlated, especially not in this linear fashion.
Instead of re-encoding the input values to the state output value, table network 300 re-encodes to the reduced state value 320. Table network 300 comprises re-encoding tables 332 and 334 configured to accept as input the encoded input values 122 and 124 respectively and produce new encoded values encoded for reduced state value 320 instead of state output value 164. The results are recoded input value 342, 344 respectively. So recoded input values 342 combines their function- input value in encoded input 122 with the reduced state value 320 (instead of state input value 112) encrypted together into a single value; the same holds for recoded input value 344.
Finally, data function table 350 is like data function table 260 except that it accepts a reduced range of state values. The function computed on the input value corresponds to the data function; the function on the state function could be anything, say random, or the identity. Finally, the result is re-encoded with re-encoding table 360, so that the encoded output value corresponds to state output value 164 as well as function output value 162. Re-encoding table 332 and re-encoding table 334 are also referred to as first re- encoding tables. Re-encoding table 360 is also referred to as second re-encoding table 360. Note that the recoded input 342 and recoded input 344 both contain the reduced state, this means that part of the of input of table 350 is duplicated, as a result the table may be sparse, and thus, say, compresses well if data compression is applied to it.
For example if function values and state values are each 4 bit wide and reduced state values are 2 bits wide than: re-encoding table 332/334 has 4+4+2=10 bits as input and 6 bits as output; data function table 350 has 6+6=12 bits as input. If Table 350 produces output values of the same size as the encoded input/output values, it has 4+4=8 bit outputs; if the state values are reduced, it has 6 bits outputs; if the output only has function output values (possibly encoded) it has 4 bit outputs. The exemplifying values, such as bits width 4 and 2, may be varied. Table network 300 is configured for the data function and is stored in an electronic storage, coupled to an electronic processor configured to compute the data function by applying the table network.
Figure 3b shows how a different way in which table size and security may be exchanged in a trade off. Like figure 3 a, table network 300 comprises a reduced state function table 310. However figure 3b does not include re-encoding tables 332 and 334. Instead, state dependent re-encoding tables 372 and 374 are used.
State dependent re-encoding tables 372 takes as input encoded input value 122, which combines a function input value and state input value but in encoded (encrypted) form. The State dependent re-encoding tables 372 extracts the function input and encodes it in a different manner, the re-encoding being dependent upon reduced state value 320. A different way to say this is, that the function input in encoded input value 122 is encrypted with the reduced state value 320 as key. State dependent re-encoding table 374 does the same thing but for encoded input value 124. The results of tables 372 and 374 are recoded input values 382 and 384.
For example if function values and state values are each 4 bit wide and reduced state values are 2 bits wide than: re-encoding table 372/374 has 4+4+2=10 bits as input and 4 bits as output; data function table 385 has 4+4+2=10 bits as input. If Table 385 produces output values of the same size as the encoded input/output values, it has 4+4=8 bit outputs; if the state values are reduced, it has 6 bits outputs; if the output only has function output values (possibly encoded) it has 4 bit outputs. The exemplifying values, such as bits width 4 and 2, may be varied.
Below we will give a number of embodiments using mathematical language. The embodiments, allows a further reduction of the size of the required tables at the potential expense of hiding the function f less well.
We use a table for state-extractor function Se : V→∑ defined as Se (E(w, σ)) = σ; the table has |V| entries, each of which is an element of∑, hence it uses | V | log21∑| bits. This is table 212 and 214 in Figure 3. Similarly, the table for implementing g has |∑|2 log2 |∑| bits;This is table 230 in Figure 3. Next, we use an "internal state space" T and a table for a mapping t:∑ x∑→ T. The table for t uses |∑|2 log2 |Γ| bits; This is Table 310 in Figure 3.
Also, we use (secret) encodings E : W x T→ W and E2 : W χ Ύ→ W.
Moreover, we use tables for implementing the functions ex: V x T→ W and e2: V x T→ W, which are such that for i=l,2 and all w E W, σ E∑ and τ £ T, we have
et (E(w, σ), τ) = Et (w, τ). The table for each et has |V||T| entries, each of which is an element from W, and so it uses | V | |Γ| log2 \ W | bits. These are tables 372 and 374 in Figure 3. We use a function φ-.W xW XT→ V such that for all w1 E W, w2 E W and τ E T , we have φ{Ε1 (wlt τ), E2 (w2, τ), τ) = E(f(wlt w2), τ), where E is a secret permutation of W x T . The table for φ has |W|2|T| entries, each of which is an element of V, and so the number of required bits equals | W \ 2 \ T | log21 V \ . This is Table 385 in Figure 3. Finally, we use a table for implementing a function ¥:WxTx∑:→V such that for all w E W, τ E T, σ E∑, we have ψ(Ε(νν, τ), σ) = E(w, σ). This is Table 360 in Figure 3. The number of bits for this table equals | W \ \ T \ \∑ \ log21 V \ .
The total number of required bits thus equals (\V\ + |∑|2) log2|∑| +
|∑|2log2|r|+ 2|F||r|log2|I^| + |Ι^||Γ|(|Ι^| + |∑|) log2|F|. In the special case |W|=|∑|, this reduces to | |2log2|r| + 2|Ι^|2(3|Γ| + l)log2| |.
From the above, it appears that a smaller internal state space T may reduce the required table size. Next, we explicitly show how to use the tables mentioned above. We consider inputs v = E(wlt a and v2 = E(w2, σ2). Note that an attacker can observe v and v2, but cannot observe w and w2. We run the following program.
Figure imgf000021_0001
; s2: = Se[v2]; T = t[slts2]; (** so s1 = alts2 = σ2 **)
i = fi i ]; y2 = ^\ ,x\; (** soyt = Ε^,τ) **)
Figure imgf000021_0002
σ := ^^^2] ; (** so σ = g(a1}a2) **)
u■= Ψ[ζ,σ] (** sou = E{ f{w1,w2),g a1,a2)).**)
A disadvantage of a small state space is the following. In the above program , one computes i, 2 which are such that yt = ^( ^ τ). So if an attacker observes that for two different values v and v the corresponding values y and are actually equal, then he knows that v and v respresent the same value of w. If T is small, then it is quite likely that different representatives for w yield the same value for y . As an extreme case: if T has just one element, different representatives of an element in W always give the same value of y . It is thus advantageous that T is not chosen too small. For example, T may have 4 elements or 8 or 16.
Below an example is given of a construction of an encoder 110, decoder 170 and state extractor tables 212 and 214. We will assume a single function input and a single state input (there may be more of either), of each 4 bits. Function input State input Encoding
0000 0000 0100 0110
0000 0001 0101 1000
0000 1111 1100 1100
0001 0000 1001 0111
0001 0001 0111 1010
1111 1111 0011 1001
The first two columns lists all possible combinations of function input values and state input values. The last column lists a random permutation of the number 0 to 255 in binary. Note that the encryption is perfect, in the sense that even with perfect knowledge of 256-2=254 input-output pairs, the remaining two pairs still have one bit of uncertainty in them. A less perfect but still very usable encoding could be obtained, by using an 8 bit wide block cipher.
An encoding table is obtained by sorting on the first two columns, the resulting table shows how to obtain the last column (encoding) from the first two. By sorting on the last column, a table is obtained that decodes instead of encodes. By removing the first column and sorting on the last column a state extractor function is obtained. Note that generally, it is not needed to store both the input and output column. For example, if the input column is sorted and contains all possible combinations, it may be omitted.
Figure 3 c shows state dependent re-encoding without using a reduced state function. The state dependent re-encoding tables 372 and 374 of figure 3 c are the same as those of figure 3b except that they have as input the state output value 232 instead of the reduced state value. This means that the re-encoding which takes places is more secure. On the other hand the tables in 372, 374 and 385 have a wide input. Interestingly, although data function table 385 of figure 3c has a larger input, than that of figure 3b, no re-encoding table 360 is needed since table 385 now has the correct state output value to incorporate in the output (although this is possible, which would reduce table size).
Taking again 4 bits for function and state values as an example, the table 372 of figure 3c has 4+4+4 = 12 bits as input and 4 bits as output. Table 385 of figure 3c has 4+4+4=12 bits as input and 4+4=8 bits as output. Figure 5 shows a computing device 500, having a storage device 510. Storage device 510 is typically one or more non- volatile memories, but may also be a hard disc, optical disc, etc. Storage device 510 may also be a volatile memory comprising downloaded or otherwise received data. Computing device 500 comprises a processor 550. The processor typically executes code 555 stored in a memory. For convenience the code may be stored in storage device y 510. The code causes the processor to execute a computation. Device 500 may comprise an optional I/O device 560 to receive input values and/or transmit results. I/O device 560 may be a network connection, removable storage device, etc.
Storage device 510 contains one or more table networks according to one of the figures 1 to 3.
In an embodiment, the computing device may work as follows during operation: computing device 500 receives input values. The input values are encoded, e.g. by using the encoding table 541, e.g. table 110. Thus the input values are obtained as encoded input values. Note that the input values could be obtained as encoded input values directly, e.g. through device 560. Encoding an input value to an encoded input value implies that a state input has to be chosen. There are several ways to do so, for example the state input may be chosen randomly, e.g., by a random number generator. The state input may be chosen according to an algorithm; the algorithm may be complicated and add to the obfuscation. The state input value may also be constant, or taken sequentially from a sequence of numbers, say the sequence of integers having a constant increment, say of 1, and starting at some starting point; the starting point may be zero, a random number, etc. Choosing the state inputs as a random number and increasing with 1 for each next state input choice is a particular advantageous choice. If the state inputs are chosen off-device the attacker has no way to track where state input values are chosen and what they are.
Processor 550 executes a program 555 in memory 510. The program causes the processor to apply look-up tables to the encoded input values, or to resulting output values. Look-up tables may be created for any logic or arithmetic function thus any computation may be performed by using a sequence of look-up tables. This helps to obfuscate the program. In this case the look-up tables are encoded for obfuscation and so are the intermediate values. In this case the obfuscation is particularly advantageous because a single function input value may be represented by muliptle encoded input values.
Furthermore, some or all table and/or table networks have the the multiple function property.
At some point a result value is found. If needed the result may be decoded, e.g. using the decoding table 542, e.g. table 170. But the result may also be exported in encoded form. Input values may also be obtained from input devices, and output values may be used to show on a screen.
The computation is performed on encoded data words. The computation is done by applying a sequence of table look-up accesses. The input values used may be input values received from outside the computing device, but may also be obtained by previous look-up table access. In this way intermediate results are obtained which may then be used for new look-up table accesses. At some point one of the intermediate results is the encoded result of the function.
Computing device 500 may comprise a random number generator for assigning state input values to data function inputs.
Figure 6 illustrates as flow chart a compiling method 600. In step 610 a first computer program is received by a receiver. In step 620 a lexical analysis is performed, e.g., to identify tokens, by a lexical analyzer. Possibly processing such as macro expansion is also done. In step 630 the program is parsed by a parser. For example, the parser generates a parsing tree according to a formal grammar of the programming language of the first program. The parser identifies the different language constructs in the program and calls appropriate code generation routines. In particular, an operator or multiple operators are identified. In that case, in step 640 code generation is done by a code generator. During code generation some code is generated and if needed accompanying tables. The accompanying tables include tables that are configured for two functions: one for the needed operator and a state function. The generated code does not need, and generally will not, contain the operator as it is replaced by one or more look-up tables. The state function may be chosen at random. The state function may also be chosen as a result of the program, for example, the state function may be another needed operator, which will allow the table to be re-used. For example, the parser will identify and add operation and translate this into a look-up table for the add instruction and in generated code for applying the look-up table to the correct values. As the state function the compiler may select a random function. The compiler may also select at random a function from a set of functions, say addition, subtraction, multiplication and the like.
In step 655 the generated tables are merged to a table base, since it may well happen that some tables are generated multiple times, in that case it is not needed to store them multiple times. E.g. an add-table may be needed and generated only once. When all code is merged and all tables are merged the compilation is finished. Optionally, there may be an optimization step. Typically, the compiler uses encoded domains, i.e., sections of the program in which all value, or at least all values corresponding to some criteria, are encoded, i.e., have code word bit size (n). In the encoded domain, operations may be executed by look-up table execution. When the encoded domain is entered all values are encoded, when the encoded domain is left, the values are decoded. A criterion may be that the value is correlated, or depends on, security sensitive information, e.g., a cryptographic key.
An interesting way to create the compiler is the following. In step 630 an intermediate compilation is done. This may be to an intermediate language, e.g. register transfer language or the like, but may also be a machine language code compilation. This means that for steps 610-630 of figure 6 a conventional compiler may be used, which is does not produce table networks. However in step 640 code generation is done based on the intermediate compilation. For example, if machine language code was used, each instruction is replaced by a corresponding operator free implementation of that instruction, i.e., a table- based implementation of that instruction. This represents a particular straightforward way to create the compiler. Figures 6 may also be used to generate a compiler that produces not machine language but a second programming language.
In an embodiment, the compiler is a compiler for compiling a first computer program written in a first computer programming language into a second computer program, the compiler comprises a code generator to generate the second computer program by generating tables and machine language code, the generated tables and the generated machine language code together forming the second computer program, the generated machine language code referencing the tables, wherein the compiler is configured to identify an arithmetic or logical expression in the first computer program, the expression depending on at least one variable, and the code generator is configured to generate one or more tables representing pre-computed results of the identified expression for multiple values of the variable and representing at least one other expression, and to generate machine language code to implement the identified expression in the second computer program by accessing the generated one or more tables representing pre-computed results. Ideally, the machine language code generated to implement the identified expression does not contain arithmetic or logic machine instructions itself, at least no arithmetic or logic machine instructions related to sensitive information. An attacker who reverse engineered the tables may find that it may represent the identified expression, but that it may also represent the other expression.
This increases resistance against reverse engineering and lowers, side-channel leakage of the second computer program because it contains fewer arithmetic or logic operations. Ideally all arithmetic and logical expressions and sub-expressions in are replaced by table accesses. Since those instructions which constitute the arithmetic or logical expression or sub expressions are absent they cannot leak any information. The table is pre- computed; the power consumed to perform the arithmetic or logical behavior enclosed in the table is not visible during execution of the program.
Figure 7 illustrates in a flowchart a method 700 for computing a data function on a function- input value. In step 710 a function- input value is combined together with a state-input value in an encoded input value. This combination is done in an encrypting manner. Note that the encoding of input values may be done at a different location and/or by a different party. In step 720 a table network is applied to the encoded input value to produce as output an encoded output value. In step 730, the function-output value is obtained from the encoded output value. Note that the state-output value could also be obtained from the encoded output value but this may not be needed. The function-output value equals the result of applying the data function to the function-input value, and the state-output value equals the result of applying a state function to the state-input value. Step 730 may be done at a different location and/or by a different party.
Many different ways of executing the methods disclosed herein are possible, as will be apparent to a person skilled in the art. For example, the order of the steps can be varied or some steps may be executed in parallel. Moreover, in between steps other method steps may be inserted. The inserted steps may represent refinements of the method such as described herein, or may be unrelated to the method.
A method according to the invention may be executed using software, which comprises instructions for causing a processor system to perform method 700. Software may only include those steps taken by a particular sub-entity of the system. The software may be stored in a suitable storage medium, such as a hard disk, a floppy, a memory etc. The software may be sent as a signal along a wire, or wireless, or using a data network, e.g., the Internet. The software may be made available for download and/or for remote usage on a server.
It will be appreciated that the invention also extends to computer programs, particularly computer programs on or in a carrier, adapted for putting the invention into practice. The program may be in the form of source code, object code, a code intermediate source and object code such as partially compiled form, or in any other form suitable for use in the implementation of the method according to the invention. An embodiment relating to a computer program product comprises computer executable instructions corresponding to each of the processing steps of at least one of the methods set forth. These instructions may be subdivided into subroutines and/or be stored in one or more files that may be linked statically or dynamically. Another embodiment relating to a computer program product comprises computer executable instructions corresponding to each of the means of at least one of the systems and/or products set forth.
It should be noted that the above-mentioned embodiments illustrate rather than limit the invention, and that those skilled in the art will be able to design many alternative embodiments. In the claims, any reference signs placed between parentheses shall not be construed as limiting the claim. Use of the verb "comprise" and its conjugations does not exclude the presence of elements or steps other than those stated in a claim. The article "a" or "an" preceding an element does not exclude the presence of a plurality of such elements. The invention may be implemented by means of hardware comprising several distinct elements, and by means of a suitably programmed computer. In the device claim enumerating several means, several of these means may be embodied by one and the same item of hardware. The mere fact that certain measures are recited in mutually different dependent claims does not indicate that a combination of these measures cannot be used to advantage.
List of Reference Numerals in figures 1-5:
100 a table network
102, 104 a function input value
110 an encoder
112, 114 a state input value
122, 124 an encoded input value
130 a data function
160 an encoded output value
162 a function output value
164 a state output value
170 a decoder
180 a table network
200 a table network
212,214 a state extractor table
230 a state function table
242, 244 a re-encoding table
252, 254 recoded input value
260 a data function table
310 a reduced state function table
320 a reduced state value
332, 334 a re-encoding table
342, 344 recoded input value
350 data function table
360 re-encoding table
372, 374 state dependent re-encoding table
382, 384 recoded input value
410 an input table
420 an intermediate table
430 an output table
500 a computing device
510 a storage device
521, 522 single input look-up tables
531, 532 multiple input look-up tables
5311-5323 single input look-up tables 541 encoding look-up table
542 decoding look-up table 555 machine language code 550 a computer processor 560 I/O device

Claims

CLAIMS:
1. A compiler configured for compiling a computer program, the compiler being configured for parsing the computer program to identify multiple operators, including a data function (f) and a state function (g), and for producing a table network configured for the data function and the state function, wherein
- the table network is configured to take as input an encoded input value and produce as output an encoded output value, the encoded output value combines a function- output value together with a state-output value encrypted together into a single value, wherein the function-output value equals the result of applying the data function to the function-input value, and the state-output value equals the result of applying the state function to the state-input value, wherein the encoded input value combines the function- input value together with a state-input value encrypted together into a single value.
2. A computing device (500) configured to run a computer program compiled by a compiler as in Claim 1, the device comprising an electronic storage (510) storing the table network (180, 200, 300) produced by the compiler, configured for a data function (f) and a state function (g), and an electronic processor (550) coupled to the storage and configured to compute the data function and the state function by applying the table network, wherein
the device is configured to obtain the function- input value as an encoded input value (122, 124), the encoded input value combines the function-input value together with a state-input value encrypted together into a single value,
the table network is configured to take as input the encoded input value and produce as output an encoded output value (160), the encoded output value combines a function-output value (162) together with a state-output value (164) encrypted together into a single value, wherein the function-output value equals the result of applying the data function (f) to the function- input value and the state-output value equals the result of applying a state function (g) to the state-input value.
3. A computing device (500) as in Claim 2 configured to use the state or data function of the table network depending on a current encoding of the table network inputs.
4. A computing device (500) as in Claim 3, wherein
the encoded input value (122, 124) combines the function-input value and the state-input value encrypted together into a single value according to a first encoding (£"), - the table network is configured to obtain a function-input value and a state- input value as a further encoded input value (122, 124), the further encoded input value combines the function- input value together with the state-input value encrypted together into a single value according to a second encoding (E)
the table network is configured to take as input the further encoded input value and produce as output a further encoded output value (160), the further encoded output value combines a function-output value (162) together with a state-output value (164) encrypted together into a single value, wherein the function-output value equals the result of applying the state function (g) to the function- input value and the state-output value equals the result of applying the data function (f) to the state-input value.
5. A computing device (500) as in Claim 4, wherein
the first encoding is defined by a first encoding function E(x,y), wherein x denotes a function- input and y a state-input, and the second encoding is defined by a second encoding function defined by E(x, y) = E(y, x).
6. A computing device (500) as in Claim 4 configured to pre- and post processes inputs and output of the table network (F) with the function composition (E E'1) of the second encoding (E) and the inverse of the first encoding (E).
7. A computing device as in Claim 2, wherein the table network comprises a single table (180) taking as input the encoded input value and producing as output the encoded output value.
8. A computing device as in Claim 2, wherein the table network comprises - a state extractor table (212, 214) configured such that state extractor table applied to the encoded input value produces the state-input value,
a state function table (230) configured such that the state function table applied to the state-input value produces the state-output value.
9. A computing device as in Claim 8, wherein the table network comprises a re-encoding table (242, 244) configured for receiving as input the encoded input value and the state-output value and producing as output a recoded input value, the recoded input value combines the function- input value together with the state-output value encrypted together into a single value.
10. A computing device as in Claim 9, wherein the table network comprises a data function table (260) configured for receiving as input the recoded input value and as output the encoded output value.
11. A computing device as in Claim 8, wherein the table network comprises
a reduced state function table (310) configured for receiving the state-input value and produce as output an intermediate state value equal to the result of a reduced state function applied to state-input value, the range of the reduced state function being larger than a single value and smaller than the range of the state function, the encoded input value being recoded in dependence upon the intermediate state value.
12. A computing device as in Claim 11, wherein the table network comprises a first re-encoding table (332, 334) configured for receiving as input the encoded input value and the intermediate state value and producing as output a recoded input value, the recoded input value combines the function- input value together with the intermediate state value encrypted together into a single value,
a data function table (350) configured for receiving as input the recoded input value, and as output an recoded output value, the recoded output value combines the function-output value together with the intermediate state value encrypted together into a single value
a second re-encoding table (360) configured for receiving as input the recoded output value and the state-output value and producing as output the encoded output value.
13. A computing device as in Claim 11, wherein the table network comprises a first re-encoding table (372, 374) configured for receiving as input the encoded input value and the intermediate state value and producing as output a recoded input value (382, 384), the recoded input value (382, 384) being the function- input re-encoded, the re-encoding being selected in dependence upon the intermediate state value, a data function table (385) configured for receiving as input the recoded input value (382) and reduced state value (320), and as output the function-output value in an encoded form,
a second re-encoding table (360) configured for receiving as input the function-output value in an encoded form and the state-output value and producing as output the encoded output value.
14. A computing device as in any one of the preceding claims, wherein the table network comprises
- a first re-encoding table (372, 374) configured for receiving as input the encoded input value and the state-output value and producing as output a recoded input value (382, 384), the recoded input value (382, 384) being the function- input re-encoded, the re- encoding being selected in dependence upon the state-output value.
15. A computing device as in any one of the preceding claims wherein the table network is configured for function-input values having at least 4, preferably at least 8 bits.
16. A computing device as in any one of the preceding claims wherein the table network is configured for state-input value values having at least 4, preferably at least 8 bits.
17. A computing device as in any one of the preceding claims wherein function- input value and state-input value have the same bit size.
18. A method for running a computer program compiled by a compiler as in Claim 1 , the method comprising computing a data function and a state function by applying a table network produced by the compiler to an encoded input value and producing as output an encoded output value, the encoded input value combines the function- input value together with a state-input value encrypted together into a single value, the encoded output value combines a function-output value together with a state-output value encrypted together into a single value, wherein the function-output value equals the result of applying the data function to the function-input value, and the state-output value equals the result of applying a state function to the state-input value.
19. A computer program comprising computer program code means adapted to perform all the steps of Claim 1 or 18 when the computer program is run on a computer.
20. A computer program as claimed in claim 19 embodied on a computer readable medium.
PCT/EP2013/076782 2012-12-21 2013-12-17 Computing device comprising a table network WO2014095772A1 (en)

Priority Applications (7)

Application Number Priority Date Filing Date Title
EP13811877.3A EP2936727A1 (en) 2012-12-21 2013-12-17 Computing device comprising a table network
CN201380067505.3A CN105453481B (en) 2012-12-27 2013-12-17 Calculating equipment including table network
BR112015014470A BR112015014470A2 (en) 2012-12-21 2013-12-17 compiler configured to compile a computer program, computing device configured to run a computer program compiled by a compiler, method to run a computer program compiled by a compiler, and computer program
JP2015548419A JP2016505891A (en) 2012-12-21 2013-12-17 Computing device with table network
MX2015007707A MX2015007707A (en) 2012-12-21 2013-12-17 Computing device comprising a table network.
US14/443,409 US10180824B2 (en) 2012-12-21 2013-12-17 Computing device comprising a table network
RU2015129742A RU2676454C2 (en) 2012-12-21 2013-12-17 Computing device comprising table network

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
US201261740691P 2012-12-21 2012-12-21
US61/740,691 2012-12-21
EP12199387.7 2012-12-27
EP12199387 2012-12-27

Publications (2)

Publication Number Publication Date
WO2014095772A1 true WO2014095772A1 (en) 2014-06-26
WO2014095772A9 WO2014095772A9 (en) 2014-10-02

Family

ID=47681539

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/EP2013/076782 WO2014095772A1 (en) 2012-12-21 2013-12-17 Computing device comprising a table network

Country Status (8)

Country Link
US (1) US10180824B2 (en)
EP (1) EP2936727A1 (en)
JP (1) JP2016505891A (en)
CN (1) CN105453481B (en)
BR (1) BR112015014470A2 (en)
MX (1) MX2015007707A (en)
RU (1) RU2676454C2 (en)
WO (1) WO2014095772A1 (en)

Cited By (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2015082212A1 (en) * 2013-12-05 2015-06-11 Koninklijke Philips N.V. A computing device for iterative application of table networks
WO2016043665A1 (en) * 2014-09-18 2016-03-24 Huawei International Pte. Ltd. Encryption function and decryption function generating method, encryption and decryption method and related apparatuses
US9594769B2 (en) 2012-12-21 2017-03-14 Koninklijke Philips N.V. Computing device configured with a table network
WO2017063986A1 (en) * 2015-10-12 2017-04-20 Koninklijke Philips N.V. A cryptographic device and an encoding device
JP2017533458A (en) * 2014-09-30 2017-11-09 コーニンクレッカ フィリップス エヌ ヴェKonink Electronic computing device for performing obfuscated arithmetic
WO2018086951A1 (en) 2016-11-08 2018-05-17 Koninklijke Philips N.V. Electronic calculating device for converting a residue numbers system representation to a radix representation
WO2018108705A1 (en) 2016-12-12 2018-06-21 Koninklijke Philips N.V. An electronic calculating device arranged to calculate the product of integers
EP3376705A1 (en) 2017-03-17 2018-09-19 Koninklijke Philips N.V. Elliptic curve point multiplication device and method in a white-box context
US10180824B2 (en) 2012-12-21 2019-01-15 Koninklijke Philips N.V. Computing device comprising a table network
US10469245B2 (en) 2014-12-24 2019-11-05 Koninklijke Philips N.V. Cryptographic system and method
RU2708439C1 (en) * 2015-12-15 2019-12-06 Конинклейке Филипс Н.В. Computing device and method
US10680796B2 (en) 2015-05-19 2020-06-09 Koninklijke Philips N.V. Computing with encrypted values
US10685096B2 (en) 2014-12-22 2020-06-16 Koninklijke Philips N.V. Hiding of a program execution

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
NL2015955B1 (en) * 2015-12-14 2017-06-28 Koninklijke Philips Nv Calculating device and method.
EP3282675B1 (en) * 2016-08-11 2020-01-29 Nxp B.V. Network node and method for identifying a node in transmissions between neighbouring nodes of a network
JP7132926B2 (en) * 2017-01-05 2022-09-07 コーニンクレッカ フィリップス エヌ ヴェ Compilation device and compilation method
CN113238821A (en) * 2021-05-31 2021-08-10 深圳市商汤科技有限公司 Data processing acceleration method and device, electronic equipment and storage medium

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20120155638A1 (en) 2010-12-17 2012-06-21 Apple Inc. Securing keys of a cipher using properties of the cipher process
US20120300922A1 (en) 2009-12-30 2012-11-29 France Telecom Method of generating a correspondence table for a cryptographic white box

Family Cites Families (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5111390A (en) * 1988-08-22 1992-05-05 Unisys Corporation Software security system for maintaining integrity of compiled object code by restricting users ability to define compilers
JPH11110224A (en) 1997-09-29 1999-04-23 Nec Corp Language processing device, its method and information storage medium
WO2007105126A2 (en) 2006-03-10 2007-09-20 Koninklijke Philips Electronics N.V. Method and system for obfuscating a cryptographic function
US8479018B2 (en) 2006-04-28 2013-07-02 Panasonic Corporation System for making program difficult to read, device for making program difficult to read, and method for making program difficult to read
US7757181B2 (en) 2006-05-05 2010-07-13 Microsoft Corporation Agenda and day hybrid calendar view
EP2044724B1 (en) * 2006-07-12 2015-04-29 Irdeto B.V. Tamper resistance of a digital data processing unit
US8817740B2 (en) * 2006-10-31 2014-08-26 Motorola Mobility Llc Methods and devices of a queue controller for dual mode bidirectional audio communication
US20080127142A1 (en) 2006-11-28 2008-05-29 Microsoft Corporation Compiling executable code into a less-trusted address space
US9009573B2 (en) * 2008-02-01 2015-04-14 Qualcomm Incorporated Method and apparatus for facilitating concatenated codes for beacon channels
KR101639587B1 (en) 2008-03-05 2016-07-14 이르데토 비.브이. Cryptographic system
US9654280B2 (en) 2009-03-10 2017-05-16 Irdeto B.V. White-box cryptographic system with input dependent encodings
EP2443786A1 (en) 2009-06-19 2012-04-25 Irdeto B.V. White-box cryptographic system with configurable key using intermediate data modification
US9274976B2 (en) * 2010-11-05 2016-03-01 Apple Inc. Code tampering protection for insecure environments
EP2482184A1 (en) 2011-02-01 2012-08-01 Irdeto B.V. Adaptive obfuscated virtual machine
RU2620712C2 (en) 2012-01-09 2017-05-29 Конинклейке Филипс Н.В. Virtual machine device with driven key obfuscation and method
US10180824B2 (en) 2012-12-21 2019-01-15 Koninklijke Philips N.V. Computing device comprising a table network
EP3085004A1 (en) 2013-12-20 2016-10-26 Koninklijke Philips N.V. Operator lifting in cryptographic algorithm

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20120300922A1 (en) 2009-12-30 2012-11-29 France Telecom Method of generating a correspondence table for a cryptographic white box
US20120155638A1 (en) 2010-12-17 2012-06-21 Apple Inc. Securing keys of a cipher using properties of the cipher process

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
CHOW S ET AL: "WHITE-BOX CRYPTOGRAPHY AND AN AES IMPLEMENTATION", INTERNET CITATION, 2002, XP002476831, Retrieved from the Internet <URL:http://citeseer.ist.psu.edu/732354.html> [retrieved on 20080416] *
PEDRO MALAGÓN ET AL: "Compiler Optimizations as a Countermeasure against Side-Channel Analysis in MSP430-Based Devices", SENSORS, vol. 12, no. 12, 8 December 2012 (2012-12-08), pages 7994 - 8012, XP055102814, ISSN: 1424-8220, DOI: 10.3390/s120607994 *
S. CHOW; P. EISEN; H. JOHNSON; P.C. VAN OORSCHOT, WHITE-BOX CRYPTOGRAPHY AND AN AES IMPLEMENTATION

Cited By (25)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10180824B2 (en) 2012-12-21 2019-01-15 Koninklijke Philips N.V. Computing device comprising a table network
US9594769B2 (en) 2012-12-21 2017-03-14 Koninklijke Philips N.V. Computing device configured with a table network
WO2015082212A1 (en) * 2013-12-05 2015-06-11 Koninklijke Philips N.V. A computing device for iterative application of table networks
CN106663387B (en) * 2014-09-18 2020-03-27 华为国际有限公司 Encryption function and decryption function generation method, encryption and decryption method, and related devices
US10361842B2 (en) 2014-09-18 2019-07-23 Huawei International Pte. Ltd. Encryption function and decryption function generating method, encryption and decryption method and related apparatuses
CN106663387A (en) * 2014-09-18 2017-05-10 华为国际有限公司 Encryption/decryption function generating method, an encryption/decryption method and related apparatuses
WO2016043665A1 (en) * 2014-09-18 2016-03-24 Huawei International Pte. Ltd. Encryption function and decryption function generating method, encryption and decryption method and related apparatuses
JP2017533458A (en) * 2014-09-30 2017-11-09 コーニンクレッカ フィリップス エヌ ヴェKonink Electronic computing device for performing obfuscated arithmetic
US10685096B2 (en) 2014-12-22 2020-06-16 Koninklijke Philips N.V. Hiding of a program execution
US10469245B2 (en) 2014-12-24 2019-11-05 Koninklijke Philips N.V. Cryptographic system and method
US10680796B2 (en) 2015-05-19 2020-06-09 Koninklijke Philips N.V. Computing with encrypted values
NL2015599B1 (en) * 2015-10-12 2017-05-02 Koninklijke Philips Nv A cryptographic device and an encoding device.
WO2017063986A1 (en) * 2015-10-12 2017-04-20 Koninklijke Philips N.V. A cryptographic device and an encoding device
RU2692419C1 (en) * 2015-10-12 2019-06-24 Конинклейке Филипс Н.В. Cryptographic device and coding device
CN108141352B (en) * 2015-10-12 2020-08-25 皇家飞利浦有限公司 Cryptographic apparatus, method, apparatus and computer readable medium, and encoding apparatus, method, apparatus and computer readable medium
US10567158B2 (en) 2015-10-12 2020-02-18 Koninklijke Philips N.V. Cryptographic device and an encoding device
CN108141352A (en) * 2015-10-12 2018-06-08 皇家飞利浦有限公司 Encryption device and encoding device
US11070358B2 (en) 2015-12-15 2021-07-20 Koninklijke Philips N.V. Computation device and method
RU2708439C1 (en) * 2015-12-15 2019-12-06 Конинклейке Филипс Н.В. Computing device and method
WO2018086951A1 (en) 2016-11-08 2018-05-17 Koninklijke Philips N.V. Electronic calculating device for converting a residue numbers system representation to a radix representation
US11755288B2 (en) 2016-11-08 2023-09-12 Koninklijke Philips N.V. Secure transformation from a residue number system to a radix representation
WO2018108705A1 (en) 2016-12-12 2018-06-21 Koninklijke Philips N.V. An electronic calculating device arranged to calculate the product of integers
WO2018167198A1 (en) 2017-03-17 2018-09-20 Koninklijke Philips N.V. Elliptic curve point multiplication device and method in a white-box context
EP3376705A1 (en) 2017-03-17 2018-09-19 Koninklijke Philips N.V. Elliptic curve point multiplication device and method in a white-box context
US11290272B2 (en) 2017-03-17 2022-03-29 Koninklijke Philips N.V. Elliptic curve point multiplication device and method in a white-box context

Also Published As

Publication number Publication date
US20170235552A1 (en) 2017-08-17
JP2016505891A (en) 2016-02-25
US10180824B2 (en) 2019-01-15
RU2015129742A (en) 2017-01-26
WO2014095772A9 (en) 2014-10-02
CN105453481B (en) 2019-02-26
MX2015007707A (en) 2015-09-07
RU2676454C2 (en) 2018-12-28
CN105453481A (en) 2016-03-30
BR112015014470A2 (en) 2017-07-11
EP2936727A1 (en) 2015-10-28

Similar Documents

Publication Publication Date Title
US10180824B2 (en) Computing device comprising a table network
US9594769B2 (en) Computing device configured with a table network
US8966285B2 (en) Securing implementation of a cryptographic process having fixed or dynamic keys
US10790962B2 (en) Device and method to compute a block cipher
US20120124392A1 (en) System and method for stream/block cipher with internal random states
US8699702B2 (en) Securing cryptographic process keys using internal structures
US9565018B2 (en) Protecting cryptographic operations using conjugacy class functions
CN109726565A (en) Whitepack is used in anti-leakage primitive
EP3078154B1 (en) A computing device for iterative application of table networks
KR101914453B1 (en) Apparatus and method for encryption
Gu et al. White-box cryptography: practical protection on hostile hosts
CN107592963B (en) Method and computing device for performing secure computations
JP7079711B2 (en) Converter, conversion method, converter and obfuscation program
CN111602367B (en) Method for protecting entropy sources used in countermeasures for securing white-box cryptographic algorithms
KR102546567B1 (en) White-box encryption apparatus of lightweight block cipher pipo

Legal Events

Date Code Title Description
WWE Wipo information: entry into national phase

Ref document number: 201380067505.3

Country of ref document: CN

121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 13811877

Country of ref document: EP

Kind code of ref document: A1

ENP Entry into the national phase

Ref document number: 2015548419

Country of ref document: JP

Kind code of ref document: A

WWE Wipo information: entry into national phase

Ref document number: MX/A/2015/007707

Country of ref document: MX

WWE Wipo information: entry into national phase

Ref document number: IDP00201503714

Country of ref document: ID

NENP Non-entry into the national phase

Ref country code: DE

WWE Wipo information: entry into national phase

Ref document number: 2013811877

Country of ref document: EP

REG Reference to national code

Ref country code: BR

Ref legal event code: B01A

Ref document number: 112015014470

Country of ref document: BR

ENP Entry into the national phase

Ref document number: 2015129742

Country of ref document: RU

Kind code of ref document: A

ENP Entry into the national phase

Ref document number: 112015014470

Country of ref document: BR

Kind code of ref document: A2

Effective date: 20150618