Check patentability & draft patents in minutes with Patsnap Eureka AI!

White-box cryptography interleaved look-up table

A look-up table and password technology, which is applied in the field of interleaved look-up tables of white-box cryptography, can solve the problems of difficulty in extracting information by code inspection, and difficulty in finding codes for access and permission control of security applications.

Active Publication Date: 2021-04-27
NXP BV
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The idea behind this is that it becomes more difficult to extract information through code inspection alone
Therefore, it is more difficult to find and then change the code that handles access and admission control of a secure application, for example

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • White-box cryptography interleaved look-up table
  • White-box cryptography interleaved look-up table

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0033] The description and drawings illustrate the principles of the invention. It will thus be appreciated that those skilled in the art will be able to devise various arrangements which, although not explicitly described or shown herein, embody the principles of the invention and are included within its scope. In addition, all examples cited herein are mainly intended to be used explicitly for teaching purposes to assist the reader in understanding the principles of the invention, as well as the concepts provided by the inventors to deepen the field, and should not be construed as being limited to such specific examples. Quote examples and conditions. Additionally, as used herein, the term "or" refers to a non-exclusive or (ie, and / or) unless otherwise indicated (eg, "or in addition" or "or in the alternative"). Also, the various embodiments described herein are not necessarily mutually exclusive, as some embodiments can be combined with one or more other embodiments to for...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A method of generating a white-box implementation of a cryptographic function, comprising: creating, by a processor, a white-box implementation of a cryptographic function using a network of two-dimensional look-up tables; identifying the two-dimensional look-up table using a common index; The two-dimensional lookup table of is rewritten as a three-dimensional table.

Description

technical field [0001] Various exemplary embodiments disclosed herein relate generally to interleaved look-up tables used in white-box cryptography, wherein the interleaved look-up tables increase execution speed. Background technique [0002] The Internet provides users with convenient and widespread access to digital content. Because the Internet is a powerful distribution channel, many user devices strive to access the Internet directly. User devices may include personal computers, laptop computers, set-top boxes, Internet-enabled media players, mobile phones, smart phones, tablet computers, mobile wireless hotspots, or any other device capable of accessing the Internet. The use of the Internet as a distribution medium for copyrighted content presents powerful challenges to protecting the interests of content providers. User devices increasingly use processors loaded with appropriate software to render (play back) digital content such as audio and / or video. Control of ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/06H04L9/00
CPCH04L9/002H04L9/06H04L9/0631H04L2209/16H04L2209/043
Inventor 简·胡格布鲁格W·P·A·J·米歇尔斯
Owner NXP BV
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More