Unlock instant, AI-driven research and patent intelligence for your innovation.
Cryptographic algorithm having a key-dependent masked computing step (sbox call)
What is Al technical title?
Al technical title is built by PatSnap Al team. It summarizes the technical point description of the patent document.
A technology related to computing and keys, which is applied to encryption devices with shift registers/memory, usage of multiple keys/algorithms, countermeasures for attacking encryption mechanisms, etc., can solve the problem of increasing the running time and memory requirements of implementation methods, and attacking and other issues to achieve the effect of retaining security benefits
Active Publication Date: 2018-08-03
捷德移动安全有限责任公司
View PDF6 Cites 1 Cited by
Summary
Abstract
Description
Claims
Application Information
AI Technical Summary
This helps you quickly interpret patents by identifying the three key elements:
Problems solved by technology
Method used
Benefits of technology
Problems solved by technology
[0011] The disadvantage of the solution in WO 2010146139 A9 is that the additional "key translation unit" increases the runtime and memory requirements of the implementation
[0012] Yet another disadvantage of the solution in WO 2010146139 A9 is that the modified implementation now contains information about the new key and the old key
It must be assumed that the information now presented about the two different keys will enable certain attacks against white-box implementations, e.g. by way of statistical evaluation
Method used
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more
Image
Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
Click on the blue label to locate the original text in one second.
Reading with bidirectional positioning of images and text.
Smart Image
Examples
Experimental program
Comparison scheme
Effect test
example 1
[0052] Example 1: The key values k, f and g-1 derived for the input distribution of the calculation step S are linear functions.
[0053] Sk: Calculation step where derived key value = k
[0054] x: input value
[0055] k: the key value included in the calculation step S
[0056] SBOX: SBOX table call in table SBOX
[0057] Sk(x)=SBOX(k XOR x)
[0058] Linearly obfuscate the input and output of the table SBOX using the linear maps g-1 and f.
[0059] Tab S SubK (x)=f SBOX(k XOR g-1(x))
[0060] The key change data: SWD=g(kneu XOR k) is XORed on input.
[0073] Tab S SubKneu (x)=S'kneu(y)=SWD XOR f(k XOR SBOX(g-1x))=
[0074] f(kneu XOR k)XOR f(k XOR SBOX(g-1x))=
[0075] f(kneu XOR k XOR k XOR SBOX(g-1x))=
[0076] f(kneu XOR SBOX(g-1x)).
[0077] In example 1 and example 2, initially from the simplest case, ie g-1 and f are linear maps. If g-1 and f are non-linear, additional auxiliary data are required for computing S'kneu(y). In other structures of Sk(x), mor...
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More
PUM
Login to View More
Abstract
The invention provides a processor device having an executable implementation of a cryptographic algorithm (AES, DES) implemented thereon, which algorithm is set up to generate output text from inputtext using a secret key K, wherein the implementation of the algorithm: comprises a key-dependent computing step S which comprises key linking of input values x derived directly or indirectly from theinput text with key values SubK derived directly or indirectly from the key; and - the key-dependent computing step S is represented by a table which is masked with input masking and / or output masking to form a masked table TabSsubK. The processor device comprises a key update device which is set up to carry out a key update method from the derived key value SubK to a new derived key value SubKneu in the masked computing step S, wherein, in the key update method: key change data calculated using the derived key value SubK, the new derived key value SubKneu and the input and / or output maskingused are made available to the processor device, in particular the key update device; and a new masked table TabSxneu is generated in the processor device, in particular in the key update device, by means of the key change data, which table is set up to calculate the key-dependent computing step S for the new derived key value SubKneu using the new masked table TabSicneu.
Description
technical field [0001] The invention relates to a processor device implementing an encryption algorithm such as DES or AES including a key-dependent mask calculation step. In particular, the invention relates to the technical field of protecting encryption algorithms against attacks by means of white-box cryptography and implements encryption algorithms in a representation suitable for white-box cryptography. Background technique [0002] A processor device within the meaning of the present invention is understood to be a device or other object having a processor, for example a mobile terminal, such as a smartphone. Security-critical data used by encryption algorithms (such as PINs, passwords, encryption keys, etc.) is provided to the processor device in a secure manner. Traditionally, security-critical data is secured by (grey-box) encryption to protect it against attacks by unauthorized persons. For this purpose, the data is provided on a secure element of the mobile ter...
Claims
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More
Application Information
Patent Timeline
Application Date:The date an application was filed.
Publication Date:The date a patent or application was officially published.
First Publication Date:The earliest publication date of a patent with the same application number.
Issue Date:Publication date of the patent grant document.
PCT Entry Date:The Entry date of PCT National Phase.
Estimated Expiry Date:The statutory expiry date of a patent right according to the Patent Law, and it is the longest term of protection that the patent right can achieve without the termination of the patent right due to other reasons(Term extension factor has been taken into account ).
Invalid Date:Actual expiry date is based on effective date or publication date of legal transaction data of invalid patent.