会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 3. 发明申请
    • PROTECTING STATES OF A CRYPTOGRAPHIC PROCESS USING GROUP AUTOMORPHISMS
    • 使用组自动化保护CRIPTOGRAPHIC过程的状态
    • US20120254625A1
    • 2012-10-04
    • US13076362
    • 2011-03-30
    • Augustin J. FARRUGIAMathieu CietThomas Icart
    • Augustin J. FARRUGIAMathieu CietThomas Icart
    • G06F21/24
    • G06F21/602G06F21/52
    • In the field of computer enabled cryptography, such as a keyed block cipher having a plurality of rounds, the cipher is hardened against an attack by a protection process which obscures the cipher states and/or the round keys using the properties of group field automorphisms and applying multiplicative masks (instead of conventional XOR masks) to the states of the cipher, for encryption or decryption. This is especially advantageous in a “White Box” environment where an attacker has full access to the cipher algorithm, including the algorithm's internal state during its execution. This method and the associated computing apparatus are useful for protection against known attacks on “White Box” ciphers, by eliminating XOR operations with improved masking techniques and increasing complexity of reverse engineering and of attacks.
    • 在诸如具有多个回合的密钥分组密码的计算机启用密码学领域中,使用组域自动生成的属性,使密码状态和/或循环密钥隐藏的保护过程针对攻击进行加密, 将乘法掩码(而不是常规XOR掩码)应用于密码的状态,以进行加密或解密。 这在白盒环境中特别有利,在这种情况下,攻击者可以完全访问密码算法,包括算法执行过程中的内部状态。 该方法和相关联的计算设备对于通过利用改进的掩蔽技术消除XOR操作并增加逆向工程和攻击的复杂性来防止已知的对白盒密码的攻击是有用的。
    • 4. 发明申请
    • CRYPTOGRAPHY ON A ELLIPTICAL CURVE
    • 椭圆曲线的曲线图
    • US20120082307A1
    • 2012-04-05
    • US13377404
    • 2010-06-15
    • Thomas IcartJean-Sebastien Coron
    • Thomas IcartJean-Sebastien Coron
    • H04L9/28
    • G06F7/725G06F2207/7261H04L9/3066
    • A cryptographic calculation includes obtaining a point P(X,Y) from a parameter t on an elliptical curve Y2=f(X); and from polynomials X1(t), X2(t), X3(t) and U(t) satisfying: f(X1(t)).f(X2(t)).f(X3(t))=U(t)2 in Fq, with q=3 mod 4. Firstly a value of the parameter t is obtained. Next, the point P is determined by: (i) calculating X1=X1(t), X2=X2(t), X3=X3(t) and U=U(t); (ii) if the term f(X1)·f(X2) is a square, then testing whether the term f(X3) is a square in Fq and if so calculating the square root of f(X3) in order to obtain the point P(X3); (iii) otherwise, testing whether the term f(X1) is a square and, if so, calculating the square root of f(X1) in order to obtain the point P(X1); (iv) otherwise, calculating the square root of f(X2) in order to obtain the point P(X2). This point P is useful in a cryptographic application.
    • 密码计算包括从椭圆曲线Y2 = f(X)上的参数t获得点P(X,Y); 和(x(t))f(X3(t))= U(t(x) t)2,其中q = 3 mod 4.首先获得参数t的值。 接下来,通过以下方式确定点P:(i)计算X1 = X1(t),X2 = X2(t),X3 = X3(t)和U = U(t); (ii)如果术语f(X1)·f(X2)是一个平方,则测试f(X3)是否是Fq中的平方,如果是,则计算f(X3)的平方根,以获得 点P(X3); (iii)否则,测试术语f(X1)是否为平方,如果是,则计算f(X1)的平方根以获得点P(X1); (iv)否则,计算f(X2)的平方根,以获得点P(X2)。 这一点P在加密应用程序中很有用。
    • 8. 发明授权
    • Cryptography by parameterizing on elliptic curve
    • 椭圆曲线参数化加密
    • US08824670B2
    • 2014-09-02
    • US13378329
    • 2010-06-28
    • Thomas IcartHerve Chabanne
    • Thomas IcartHerve Chabanne
    • G06F21/00H04L9/00H04L9/30H04L9/08
    • H04L9/3066H04L9/005H04L9/0844H04L2209/08
    • A device is controlled by a controller on the basis of a password. A determination is made at the device or at the controller, on the basis of a random value r1, of a point P(X,Y) on an elliptic curve in a finite body Fq, q being an integer, according to: Ea,b(x, y):x3+ax+b=y2. First and second parameters k and k′ are obtained such that P(X,Y)=F(K,k′), where F is a surjective function of Fq×Fq, in Fq. The first and second parameters are obtained in an encrypted format by encryption in accordance with the password. The first and second encrypted parameters are then transmitted to the controller. During the control, the function F is used, such that, whatever the values of z and z′ which are input elements of Fq, F(z,z′) is a point on the elliptic curve and the input elements do not satisfy the equation.
    • 设备由密码控制器控制。 根据Ea,根据有限体Fq中的椭圆曲线上的点P(X,Y),q为整数,根据随机值r1在装置或控制器处进行判定, b(x,y):x3 + ax + b = y2。 获得第一和第二参数k和k',使得P(X,Y)= F(K,k'),其中F是Fq中的Fq×Fq的突出函数。 第一和第二参数是按照密码通过加密获得的。 然后将第一和第二加密参数发送到控制器。 在控制期间,使用函数F,使得无论作为Fq的输入元素的z和z'的值如何,F(z,z')是椭圆曲线上的点,并且输入元素不满足 方程。