Processing

Please wait...

Settings

Settings

Goto Application

1. WO2013006819 - MULTIPLICATIVE SPLITS TO PROTECT CIPHER KEYS

Publication Number WO/2013/006819
Publication Date 10.01.2013
International Application No. PCT/US2012/045819
International Filing Date 06.07.2012
IPC
H04L 9/00 2006.01
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
9Arrangements for secret or secure communication
H04L 9/06 2006.01
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
9Arrangements for secret or secure communication
06the encryption apparatus using shift registers or memories for blockwise coding, e.g. D.E.S. systems
CPC
H04L 2209/04
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
2209Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
04Masking or blinding
H04L 2209/16
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
2209Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
16Obfuscation or hiding, e.g. involving white box
H04L 9/002
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
9Cryptographic mechanisms or cryptographic; arrangements for secret or secure communication
002Countermeasures against attacks on cryptographic mechanisms
H04L 9/0631
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
9Cryptographic mechanisms or cryptographic; arrangements for secret or secure communication
06the encryption apparatus using shift registers or memories for block-wise ; or stream; coding, e.g. DES systems ; or RC4; Hash functions; Pseudorandom sequence generators
0618Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
0631Substitution permutation network [SPN], i.e. cipher composed of a number of stages or rounds each involving linear and nonlinear transformations, e.g. AES algorithms
Applicants
  • APPLE INC. [US]/[US] (AllExceptUS)
  • FARRUGIA, Augustin, J. [FR]/[US] (UsOnly)
  • CHEVALLIER-MAMES, Benoit [FR]/[US] (UsOnly)
  • KINDARJI, Bruno [FR]/[US] (UsOnly)
  • CIET, Mathieu [FR]/[US] (UsOnly)
  • ICART, Thomas [FR]/[US] (UsOnly)
Inventors
  • FARRUGIA, Augustin, J.
  • CHEVALLIER-MAMES, Benoit
  • KINDARJI, Bruno
  • CIET, Mathieu
  • ICART, Thomas
Agents
  • VINCENT, Lester, J.
Priority Data
13/178,41007.07.2011US
Publication Language English (EN)
Filing Language English (EN)
Designated States
Title
(EN) MULTIPLICATIVE SPLITS TO PROTECT CIPHER KEYS
(FR) FRACTIONNEMENTS MULTIPLICATIFS POUR PROTÉGER DES CLÉS DE CHIFFREMENT
Abstract
(EN)
In the field of computer enabled cryptography, such as a keyed block cipher having a plurality of rounds, the cipher is hardened against an attack by a protection process which obscures the round keys using the properties of group field automorphisms and applying masks to the states of the cipher, for encryption or decryption. This is especially advantageous in a "White Box" environment where an attacker has full access to the cipher algorithm, including the algorithm's internal state during its execution. This method and the associated computing apparatus are useful for protection against known attacks on "White Box" ciphers, by eliminating S-box operations, together with improved masking techniques and increasing the cipher's complexity against reverse engineering and key storage attacks.
(FR)
Dans le domaine de la cryptographie assistée par ordinateur, comme un chiffrement par blocs en mode crypto présentant une pluralité d'itérations, le chiffrement est renforcé vis-à-vis d'éventuelles attaques par un processus de protection qui obscurcit les clés itératives au moyen de propriétés relevant du groupe des automorphismes de champs et par application de masques à des états du chiffrement, pour le chiffrement ou le déchiffrement. Cette procédure est particulièrement avantageuse dans un environnement en mode "White Box" dans lequel un pirate a un accès sans restriction à l'algorithme de chiffrement, y compris à l'état interne de l'algorithme pendant son déroulement. Le procédé selon l'invention et le dispositif de calcul associé sont utiles pour assurer une protection contre des attaques connues sur des chiffrements en mode "White Box", par élimination d'opérations de type S-box, conjointement avec des techniques de masquage améliorées et par intensification de la complexité de chiffrement vis-à-vis de l'ingénierie inverse et d'attaque de mémoires de clés cryptographiques.
Also published as
Latest bibliographic data on file with the International Bureau