CN101578813A - 跟踪实现的拷贝 - Google Patents
跟踪实现的拷贝 Download PDFInfo
- Publication number
- CN101578813A CN101578813A CNA2008800021528A CN200880002152A CN101578813A CN 101578813 A CN101578813 A CN 101578813A CN A2008800021528 A CNA2008800021528 A CN A2008800021528A CN 200880002152 A CN200880002152 A CN 200880002152A CN 101578813 A CN101578813 A CN 101578813A
- Authority
- CN
- China
- Prior art keywords
- look
- version
- networks
- user
- network
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/002—Countermeasures against attacks on cryptographic mechanisms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0618—Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
- H04L9/0631—Substitution permutation network [SPN], i.e. cipher composed of a number of stages or rounds each involving linear and nonlinear transformations, e.g. AES algorithms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/16—Obfuscation or hiding, e.g. involving white box
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/60—Digital content management, e.g. content distribution
- H04L2209/606—Traitor tracing
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/60—Digital content management, e.g. content distribution
- H04L2209/608—Watermarking
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- Technology Law (AREA)
- Computer Hardware Design (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Multimedia (AREA)
- Storage Device Security (AREA)
- Debugging And Monitoring (AREA)
Abstract
Description
Claims (18)
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| EP07100358.6 | 2007-01-11 | ||
| EP07100358 | 2007-01-11 |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| CN101578813A true CN101578813A (zh) | 2009-11-11 |
Family
ID=39276239
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| CNA2008800021528A Pending CN101578813A (zh) | 2007-01-11 | 2008-01-08 | 跟踪实现的拷贝 |
Country Status (5)
| Country | Link |
|---|---|
| US (1) | US8306216B2 (zh) |
| EP (1) | EP2104987A2 (zh) |
| JP (1) | JP2010515945A (zh) |
| CN (1) | CN101578813A (zh) |
| WO (1) | WO2008084433A2 (zh) |
Cited By (6)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN101938352A (zh) * | 2010-09-23 | 2011-01-05 | 北京航空航天大学 | 一种分组密码软件加密方法 |
| CN102238430A (zh) * | 2010-03-26 | 2011-11-09 | 爱迪德有限责任公司 | 个性化白箱解扰器 |
| CN102904716A (zh) * | 2011-07-26 | 2013-01-30 | 克罗科斯科技公司 | 一种抗侧信道攻击的对策方法 |
| CN105591734A (zh) * | 2015-04-24 | 2016-05-18 | 桂林电子科技大学 | 一种基于查表的白盒密码非线性编码保护方法 |
| CN105656622A (zh) * | 2015-04-24 | 2016-06-08 | 桂林电子科技大学 | 一种基于查表和扰动置乱相结合的白盒密码非线性编码保护方法 |
| CN106031079A (zh) * | 2013-12-20 | 2016-10-12 | 皇家飞利浦有限公司 | 加密算法中的运算符提升 |
Families Citing this family (26)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| WO2009109884A1 (en) * | 2008-03-05 | 2009-09-11 | Koninklijke Philips Electronics N.V. | Cryptographic system |
| KR101597251B1 (ko) * | 2008-05-23 | 2016-02-24 | 이르데토 비.브이. | 소프트웨어 애플리케이션들의 화이트박스 구현들을 생성하는 시스템 및 방법 |
| US8644500B2 (en) * | 2010-08-20 | 2014-02-04 | Apple Inc. | Apparatus and method for block cipher process for insecure environments |
| US20120147892A1 (en) | 2010-12-14 | 2012-06-14 | International Business Machines Corporation | Analysis of network packets using a generated hash code |
| JP2012129994A (ja) * | 2010-12-14 | 2012-07-05 | Internatl Business Mach Corp <Ibm> | バイナリ識別子の圧縮方法、ハッシャ、及び、コンピュータ・プログラム |
| US8619782B2 (en) | 2010-12-14 | 2013-12-31 | International Business Machines Corporation | Bidirectional packet flow transformation |
| US9189425B2 (en) * | 2011-09-01 | 2015-11-17 | Apple Inc. | Protecting look up tables by mixing code and operations |
| CN104303187A (zh) | 2012-03-23 | 2015-01-21 | 耶德托公司 | 软件加指纹 |
| JP5975961B2 (ja) * | 2013-09-27 | 2016-08-23 | 日本電信電話株式会社 | 電子透かしシステム、電子透かし鍵生成装置、電子透かし方法及びプログラム |
| KR101807259B1 (ko) * | 2013-11-04 | 2017-12-08 | 한국전자통신연구원 | 암호화 장치 및 방법 |
| EP2940917B1 (en) | 2014-04-28 | 2019-02-20 | Nxp B.V. | Behavioral fingerprint in a white-box implementation |
| US9455833B2 (en) | 2014-04-28 | 2016-09-27 | Nxp B.V. | Behavioral fingerprint in a white-box implementation |
| US9641337B2 (en) * | 2014-04-28 | 2017-05-02 | Nxp B.V. | Interface compatible approach for gluing white-box implementation to surrounding program |
| EP2940925B1 (en) * | 2014-04-28 | 2017-12-27 | Nxp B.V. | Implementing use-dependent security settings in a single white-box implementation |
| EP2940920B1 (en) * | 2014-04-28 | 2017-03-08 | Nxp B.V. | Security patch without changing the key |
| US9338145B2 (en) | 2014-04-28 | 2016-05-10 | Nxp B.V. | Security patch without changing the key |
| US9922390B2 (en) * | 2014-09-05 | 2018-03-20 | Brady Jennings Beaubien | Watermarking system |
| US10922292B2 (en) | 2015-03-25 | 2021-02-16 | WebCloak, LLC | Metamorphic storage of passcodes |
| KR101847492B1 (ko) * | 2015-05-19 | 2018-04-10 | 삼성에스디에스 주식회사 | 데이터 암호화 장치 및 방법, 데이터 복호화 장치 및 방법 |
| US10015009B2 (en) * | 2015-11-25 | 2018-07-03 | Nxp B.V. | Protecting white-box feistel network implementation against fault attack |
| US10223511B2 (en) * | 2016-03-30 | 2019-03-05 | Nxp B.V. | Watermarking input and output of a white-box implementation |
| FR3061822B1 (fr) | 2017-01-10 | 2019-05-10 | Safran Identity & Security | Procede de chiffrement ou de dechiffrement d'un n-uplet de donnees avec un n-uplet de cles secretes predeterminees |
| US10547449B2 (en) | 2017-05-30 | 2020-01-28 | Nxp B.V. | Protection against relay attacks in a white-box implementation |
| US20180351918A1 (en) * | 2017-06-06 | 2018-12-06 | Nxp B.V. | Method for distributing a software application and encryption program for a white-box implementation |
| JP7383949B2 (ja) * | 2019-09-20 | 2023-11-21 | 富士電機株式会社 | 情報処理装置及びプログラム |
| US12099622B2 (en) * | 2020-12-21 | 2024-09-24 | Cryptography Research, Inc | Protection of neural networks by obfuscation of activation functions |
Citations (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20060153377A1 (en) * | 2003-06-17 | 2006-07-13 | France Telecom | Traceable method and system for encrypting and/or decrypting data, and recording media therefor |
Family Cites Families (7)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| JP4739465B2 (ja) * | 1997-06-09 | 2011-08-03 | インタートラスト テクノロジーズ コーポレイション | ソフトウェアセキュリティを増強するための混乱化技術 |
| US6745328B1 (en) | 1999-10-23 | 2004-06-01 | Lockstream Corporation | Encryption using a user-known and personally valuable key to deter key sharing |
| CA2327911A1 (en) * | 2000-12-08 | 2002-06-08 | Cloakware Corporation | Obscuring functions in computer software |
| US7010125B2 (en) * | 2001-01-26 | 2006-03-07 | Interntional Business Machines Corporation | Method for tracing traitor receivers in a broadcast encryption system |
| JP4638213B2 (ja) * | 2003-12-17 | 2011-02-23 | パナソニック株式会社 | コンテンツ配信サーバ、鍵割当方法、コンテンツ出力装置、及び鍵発行センタ |
| WO2007031894A2 (en) | 2005-09-15 | 2007-03-22 | Koninklijke Philips Electronics N.V. | Improved cryptographic method and system |
| US8700915B2 (en) * | 2006-07-12 | 2014-04-15 | Irdeto Corporate B.V. | Method and system for verifying authenticity of at least part of an execution environment for executing a computer module |
-
2008
- 2008-01-08 JP JP2009545262A patent/JP2010515945A/ja active Pending
- 2008-01-08 EP EP08700213A patent/EP2104987A2/en not_active Withdrawn
- 2008-01-08 WO PCT/IB2008/050038 patent/WO2008084433A2/en not_active Ceased
- 2008-01-08 CN CNA2008800021528A patent/CN101578813A/zh active Pending
- 2008-01-08 US US12/522,402 patent/US8306216B2/en not_active Expired - Fee Related
Patent Citations (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20060153377A1 (en) * | 2003-06-17 | 2006-07-13 | France Telecom | Traceable method and system for encrypting and/or decrypting data, and recording media therefor |
Cited By (9)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN102238430A (zh) * | 2010-03-26 | 2011-11-09 | 爱迪德有限责任公司 | 个性化白箱解扰器 |
| CN102238430B (zh) * | 2010-03-26 | 2016-07-06 | 爱迪德技术有限公司 | 个性化白箱解扰器 |
| CN101938352A (zh) * | 2010-09-23 | 2011-01-05 | 北京航空航天大学 | 一种分组密码软件加密方法 |
| CN101938352B (zh) * | 2010-09-23 | 2012-07-04 | 北京航空航天大学 | 一种分组密码软件加密方法 |
| CN102904716A (zh) * | 2011-07-26 | 2013-01-30 | 克罗科斯科技公司 | 一种抗侧信道攻击的对策方法 |
| CN106031079A (zh) * | 2013-12-20 | 2016-10-12 | 皇家飞利浦有限公司 | 加密算法中的运算符提升 |
| CN106031079B (zh) * | 2013-12-20 | 2019-10-11 | 皇家飞利浦有限公司 | 加密算法中的运算符提升 |
| CN105591734A (zh) * | 2015-04-24 | 2016-05-18 | 桂林电子科技大学 | 一种基于查表的白盒密码非线性编码保护方法 |
| CN105656622A (zh) * | 2015-04-24 | 2016-06-08 | 桂林电子科技大学 | 一种基于查表和扰动置乱相结合的白盒密码非线性编码保护方法 |
Also Published As
| Publication number | Publication date |
|---|---|
| US8306216B2 (en) | 2012-11-06 |
| EP2104987A2 (en) | 2009-09-30 |
| WO2008084433A3 (en) | 2009-02-12 |
| JP2010515945A (ja) | 2010-05-13 |
| US20100299515A1 (en) | 2010-11-25 |
| WO2008084433A2 (en) | 2008-07-17 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| CN101578813A (zh) | 跟踪实现的拷贝 | |
| CN101536398B (zh) | 用于白盒实现的加密方法 | |
| US7260215B2 (en) | Method for encryption in an un-trusted environment | |
| CN106888080B (zh) | 保护白盒feistel网络实施方案以防错误攻击 | |
| US9819486B2 (en) | S-box in cryptographic implementation | |
| WO2008142612A2 (en) | Updating cryptographic key data | |
| CN105024803A (zh) | 白箱实现中的行为指纹 | |
| CN106888081A (zh) | 白盒实施方案内中间值的宽编码 | |
| CN105095695B (zh) | 经由白箱实现的不正确功能行为实现授权 | |
| CN107273724B (zh) | 为白盒实施方案的输入和输出加水印 | |
| CN105024992A (zh) | 在单个白箱实现中实现使用相关安全性设置 | |
| CN105184115A (zh) | 用于将隐式完整性或可信性检查包括到白箱实现中的方法 | |
| EP3477889B1 (en) | Using white-box in a leakage-resilient primitive | |
| CN105022937A (zh) | 用于将白箱实现紧附到周围程序的接口兼容方式 | |
| US9025765B2 (en) | Data security | |
| EP2960891B1 (en) | Method for introducing dependence of white-box implementationon a set of strings | |
| CN105978680A (zh) | 在白盒实现方案中实现填充 | |
| CN105281893B (zh) | 用于引入白箱实现对串集合的依赖性的方法 | |
| CN105721134A (zh) | 使用带有多个外部编码的单个白盒实现 | |
| Sahila et al. | Secure digital image watermarking by using SVD and AES | |
| CN105024808A (zh) | 无需改变密钥的安全性补丁 | |
| EP2940919B1 (en) | Realizing authorization via incorrect functional behavior of a white-box implementation | |
| Ngom et al. | Stationary Wavelet Transform Based Watermarking for Telemedicine Image Security | |
| WO2007031894A2 (en) | Improved cryptographic method and system | |
| Nayak et al. | A Scrutiny of AES-Based Image Encryption and Decryption for Fraudulent Data Security and Defense Against Intrusion Attacks |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| C06 | Publication | ||
| PB01 | Publication | ||
| C10 | Entry into substantive examination | ||
| SE01 | Entry into force of request for substantive examination | ||
| ASS | Succession or assignment of patent right |
Owner name: YEDETO CO., LTD. Free format text: FORMER OWNER: KONINKLIJKE PHILIPS ELECTRONICS N.V. Effective date: 20100402 |
|
| C41 | Transfer of patent application or patent right or utility model | ||
| COR | Change of bibliographic data |
Free format text: CORRECT: ADDRESS; FROM: EINDHOVEN, NETHERLANDS TO: HOOFDDORP, NETHERLAND |
|
| TA01 | Transfer of patent application right |
Effective date of registration: 20100402 Address after: Holland Hoofddorp Applicant after: Irdeto B.V. Address before: Holland Ian Deho Finn Applicant before: Koninklijke Philips Electronics N.V. |
|
| REG | Reference to a national code |
Ref country code: HK Ref legal event code: DE Ref document number: 1138449 Country of ref document: HK |
|
| C53 | Correction of patent of invention or patent application | ||
| CB02 | Change of applicant information |
Address after: Holland Hoofddorp Applicant after: Irdeto Corporate B. V. Address before: Holland Hoofddorp Applicant before: Irdeto B.V. |
|
| COR | Change of bibliographic data |
Free format text: CORRECT: APPLICANT; FROM: IRDETO B.V. TO: IRDETO BV |
|
| ASS | Succession or assignment of patent right |
Owner name: IRDETO B.V. Free format text: FORMER OWNER: IRDETO BV Effective date: 20150108 |
|
| C41 | Transfer of patent application or patent right or utility model | ||
| TA01 | Transfer of patent application right |
Effective date of registration: 20150108 Address after: Holland Hoofddorp Applicant after: Irdeto B.V. Address before: Holland Hoofddorp Applicant before: Irdeto Corporate B. V. |
|
| C53 | Correction of patent of invention or patent application | ||
| CB02 | Change of applicant information |
Address after: Holland Hoofddorp Applicant after: Ai Dide Technology Co., Ltd. Address before: Holland Hoofddorp Applicant before: Irdeto B.V. |
|
| COR | Change of bibliographic data |
Free format text: CORRECT: APPLICANT; FROM: IRDETO B.V. TO: IRDETO B. V. Free format text: CORRECT: ADDRESS; FROM: |
|
| REG | Reference to a national code |
Ref country code: HK Ref legal event code: WD Ref document number: 1138449 Country of ref document: HK |
|
| RJ01 | Rejection of invention patent application after publication |
Application publication date: 20091111 |
|
| RJ01 | Rejection of invention patent application after publication |