Method for protecting a source of entropy used in countermeasures securing a white-box cryptographic algorithm

    公开(公告)号:US11336429B2

    公开(公告)日:2022-05-17

    申请号:US16766878

    申请日:2018-11-28

    IPC分类号: H04L9/06 H04L9/00

    摘要: The present invention relates to a method for a secure execution of a whitebox cryptographic algorithm applied to a message (m) and protected by countermeasures based on pseudo-random values, comprising the steps of: executing a pseudo-random function (PRP) generating pseudo-random output values and an encrypted main output value based on an encrypted input value (*Xi*) derived from said message, securing said cryptographic algorithm by applying to the cryptographic algorithm said countermeasures based on said generated pseudo-random output values retrieving, from said generated encrypted main output value, the input value or part of the input value, under an encrypted form (*Xi*), executing said secured cryptographic algorithm on said encrypted retrieved value.

    Anti cloning for white box protected data

    公开(公告)号:US11604857B2

    公开(公告)日:2023-03-14

    申请号:US17266930

    申请日:2019-07-16

    摘要: Protection of a data file to be used by a white-box cryptography software application installed in memory of a device to prevent the malevolent use of a digital copy of the data file by a white-box cryptography (WBC) software application installed in memory of another device. The mechanism includes extracting an unique identifier for the device from the environment of the device and modifying data in the data file according to the unique identifier, the available white-box cryptography software application includes a software security layer to retrieve the unique identifier from the environment of the device in which the software application is installed and to use this unique identifier in combination with the stored data file when executing, the result of the execution being correct only in case where the correct unique identifier has been extracted by the executed WBC software application.

    Consensus protocol for permissioned ledgers

    公开(公告)号:US11362836B2

    公开(公告)日:2022-06-14

    申请号:US16633879

    申请日:2018-07-17

    发明人: Aline Gouget

    IPC分类号: H04L9/32 G06F21/60 H04L9/08

    摘要: The present invention relates to a method for reaching a consensus for appending, at a current round (j), a new block of data to a permissioned ledger distributed through a network comprising network connected devices authorized by the ledger, called nodes, said method being performed by a tamper-proof computing device configured for managing securely digital keys and comprising a random number generator and a cryptoprocessor for generating signatures with said keys, and comprising, for a set of transactions to be validated, the steps of: receiving, from at least a first node (Nk), a candidate block (Bj,Nk) computed by said first node on transactions among said set of transactions, for each received candidate block, generating a random value by the random number generator, and generating a signed selection message comprising: an identifier of the current round (j), said received candidate block (Bj,Nk) and said generated random value by said cryptoprocessor, broadcasting said signed selection messages to the nodes of said network, enabling them to select the new block (Bj) to be appended to the ledger for the current round based on said random values comprised in said signed selection messages.

    Method of RSA signature of decryption protected using assymetric multiplicative splitting

    公开(公告)号:US11063743B2

    公开(公告)日:2021-07-13

    申请号:US16495320

    申请日:2018-03-20

    发明人: Aline Gouget

    摘要: Secure generation of an RSA signature of a message to be signed with a private exponent component d of an RSA key (p, q, N, d, e), by obtaining a hashed message, said hashed message being computed by hashing said message with a public hash function H:{0,1}*→Z*N, generating a first part of the RSA signature from said hashed message and said first private exponent component share, generating a second part of the RSA signature from said first part of the RSA signature and said second private exponent component share, determining the RSA signature from said second part of the RSA signature, and wherein the step of generation of a part of the RSA signature from the smaller private exponent component share among the first and second private exponent component shares is performed using a whitebox protection method and the step of generation of a part of the RSA signature from the bigger private exponent component share among the first and second private exponent component shares is performed using lower security requirements.

    Cryptography device having improved security against side-channel attacks

    公开(公告)号:US11201725B2

    公开(公告)日:2021-12-14

    申请号:US16768683

    申请日:2018-11-30

    IPC分类号: H04L9/00 H04L9/08

    摘要: Secure cryptography operations on a white-box cryptography device. Receiving a first message. Receiving a cryptographic key encrypted using a homomorphic encryption scheme. Performing a cryptographic operation, e.g., decryption or digital signature, using the encrypted cryptographic key. Performing a homorphically encrypted tracer calculation that traces the performance of the cryptography operations on the white-box cryptography device thereby allowing verification that all steps of the cryptography operation has been performed without external manipulation. Performing a key-exchange operation. Decrypting the key-exchange output using an alternate cryptographic key stored on the cryptographic device.