Cryptographic system
First Claim
Patent Images
1. A method comprising:
- selecting a cryptographic algorithm for which a white-box implementation is not known; and
configuring a computer processor to provide a white-box implementation of a cryptographic system that implements the selected cryptographic algorithm, said configuring comprising configuring the computer processor to execute one or more instructions that cause the computer processor to perform;
a white-box implementation of a function, wherein the white-box implementation of the function is configured for accessing data identifying at least one of a device and a user to obtain identification data, and establishing an outcome of the function in dependence on the identification data;
an implementation of the selected cryptographic algorithm;
an implementation of a combining operation for establishing cryptographically processed data in dependence on a single outcome of the function and in dependence on a plurality of outcomes of the cryptographic algorithm, the combining operation comprising combining the plurality of outcomes of the cryptographic algorithm with the single outcome of the function; and
an implementation of a signal generator for generating a signal comprising a representation of an outcome of the combining operation.
3 Assignments
0 Petitions
Accused Products
Abstract
A cryptographic system comprises a white-box implementation of a function; an implementation of a cryptographic algorithm; and an implementation of a combining operation for establishing cryptographically processed data in dependence on an outcome of the function and in dependence on an outcome of the cryptographic algorithm. The combining operation comprises combining an outcome of the cryptographic algorithm with an outcome of the function. Alternatively, the combining operation comprises combining an outcome of the function with a received data element to obtain a combination outcome and applying the cryptographic algorithm to the combination outcome.
-
Citations
15 Claims
-
1. A method comprising:
-
selecting a cryptographic algorithm for which a white-box implementation is not known; and configuring a computer processor to provide a white-box implementation of a cryptographic system that implements the selected cryptographic algorithm, said configuring comprising configuring the computer processor to execute one or more instructions that cause the computer processor to perform; a white-box implementation of a function, wherein the white-box implementation of the function is configured for accessing data identifying at least one of a device and a user to obtain identification data, and establishing an outcome of the function in dependence on the identification data; an implementation of the selected cryptographic algorithm; an implementation of a combining operation for establishing cryptographically processed data in dependence on a single outcome of the function and in dependence on a plurality of outcomes of the cryptographic algorithm, the combining operation comprising combining the plurality of outcomes of the cryptographic algorithm with the single outcome of the function; and an implementation of a signal generator for generating a signal comprising a representation of an outcome of the combining operation. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A method of cryptographic processing, which is implemented by a computer, comprising:
-
applying a function to a first value by a white-box implementation of the function, wherein the applying the function to the first value by the white-box implementation comprises accessing data identifying at least one of a device and a user to obtain identification data, and establishing an outcome of the function in dependence on the identification data; applying a cryptographic algorithm to a second value; applying a combining operation for establishing cryptographically processed data in dependence on a single outcome of the function and in dependence on a plurality of outcomes of the cryptographic algorithm, wherein the applying the combining operation comprises combining the plurality of outcomes of the cryptographic algorithm with the single outcome of the function; and generating a signal comprising a representation of an outcome of the combining operation. - View Dependent Claims (10, 11, 12, 13)
-
-
14. An non-transitory computer readable recording medium having recorded thereon a computer program comprising instructions for causing a processor to perform a method of cryptographic processing, the method comprising:
-
applying a function to a first value by a white-box implementation of the function, wherein the applying the function to the first value by the white-box implementation comprises accessing data identifying at least one of a device and a user to obtain identification data, and establishing an outcome of the function in dependence on the identification data; applying a cryptographic algorithm to a second value; applying a combining operation for establishing cryptographically processed data in dependence on a single outcome of the function and in dependence on a plurality of outcomes of the cryptographic algorithm, wherein the applying the combining operation comprises combining the plurality of outcomes of the cryptographic algorithm with the single outcome of the function; and generating a signal comprising a representation of an outcome of the combining operation.
-
-
15. A system arranged comprising a hardware processor arranged to perform a method of cryptographic processing, the method comprising:
-
applying a function to a first value by a white-box implementation of the function, wherein the applying the function to the first value by the white-box implementation comprises accessing data identifying at least one of a device and a user to obtain identification data, and establishing an outcome of the function in dependence on the identification data; applying a cryptographic algorithm to a second value; applying a combining operation for establishing cryptographically processed data in dependence on a single Outcome of the function and in dependence on a plurality of outcomes of the cryptographic algorithm, wherein the applying the combining operation comprises combining the plurality of outcomes of the cryptographic algorithm with the single outcome of the functions; and generating a signal comprising a representation of an outcome of the combining operation.
-
Specification