H04L2209/08

CMAC computation using white-box implementations with external encodings

A method for mapping an input message to a message authentication code (MAC) by a white-box implementation of a keyed cryptographic operation in a cryptographic system that includes using a white-box implementation of the block cipher in a MAC.

Virtual enigma cipher
10567157 · 2020-02-18 · ·

A virtual enigma cipher system is described herein that allows for symmetric encryption and decryption of data. During encryption, a plurality of wheels representing sequences of data are used to encrypt a message. The plurality of wheels includes at least one dynamic wheel, which is generated based on a password, and a plurality of static wheels. During encryption, the unencrypted message is iterated from beginning to end. During each step of iteration, the encrypted payload value for a particular position is determined by performing an exclusive or (XOR) operation between the value of the unencrypted message at the position, and the values of the wheels at their respective wheel pointer positions. The particular position is then incremented, as are the wheel pointer positions, and iteration continues until the entire unencrypted message has been encrypted as part of the encrypted payload. Padding data and the message length are appended to the encrypted payload. During decryption, the steps are reversed.

SYSTEM AND METHOD FOR INFORMATION PROTECTION
20200051361 · 2020-02-13 ·

A computer-implemented method comprises: committing a transaction amount t of a transaction with a commitment scheme to obtain a transaction commitment value T, the commitment scheme comprising at least a transaction blinding factor r_t; encrypting a combination of the transaction blinding factor r_t and the transaction amount t with a public key PK_B of a recipient of the transaction; and transmitting the transaction commitment value T and the encrypted combination to a recipient node associated with the recipient for the recipient node to verify the transaction.

BLOCK COMPUTING FOR INFORMATION SILO
20200044834 · 2020-02-06 · ·

Systems and method for applying security measures to data sets requiring external quantum-level processing. Specifically, segmenting a data set into a plurality of data blocks/segments, such that each data block is communicated to different external entities for subsequent quantum-level computing processing of the data blocks. Once the data blocks have been quantum-level processed by the external entities and returned to the data provider/owner, the data blocks are combined to re-form the data set.

Secure Data Transmission Using Natural Language
20200044850 · 2020-02-06 ·

Methods, systems, and apparatus, including computer programs encoded on computer storage media, for secure data transmission using natural language. One of the methods includes: obtaining sensitive information for a user; obtaining a natural language key for the user, wherein the natural language key for the user includes one or more natural language tokens; generating decoding data for the sensitive information for the user, wherein generating the decoding data comprises: for each place in the sensitive information for the user: assigning a respective one of the natural language tokens in the natural language key for the user to the value at the place, and generating one or more respective dummy natural language tokens for each value of the respective set of possible values for the place other than the value at the place; and providing the decoding data for use in decoding the natural language key into the sensitive information.

ELLIPTIC CURVE CRYPTOGRAPHY SCHEME WITH SIMPLE SIDE-CHANNEL ATTACK COUNTERMEASURE
20200044817 · 2020-02-06 ·

There is provided an elliptic curve cryptographic scheme for permitting secure communications between two or more cryptographic correspondent devices, with a simple side-channel attack countermeasure. The cryptographic scheme includes: transforming a point to Jacobian projective coordinates; constant-time scalar multiplication of the point by a parameter; and transforming the resultant of the scalar multiplication to affine coordinates. The scalar multiplication including: performing iteratively to the value of the parameter either one of: doubling of the point and multiplying any two random field elements; or mixed addition of the point.

Apparatus Providing Uncorrelated Noise Masking
20200043458 · 2020-02-06 ·

In accordance with some embodiments, an apparatus for privacy protection is provided. The apparatus includes a random number generator providing a random number sequence. The apparatus also includes a key generator operable to receive the random number sequence and synthesize the random number sequence to generate a plurality of keys. The apparatus also includes a plurality of randomizing chains, each receiving a corresponding key from the key generator and providing a respective discrete random number sequence based on the corresponding key. The apparatus further includes output devices, each of which is connected to a respective randomizing chain to receive the respective discrete random number sequence and produces a respective output noise signal based on a function of the respective discrete random number sequence. The apparatus also includes interfaces mating the output devices with the input devices of a second device.

Cryptographic key production from a physical unclonable function

Some embodiments are directed to an electronic cryptographic device configured to determine a cryptographic key. The cryptographic device has a physically unclonable function, a debiasing unit, and a key reconstruction unit. The PUF is configured to produce a first noisy bit string during an enrollment phase and a second noisy bit string during a reconstruction phase. The debiasing unit (120) is configured to determine debiasing data from the first noisy bit string during the enrollment phase. The debiasing data marks bits in the first noisy bit string as retained or discarded. The key reconstruction unit is configured to determine the cryptographic key from bits in the second noisy bit string marked as retained by the debiasing data, the cryptographic key being independent from bits in the second noisy bit string marked as discarded by the debiasing data.

Method for Smart Contract Data Input through a Proof-of-Work Consensus Mechanism
20200034571 · 2020-01-30 ·

System and method for placing cryptographically secure data in a network comprising a public ledger, including associating a transaction inserting data in said network with a cryptographically secure transaction.

The invention is an oracle schema that implements a mineable proof of work (POW) competition to eliminate reliance on trusted third parties for access to off chain data. Users engage in a POW competition to find a nonce which satisfies the requirement of the challenge. The users who find a nonce which correctly solves the POW puzzle input data for the POW Oracle contract and receive native tokens in exchange for their work. The oracle data submissions are stored in the smart contract for use by other on-chain operations

Protection against relay attacks in a white-box implementation

A method is provided for performing a cryptographic operation in a white-box implementation on a mobile device. The cryptographic operation is performed in the mobile device for a response to a challenge from a mobile device reader. The mobile device reader includes a time-out period within which the cryptographic operation must be completed by the mobile device. In accordance with an embodiment, a first time period to complete the cryptographic operation on the mobile device is determined. A predetermined number of dummy computations are added to the cryptographic operation to increase the first time period to a second time period. The second time period is only slightly less than the time-out period by a predetermined safety value to make it less likely a relay attack with be successful.