Patent classifications
H04L2209/043
Encryption device, encryption method, decryption device and decryption method
There is provided an encryption device to suppress calculation in the reverse direction in whitebox model encryption. The encryption device includes: having a predetermined relationship that outputs a plurality of output values according to a plurality of input values configured of plain text, with a part of the plurality of output values being inputted to a trapdoor one-way function, the predetermined relationship being defined by the output values that are not inputted to the trapdoor one-way function and one arbitrary input value of the plurality of input values; and having a property of encrypting a part of the plurality of output values according to the trapdoor one-way function, and the trapdoor one-way function not being able to decrypt encrypted data in a state in which a trapdoor is unknown.
White box AES implementation
A processor device with a white-box masked implementation of the cryptographic algorithm AES implemented thereon, which comprises a SubBytes transformation. The white-box masked implementation is hardened in that white-box round input values x′ are supplied at the round input of rounds instead of the round input values x, said white-box round input values being formed from a concatenation of: (i) the round input values x that are masked by means of the invertible masking mapping A and (ii) obfuscation values y that are likewise masked with the invertible masking mapping A; wherein from the white-box round input values x′ only the (i) round input values x are fed to the SubBytes transformation T, and (ii) the masked obfuscation values y are not.
SYSTEM AND METHOD FOR MANAGING AND SECURING A DISTRIBUTED LEDGER FOR A DECENTRALIZED PEER-TO-PEER NETWORK
The present disclosure relates to a method and system for managing and securing a distributed ledger for a decentralized peer-to-peer (p2p) network. The method receives an encrypted block and a group key generated by at least one peer node on the p2p network, wherein each peer node is IoT device and determines a virtual device block in a device chain on verifying the unique device ID, and address of a corresponding event chain associated with the virtual device block. Further, the method generates a transaction ID for a new transaction using the unique ID of the virtual device block and determines a valid event block in the event chain associated with the virtual device block for storing the new transaction and associated transaction ID. Further, the method updates the distributed ledger with the valid event block upon verification by one or more peer IoT devices of the p2p network.
SENDING AND RECEIVING MESSAGES
The present disclosure relates to the exchange of information between a message sending device and a message receiving device with message authentication and proposes to reduce the time required for message authentication by pre-computing a message tag, such as a MAC, and subsequently replacing the computation of the MAC when the tag is to be validated (or indeed also on sending) by a table look-up. The approach requires a set of messages and works particularly well for small sets of messages, for example as small as two or three messages, or less than five or ten messages. The approach finds particular application in control networks where control decisions have to be taken quickly and securely, for example in the control of a vehicle, for example an autonomous vehicle, or the control of a smart electricity grid.
Data conversion systems and methods
In various embodiments, a computer-readable memory medium coupled to a processor is disclosed. The memory medium is configured to store instructions which cause the processor to retrieve a seed value, receive a digital bit stream, generate a stream of random bits, using the seed value as a seed to a pseudo random number generator (PRNG), wherein the stream of random bits contains at least as many bits as the digital bit stream, shuffle bits of the stream of random bits to create a random bit buffer, generate an obfuscated digital bit stream by applying a first exclusive OR (XOR) to the digital bit stream and the random bit buffer, wherein the obfuscated digital bit stream has the same number of bits as the digital bit stream, and provide the obfuscated digital bit stream to the communications interface.
System and method for managing and securing a distributed ledger for a decentralized peer-to-peer network
The present disclosure relates to a method and system for managing and securing a distributed ledger for a decentralized peer-to-peer (p2p) network. The method receives an encrypted block and a group key generated by at least one peer node on the p2p network, wherein each peer node is IoT device and determines a virtual device block in a device chain on verifying the unique device ID, and address of a corresponding event chain associated with the virtual device block. Further, the method generates a transaction ID for a new transaction using the unique ID of the virtual device block and determines a valid event block in the event chain associated with the virtual device block for storing the new transaction and associated transaction ID. Further, the method updates the distributed ledger with the valid event block upon verification by one or more peer IoT devices of the p2p network.
Metadata access in a dispersed storage network
A method begins by a processing module dispersed storage error encoding a data segment to produce a set of encoded data slices and dispersed storage error encoding metadata associated with the data segment to produce a set of encoded metadata slices. The method continues with the processing module creating a set of data slice names for the set of encoded data slices and creating a set of metadata slice names based on the set of data slice names. The method continues with the processing module sending the set of encoded data slices and the set of data slice names to a dispersed storage network (DSN) memory for storage therein. The method continues with the processing module sending the set of encoded metadata slices and the set of metadata slice names to the DSN memory for storage therein.
METHOD TO SECURE A SOFTWARE CODE PERFORMING ACCESSES TO LOOK-UP TABLES
The present invention relates to a method of securing by a first processor of a securing device, a software code performing, when executed by an execution device, a sensitive operation performing accesses to a plurality of look-up tables (T.sub.0, T.sub.1, . . . T.sub.n), wherein said software code comprises first sequences of instructions performing said accesses, said method comprising the steps of: a) generating (S1) a packed table (T) gathering said look-up tables (T.sub.0, T.sub.1, . . . T.sub.n), b) applying (S2) a permutation (P) to said packed table (T) to obtain a permuted table (T.sub.p), c) replacing (S3) in the software code (SC) at least one of said first sequences of instructions, which when executed at runtime by a second processor of said execution device performs an access to a target value (X) located at a first index (i) in a first look-up table among said plurality of look-up tables by a new sequence of instructions which: a c1) determines using said permutation (P) a permuted index (i.sub.p) of the target value (X) in the permuted table, c2) returns the value memorized at the permuted index in said permuted table (T.sub.p).
System and method for managing and securing a distributed ledger for a decentralized peer-to-peer network
The present disclosure relates to a method and system for managing and securing a distributed ledger for a decentralized peer-to-peer (p2p) network. The method receives an encrypted block and a group key generated by at least one peer node on the p2p network, wherein each peer node is IoT device and determines a virtual device block in a device chain on verifying the unique device ID, and address of a corresponding event chain associated with the virtual device block. Further, the method generates a transaction ID for a new transaction using the unique ID of the virtual device block and determines a valid event block in the event chain associated with the virtual device block for storing the new transaction and associated transaction ID. Further, the method updates the distributed ledger with the valid event block upon verification by one or more peer IoT devices of the p2p network.
DATA MASKING FRAMEWORK FOR INFORMATION PROCESSING SYSTEM
Techniques for improved masking data in an information processing system are provided. For example, a method comprises generating a data masking configuration file for use in an information processing system to mask at least a portion of a given data set, wherein the generation of the data masking configuration file further comprises attaching a masking algorithm function selected from a plurality of defined masking algorithm functions to each data element of the given data set to be masked.