Obscuring functions in computer software

G - Physics – 06 – F

Patent

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

G06F 12/14 (2006.01) G06F 1/00 (2006.01) G06F 21/00 (2006.01)

Patent

CA 2327911

In traditional black-box cryptography, the attacker knows the al- gorithm, but has no visibility into its execution. For white-box cryptography, we would have to hide the key when the attacker has total visibility into its software implementation and execution. (Many believe this impossible: we think there is progress but it needs more work.) This would open up a host of intriguing applications and would be likely to simplify many complex protocols. We suggest methods to make finding an encryption key harder (so far as we have yet discovered) than expected. Our purpose is similar to that of Auc- smith and Graunke's split encryption/decryption[1], but by somewhat different methods. We focus on symmetric block ciphers implemented by substitution boxes and linear transformations, with DES[2, 4] providing an example. We address efficiency only superficially, leaving full coverage for more work and a later paper. We have applied for patents on the methods we describe.

LandOfFree

Say what you really think

Search LandOfFree.com for Canadian inventors and patents. Rate them and share your experience with other people.

Rating

Obscuring functions in computer software does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Obscuring functions in computer software, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Obscuring functions in computer software will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFCA-PAI-O-1686283

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.