System and method for protecting computer software from a...

Cryptography – Key management – Having particular key generator

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C726S026000, C713S194000, C713S164000, C713S167000, C713S189000, C713S193000

Reexamination Certificate

active

07809135

ABSTRACT:
Methods and systems related to increasing the cryptographic security of keys used by software with cryptographic functions. This is done by increasing the mathematical complexity of the software. The components and functions used by the software are first determined and, using these components, functions, and the data exchanged between them, the software is made more resistant to analysis. The methods used in increasing analytical resistance are grouped into 3 general types: adjusting the information exchanged between the components, replacing some components with different but related components, and adjusting the data flow between the components.

REFERENCES:
patent: 5892899 (1999-04-01), Aucsmith et al.
patent: 6192475 (2001-02-01), Wallace
patent: 6668325 (2003-12-01), Collberg et al.
patent: 7073072 (2006-07-01), Salle
patent: 7162031 (2007-01-01), Roelofsen et al.
patent: 7171693 (2007-01-01), Tucker et al.
patent: 7631292 (2009-12-01), Chen
patent: 2005/0002532 (2005-01-01), Zhou et al.
patent: 2005/0223361 (2005-10-01), Belbute
patent: 2005/0240591 (2005-10-01), Marceau et al.
patent: 2006/0048230 (2006-03-01), Hameau et al.
patent: 0981223 (2000-02-01), None
patent: 99/01815 (1999-01-01), None
patent: 02/046890 (2002-06-01), None
Goubin et al, DES and Differential Power Analysis The “Duplication” Method, LNCS 1717, 1999, pp. 158-172.
Daemen et al., “Efficient Block Ciphers for Smartcards”, Usenix Workshop on Smartcard Technology, Chicago, Illinois, May 1-11, 1999.
Daemen et al., “Bitslice Ciphers and Power Analysis Attacks”, 2000.
Coron et al., “On Boolean and Arithmetic Masking against Differential Power Analysis”, 2000, pp. 1-11.
Chow et al., “A White-Box DES Implementation for DRM Applications”, Pre-Proceedings for ACS DRM-2002 Workshop, Oct. 14, 2002, pp. 1-16.
Billet et al., “Cryptanalysis of a White Box AES Implementation”, Selected Areas in Cryptography Conference SAC 2004.
Kocher et al., “Introduction to Differential Power Analysis and Related Attacks”, www.cryptography.com/dpa/technical, 1998.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

System and method for protecting computer software from a... does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with System and method for protecting computer software from a..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and System and method for protecting computer software from a... will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-4163115

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.