Cryptography – Key management – Having particular key generator
Reexamination Certificate
2004-12-27
2010-10-05
Chen, Shin-Hon (Department: 2431)
Cryptography
Key management
Having particular key generator
C726S026000, C713S194000, C713S164000, C713S167000, C713S189000, C713S193000
Reexamination Certificate
active
07809135
ABSTRACT:
Methods and systems related to increasing the cryptographic security of keys used by software with cryptographic functions. This is done by increasing the mathematical complexity of the software. The components and functions used by the software are first determined and, using these components, functions, and the data exchanged between them, the software is made more resistant to analysis. The methods used in increasing analytical resistance are grouped into 3 general types: adjusting the information exchanged between the components, replacing some components with different but related components, and adjusting the data flow between the components.
REFERENCES:
patent: 5892899 (1999-04-01), Aucsmith et al.
patent: 6192475 (2001-02-01), Wallace
patent: 6668325 (2003-12-01), Collberg et al.
patent: 7073072 (2006-07-01), Salle
patent: 7162031 (2007-01-01), Roelofsen et al.
patent: 7171693 (2007-01-01), Tucker et al.
patent: 7631292 (2009-12-01), Chen
patent: 2005/0002532 (2005-01-01), Zhou et al.
patent: 2005/0223361 (2005-10-01), Belbute
patent: 2005/0240591 (2005-10-01), Marceau et al.
patent: 2006/0048230 (2006-03-01), Hameau et al.
patent: 0981223 (2000-02-01), None
patent: 99/01815 (1999-01-01), None
patent: 02/046890 (2002-06-01), None
Goubin et al, DES and Differential Power Analysis The “Duplication” Method, LNCS 1717, 1999, pp. 158-172.
Daemen et al., “Efficient Block Ciphers for Smartcards”, Usenix Workshop on Smartcard Technology, Chicago, Illinois, May 1-11, 1999.
Daemen et al., “Bitslice Ciphers and Power Analysis Attacks”, 2000.
Coron et al., “On Boolean and Arithmetic Masking against Differential Power Analysis”, 2000, pp. 1-11.
Chow et al., “A White-Box DES Implementation for DRM Applications”, Pre-Proceedings for ACS DRM-2002 Workshop, Oct. 14, 2002, pp. 1-16.
Billet et al., “Cryptanalysis of a White Box AES Implementation”, Selected Areas in Cryptography Conference SAC 2004.
Kocher et al., “Introduction to Differential Power Analysis and Related Attacks”, www.cryptography.com/dpa/technical, 1998.
Eisen Philip A.
Johnson Harold J.
Borden Ladner Gervais LLP
Chen Shin-Hon
Cloakware Corporation
Kinsman Leslie A.
LandOfFree
System and method for protecting computer software from a... does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with System and method for protecting computer software from a..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and System and method for protecting computer software from a... will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-4163115