Method for encrypting or decrypting a n-tuple of data with a n-tuple of predetermined secret keys

Information

  • Patent Grant
  • 10897345
  • Patent Number
    10,897,345
  • Date Filed
    Tuesday, January 9, 2018
    6 years ago
  • Date Issued
    Tuesday, January 19, 2021
    3 years ago
  • Inventors
  • Original Assignees
    • IDEMIA IDENTITY & SECURITY FRANCE
  • Examiners
    • Leung; Robert B
    Agents
    • Womble Bond Dickinson (US) LLP
Abstract
A method for encrypting or decrypting a n-tuple of data ({ai}i∈[[0,n-1]]) with a n-tuple of secret keys ({ki}i∈[[0,n-1]]). The method uses a data-processor to perform the steps of: (a) for each element (ai), determining m>n first internal states ({yij}j∈[[0,m-1]]) by application of m first operations, each: represented by a table (Tij), and defined as the combination of a single bijective internal encoding (Gij), of a non-linear sharing function (Di, Ei, Fi . . . ), and of a given non-linear permutation function (ƒ) parameterized with the secret key (ki), and (b) for each n-tuple of first internal states ({yij}i∈[[0,n-1]]), determining a second internal state (zj) by application of a second operation: represented by a table (TLj), and defined as the combination of a second single bijective internal encoding (GLj), a linear multiplexing function (L), and the inverses of the first bijective internal encodings (Gij).
Description
GENERAL TECHNICAL FIELD

The present invention relates to the field of cryptography, and in particular an encryption/decryption method of “white box” type.


PRIOR ART

A function is considered as a “black box” when there can be no access to its internal operation, i.e. its inputs and outputs can be known but not its secret parameters or its intermediate states.


Cryptographic algorithms (for example for encryption or signature) are thus conventionally supposed as black boxes when their reliability is evaluated (resistance to attacks).


For example, in the case of typical cryptographic algorithms such as DES (“Data Encryption Standard”) or AES (“Advanced Encryption Standard”), these work on blocks of size 64 or 128 bits (and tomorrow 256 bits), but in a single operation cannot process such a block (there are already over 1019 possible values of blocks of 64 bits). It is necessary to work inside a block on smaller elements, typically of size 8 bits (only 256 possibilities) by chaining non-linear (bijective) operations with linear (non-injective) operations.


In reference to FIG. 1a, these algorithms can be illustrated in a highly simplified way by the formula a0, a1→L (ƒ(a0+k0), ƒ(a1+k1)), where f designates a non-linear operation, for example on 8 bits, L designates a linear function (for example a XOR, “eXclusive OR”) in the example transforming two words of 8 bits of a block into one word of 8 bits, a0 and a1 are bytes of text to be encrypted and k0 and k1 are secret data (the “keys” of the algorithm). Said formula is applied iteratively to process the whole block.


The hypothesis of black box in this case supposes that the data k0 and k1 or the intermediate states ƒ(a0+k0) and ƒ(a1+k1) are inaccessible.


This hypothesis imposes a major restriction on the storage and handling of these parameters. But tools have recently been published to enable automation of attacks on hardware implementation, so-called side channel or fault attacks.


Today, for many cases of use including payment on mobile, it is necessary to deploy cryptographic algorithms by making as few assumptions as possible on the security of the target hardware. Secure storage and handling of secret parameters must be ensured at the application level.


The cryptography known as white box aims to respond to this challenge by proposing implementations of cryptographic algorithms which are supposed to make extraction of secrets impossible, even in case of attack allowing the attacker full access to the software implementation of the algorithm. More exactly, a function is considered as a “white box” when its mechanisms are visible and enable understanding of its operation. In other terms, the direct assumption is made that the attacker has access to everything he wants (the binary is completely visible and modifiable by the attacker who has complete control of the operation platform). Consequently, implementation itself is the sole line of defence.


To protect implantation of a pattern such as described earlier, it has first been proposed to merge keys k0 and k1 with the function ƒ by representing computations by tables. For the example studied, in reference to FIG. 1b, this comes down to storing in memory (e.g. ROM or Flash) three tables T0, T1 and TL representing respectively the functions a0→T0[a0]=ƒ(a0+k0), a1→T1[a1]=ƒ(a1+k1) and (y0, y1)→TL[y0, y1]L(y0, y1)=z.


This ploy avoids having the keys in the clear, but is not enough to resist an attack consisting of exhaustively testing all possible keys k0 (respectively k1) to the point of finding the one which verifies y0=ƒ(a0+k0) (respectively y1=ƒ(a1+k1)).


It has been proposed to “mask” the internal states which are masked by random permutations G0, G1, G2 (unknown but constant) called internal encodings. More precisely, as shown by FIG. 1c, this produces the internal states G0[y0] and G1[y1], from which the keys cannot be retrieved by directly testing all possibilities. Using the linear function G2 o TL o (G0−1, G1−1) gives G2 o TL o (G0−1 o G0 [y0], G1−1 o G1[y1])=G2∘TL [y0, y1]=G2 [z].


But attacks have shown that patterns such as above could still be attacked when the encoding was linear by exploiting the correlation between the encoded datum and the sensitive datum (i.e. yi or z in the example above), cf. the article “Differential Computation Analysis: Hiding Your White-Box Designs is Not Enough” at CHES2016.


This pattern is also sensitive to other attacks known as collision attacks which exploit the non-injective character of linear transformations (here TL) to build algebraic relations giving information on the key (the pair (k0, k1) in the example above), cf. the article “Cryptanalysis of a White Box AES Implementation” published at SAC2004.


More precisely, couples of pairs can be found (a0, ai) and (a′0, a′1) such as G2 ∘TL [ƒ(a0+k0), ƒ(a1+k1)]=G2∘TL [ƒ(a′0+k0), ƒ(a′1+k1)], i.e. TL [ƒ (a0+k1), ƒ(a1+k1)]=TL [ƒ(a′0+k0), ƒ(a′1+k1)] to make of the non-injective character of TL. Random permutations are thus eliminated and if there are enough couples, the values of keys k0, k1, can again be exhaustively tested which is long though feasible.


Applications EP2924677, EP2922234 and EP2996278 have consequently proposed a breakdown of internal states into a sum of fragments “splits”, so as to execute the non-linear function fragment by fragment. For this, a linear sharing function Di(y) for splitting y, is used and the random permutations at G00, G10, GL0, G01, G11, GL1 corresponding to one or the other of the fragments are duplicated.


However, this pattern remains sensitive to some attacks, in particular by collision: assuming the computations are simpler than TL is the eXclusive OR function, “XOR”, which does not diminish the generality of the idea since any linear function can decompose into a succession of XORs and scalar products with constants, if for given z, the set custom characterz of pairs (x0, x1) is built such that z=GL0∘(D0(y0)+D1(y1)), then for each pair (x0, x1) ∈custom characterz, D0(y0)+cz=D1(y1), i.e. y1=D1−1(D0(y0)+cz) can be posed.


This builds the function φ{circumflex over (k)}0,{circumflex over (k)}10→ŷ1 (where ŷ0, ŷ1 are the pairs associated with all the (x0, x1) ∈custom characterz, for any pair of keys {circumflex over (k)}0, {circumflex over (k)}1), whereof it can be shown that the case ({circumflex over (k)}0, {circumflex over (k)}1)=(k0, k1) is distinguishable, which goes back to the keys. In fact, in the right example, the function φ{circumflex over (k)}0, {circumflex over (k)}1 is a linear function (or affine) whereas it is not when ({circumflex over (k)}0, {circumflex over (k)}1)≠(k0, k1).


As a consequence, it would be preferable to have a novel solution of “white box” encryption using standard mechanisms such as DES and AES which is completely resistant to all known attacks (by channel analysis, by collision, etc.).


PRESENTATION OF THE INVENTION

According to a first aspect, the present invention relates to a method for encrypting or decrypting a n-tuple of data with a n-tuple of predetermined secret keys, n≥2, for a given non-linear permutation function and a given linear multiplexing function, the method being characterized in that it comprises data-processing means of equipment implementing steps of:

    • (a) For each element of said n-tuple of data, determination of m>n first internal states by application to said element of first operations, each being:
      • represented by a table stored on data-storage means of the equipment, and
      • defined as the combination of a single bijective internal encoding, of a non-linear sharing function, and of the non-linear permutation function parameterized with the corresponding secret key, said non-linear sharing functions forming n collections such that the m functions of a collection share any input datum in m fragments whereof the sum is equal to the input datum;
      • all of said first internal states determined for all said elements forming n-tuples of internal states;
    • (b) For each n-tuple of first internal states, determination of a second internal state by application to said internal states of the n-tuple of first internal states of a second operation being:
      • represented by a table stored on the data-storage means of the equipment, and
      • defined as the combination of a second single bijective internal encoding, of the linear multiplexing function, and of the inverses of said first bijective internal encodings.


According to other advantageous and non-limiting features:

    • ∀i ∈[[0, n-1]], yi0=Ti0[ai]=Gi0 ∘Di ∘ƒ(ai+ki), yi1=Ti1[ai]=Gi1 ∘Ei ∘ƒ(ai+ki), yi2=Ti2 [ai]=Gi2 ∘Fi ∘ƒ(ai+ki), etc.;
    • zj=TLj [y0j, y1j . . . ]=GLj ∘L(G0j−1 [y0j], G1j−1[y1j] . . . );
    • ∀i ∈[[0,n-1]], ∀x,x=Di(x)+Ei(x)+Fi(x)+ . . . ;
    • The method comprises a previous step (a) for random generation by data-processing means of a server connected to the equipment of m−1 non-linear sharing functions for each collection, from which the m-th non-linear sharing function is built;
    • step (a0) further comprises random generation of internal encodings, construction of tables, and their transmission to the equipment for storage on the storage means;
    • repetition of steps (a) and (b) so as to encrypt or decrypt a set of data comprising those of said n-tuple;
    • the method further comprises a determination step (c) of the encrypted/decrypted of said n-tuple of data by application to said second internal states of a third operation being:
      • represented by a table stored on the data-storage means of the equipment, and
      • defined as the sum of the inverses of said second bijective internal encodings.







z
=



T
z



[


{

z
j

}


j




0
,

m
-
1






]


=




j
=
0


m
-
1





G
Lj

-
1




[

z
j

]





;






    • n=2;

    • said linear multiplexing function is the eXclusive OR function;

    • m=3;

    • each element of said n-tuple of data has a size of one byte or of one half-byte;

    • said non-linear permutation function is that of a cryptographic algorithm selected from DES and AES.





According to a second and a third aspect, the invention proposes a computer program product comprising code instructions for executing a method according to the first aspect for encrypting or decrypting a n-tuple of data with a n-tuple of predetermined secret keys; and storage means legible by computer equipment on which a computer program product comprises code instructions for executing a method according to the first aspect for encrypting or decrypting a n-tuple of data with a n-tuple of predetermined secret keys.





PRESENTATION OF THE FIGURES

Other features and advantages of the present invention will become more apparent upon reading the following description of a preferred embodiment. This description will be given in reference to the appended drawings, in which:



FIGS. 1a-1c illustrate three known cryptographic algorithms;



FIG. 2 is a diagram of architecture for implementing the method according to the invention;



FIG. 3 illustrates an embodiment of a cryptographic algorithm in accordance with the method of the invention.





DETAILED DESCRIPTION

Architecture


In reference to FIG. 2, a method for “white box” encryption or decryption is proposed, implemented within equipment 10a such as a mobile terminal (smartphone, touch tablet, etc.), i.e. equipment having no particular secure hardware and which can be the object of attacks on hardware implementation, and for which the white box approach takes all interest.


The equipment 10a comprises data-processing means 11a (a processor) and data-storage means 12a (a memory, for example flash).


The equipment 10a is for example connected to a server 10b for example via the internet network 20. It can be led to receive tables (to be described later) from this server 10b (for example that of a provider of security solutions), containing secrets which will be stored in the memory 12a and used to implement the present method.


The equipment 10a can in turn be connected to other third-party servers 10c with whom it could exchange data encrypted by means of the present method.


Cryptographic Method


The present method is a cryptographic “encryption or decryption” method, meaning that according to the case it encrypts data or decrypts them. It is of symmetrical or “secret key” type.


It is understood that the present method is a novel implementation of known algorithms such as DES or AES which are the current standards. More precisely, it is not a novel encryption strategy but only a new way of handling data within the algorithm which is resistant to all “white box” hardware attacks.


According to a classic pattern, it processes data block by block, and within a block, it manipulates elements of smaller size, for example 16 elements of one byte for 128 bits block (such as AES for example). These elements are manipulated n by n, with n≥2, and advantageously n=2.


So, the present method encrypts or decrypts a n-tuple of data {ai}i∈[[0,n-1]] with a n-tuple of predetermined secret keys {ki}i∈[[0,n-1]]. In the rest of the description, it will be assumed that n=2 (i.e. there is a pair of elements a0, a1 and a pair of keys k0, k1), but the skilled person can transpose the method to other higher values of n.


Each element ai of said n-tuple of data {ai}i∈[[0,n-1]] has a value in a space {0; 1}k to be noted custom character2k and advantageously has a size of one byte (a “byte” of 8 bits, i.e. k=8), but a size of one half-byte (a “nibble” of 4 bits, i.e. k=4) or even 6 bits could be taken for example. The preferred example of one byte will be taken in the rest of the description.


To process a complete block from smaller elements, it is necessary to multiply the operations within the block, and for this the present method classically combines the use of a non-linear permutation function ƒ (step (a) as will be seen), and the use of a linear multiplexing function L (step (b) as will be seen), each datum as a function of the cryptographic algorithm to be implemented.


The permutation function ƒ is a bijective function parameterized with a secret key ki which takes as input an input element of custom character2k and generates at output an output element of the same size (i.e. of custom character2k). These functions are well known and that of any cryptographic algorithm could be used in particular using permutations, in particular an algorithm selected from DES and AES (the function ƒ is then for example a box S).


“Multiplexing” function means a function taking as input several elements of custom character2k (in particular n) and generating at output a single element of custom character2k. Thus, the multiplexing function combines several elements of custom character2k. These functions are well known and the commonly used eXclusive OR function could be used in particular (in particular in AES), noted XOR and more simply +.


It is understood that ƒ is non-linear and that L is linear.


The algorithm typically comprises alternating a stage of use of ƒ to permutate elements, then a stage of use of L for merging data, until the whole block has been processed (merged data are again permutated, then merged with other data, etc.). It is understood that the present method advantageously comprises the repetition of steps (a) and (b) so as to encrypt or decrypt a set of data comprising those of said n-tuple {ai}i∈[[0,n-1]].


In the rest of the present description, the illustrative example of the general pattern a0, a1→z=L (ƒ(a0+k0), ƒ(a1+k1)) as found in FIGS. 1a to 1c will be taken, but the skilled person will be able to transpose it to other algorithmic structures.


It should be noted that for computations more complex than those described in the present examples, it can be interesting to use decomposition in the form of sequences of linear operations and multiplications. In this case, ideas continue to apply in combination with the works of Rivain-Prouff (“Provably Secure Higher-Order Masking of AES” CHES 2010) and Ishai-Sahai-Wagner (“Private Circuits: Securing Hardware against Probing Attacks” at CRYPTO 2003).


Permutation Step


The present method is implemented by the data-processing means 11a of the equipment 10a.


To counter attacks of the prior art, the present method proposes as shown in FIG. 3 sharing of all the internal states of the computation in at least m>n parts (in particular n+1 parts), that is, at least 3 parts if n=2 (the preferred example of 3 parts in the present description will be taken), and operating computations on these parts independently so as to find sharing of the final result ultimately expected of the computations, with non-linear sharing functions. Therefore, and as will be seen later, even though the prior art can dissuade use of sharing functions, the Applicant has discovered that the fact of using them sufficiently and selecting them non-linear astutely resolves all flaws.


As explained, the first step (a) is called permutation, and will use the function ƒ but not the function L.


In this step (a), for each element ai of said n-tuple of data {ai}i∈[[0,n-1]] (i.e. ∀i ∈[[0, n-1]]), “first internal states” {yij}j∈[[0,m-1]] are determined (belonging as elements ai to custom character2k, and to the number of m) by application to said element ai of m “first operations”. The first internal states are visible in the hypothesis of white box and must therefore be unusable for obtaining information on the secret keys.


Each first operation for this is:

    • represented by a table Tijj stored on data-storage means 12a of the equipment 10a (so as to protect implantation of the pattern and hide the keys), and
    • defined as the combination of a single bijective internal encoding Gij, of a non-linear sharing function Di, Ei, Fi . . . , and of the non-linear permutation function ƒ parameterized with the corresponding secret key ki, said non-linear sharing functions Di, Ei, Fi . . . forming n collections {(Di, Ei, Fi . . . )}i∈[[0,n-1]] such that the m functions of a collection share any input datum in m fragments whereof the sum is equal to the input datum.


Therefore, typically there is:

yi0=Ti0[ai]=Gi0∘Di∘ƒ(ai+ki)=Gi0∘Di(yi),
yi1=Ti1[ai]=Gi1∘Ei∘ƒ(ai+ki)=Gi1∘Ei(y1),
yi2=Ti2[ai]=Gi2∘Fi∘ƒ(ai+ki)=Gi2∘Fi(yi),


etc.


More precisely, the idea of non-linear sharing is to build functions Di, Ei, Fi . . . such as ∀i ∈[[0, n-1]], ∀x,x=Di(x)+Ei(x)+Fi(x)+ . . . . It is assumed that m=3, that is, three families Di, Ei, Fi suffice, and therefore 6 functions if n=2. The Gij serve as internal encoding while the Di, Ei and Fi serve to share a secret.


Therefore, each “non-masked” internal value yi=ƒ(ai+ki), which is a sensitive datum, can be rebuilt only from Di(yi), Ei(yi) and Fi(yi).


Ei and Fi can be selected randomly from all functions (not just bijective) operating on elements of preferred size, in particular bytes, but not Di, which is linked to the others.


The method preferably comprises a previous step (a0) of random generation by the data-processing means 11b of a server 10b connected to the equipment 10a of m−1 non-linear sharing functions Ei, Fi . . . for each collection (Di, Ei, Fi . . . ), from which the m-th non-linear sharing function Di is built (by posing for example Di(y)=yi+Ei(y)+Fi(y)+ . . . for any element y).


As explained, all Gij are bijective masking encodings (of custom character2k in custom character2k), selected randomly once for all, in particular by the server 10b.


In this way and as preferred, step (a0) further comprises random generation of internal encodings Gij (and as will be seen GLj), construction of tables Tij, and as will be seen TLj), and their transmission to the equipment 10a for storage on the storage means 12a. In the preferred embodiment there are m× n first internal encodings Gij and their inverses, and m second internal encodings GLj and their inverses. In total, (m−1)+(m×n)+m=(n+2)m−1 functions of custom character2k in custom character2k must be generated randomly.


On completion of step (a) (when it has been implemented n times for all ai), there is a set (in this case m×n) of said first internal states yij. So m n-tuples can be formed from first internal states {{yij}i∈[[0,n-1]]}j∈[[0,m-1]].


Multiplexing Step


The second step (b) is called multiplexing, and uses the function L to combine the first internal states yij.


In this step (b), for each n-tuple of first internal states {yij}i∈[[0,n-1]] (i.e. ∀j ∈[[0,m−1]]) a (single) “second internal state” zj is determined (still in custom character2k) by application to said internal states yij of the n-tuple of first internal states {yij}i∈[[0,n-1]] of a “second operation”.


As before, the second internal states are visible in the hypothesis of white box and therefore must be unusable for obtaining information on the first internal states and the secret keys.


Each second operation for this is:

    • represented by a table TLj stored on the data-storage means 12a of the equipment 10a (again so as to protect implantation of the pattern), and
    • defined as the combination of a second single bijective internal encoding GLj, of the linear multiplexing function L, and of the inverses of said first bijective internal encodings Gij.


Therefore, this typically gives: zj=TLj[y0j, y1j . . . ]=GLj ∘L(G0j−1[y0j], G1j−1[y1j] . . . ).


n by n will be cross-combined as evident in FIG. 3, the first internal states such that the non-masked value of z=TL[y0, y1, . . . ] which is another sensitive datum can again be rebuilt from all the Di(yi), Ei(yi) and Fi(yi). The GLj again serve as internal encoding while the Di, Ei and Fi serve to share a secret.


Explanation


The encrypted/decrypted z of said n-tuple of data {ai}i∈[[0,n-1]] can easily be retrieved from m second internal states {zj}j∈[[0,m-1]].


If needed, it is sufficient to apply to them in a step (c) a “third operation” which is:

    • represented by a table Tz stored on the data-storage means 12a of the equipment 10a, and
    • defined as the sum of the inverses of said second bijective internal encodings GLj.


Therefore, this typically gives:






z
=



T
z



[


{

z
j

}


j




0
,

m
-
1






]


=




j
=
0


m
-
1






G
Lj

-
1




[

z
j

]


.







Yet, because n<m, each zj contains insufficient information for rebuilding to obtain a relation linking the yi, an attack by collision therefore becomes impossible.


To illustrate this in the case n=2 and m=3, for any pair of octets (a, b), there is ∀j ∈{0; 1; 2}, TLj(a, b)=GLj (L(G0j−1(a), G1j−1(b))), that is, TL0(a, b)=GL0 (L(G00−1 (a), G10−1(b))), TL1(a, b)=GL1(L(G01−1(a), G11−1(b))) and TL2(a, b)=GL2(L(G02−1(a), G12−1(b))).


It can be verified that by linearity of L and by construction, there is TL0(T00 [a0], T10 [a1])=GL0(L(G00−1(G00 o D0[y0]), G10−1 (G10 o D1[y1])))=GL0(L(D0[y0], D1[y1]));

  • TL1(T01[a0], T11[a1])=GL1(L(G01−1(G01 o E0[y0]), G11−1 (G11 o E1[y1])))=GL1(L(E0[y0], E1[y1]));
  • TL2(T02[a0], T12[a1])=GL2 (L(G02−1 (G02 o F0[y0]), G12−1 (G12 o F1[y1])))=GL2(L(F0[y0], F1 [y1]));


That is ∀j∈{0; 1; 2}, TLj (T0j[a0], T1j[a1])=GLj (L(G0j−1[y0j], G1j−1[y1j])). This suggests that the GLj for j=0,1,2 form encoding of a share of the datum TL[y0, y1] described in FIG. 1c.


And z=GL0−1[z0]+GL1−1[z1]+GL2−1[z2]=GL0−1 o GL0(L(D0[y0], D1[y1]))+GL1−1 o GL1(L(E0[y0], E1[y1]))+GL2−1 o GL2(L(F0[y0], F1[y1]))=L(D0[a0], D1[a1])+L(E0[y0], E1[y1])+L(F0 [y0], F1[y1])=L(D0[y0]+E0[y0]+F0[y0], D1[y1]+E1[y1]+F1[y1])=L(y0, y1)=L(ƒ(x0+k0), ƒ(y0+k1)).


The present breakdown therefore easily achieves its objective, specifically enabling encryption or decryption of elements and obtaining only internal states which cannot be exploited to recover the secret keys.


Computer Program Product


According to a second and a third aspects, the invention relates to a computer program product comprising code instructions for executing (in particular on the data-processing means 11a of the equipment 10a) a method according to the first aspect of the invention for encrypting or decrypting a n-tuple of data {ai}i∈[[0,n-1]] with a n-tuple of predetermined secret keys {ki}i∈[[0,n-1]], as well as storage means legible by computer equipment (a memory 12a of the equipment 10a) hosting this computer program product.

Claims
  • 1. A method for encrypting or decrypting a n-tuple of data ({ai}i∈[[0,n-1]]) with a n-tuple of predetermined secret keys ({ki}i∈[[0,n-1]]), n≥2, for a given non-linear permutation function (ƒ) and a given linear multiplexing function (L), the method being characterized in that it comprises a data processor (11a) of equipment (10a) implementing steps of: (a) For each element (ai) of said n-tuple of data ({ai}i∈[[0,n-1]]), determination of m>n first internal states ({yij}j∈[[0,m-1]]) by application to said element (ai) of m first operations, each being: represented by a table (Tij) stored on a memory (12a) of the equipment (10a), anddefined as the combination of a single bijective internal encoding (Gij), of a non-linear sharing function (Di, Ei, Fi . . . ), and of the non-linear permutation function (ƒ) parameterized with the corresponding secret key (ki), said non-linear sharing functions (Di, Ei, Fi . . . ) forming n collections ({(Di, Ei, Fi . . . )}i∈[[0,n-1]]) such that the m functions of a collection share any input datum in m fragments whereof the sum is equal to the input datum, with ∀i∈[[0, n-1]], ∀x, x=Di(x)+Ei(x)+Fi(x)+ . . . ;all of said first internal states yij; determined for all said elements (ai) forming m n-tuples of internal states ({{yij}i∈[[0,n-1]]}j∈[[0,m-1]]);(b) For each n-tuple of first internal states ({yij}i∈[[0,n-1]]), determination of a second internal state (zj) by application to said internal states (yij) of the n-tuple of first internal states ({yij}i∈[[0,n-1]]) of a second operation being: represented by a table (TLj) stored on the memory (12a) of the equipment (10a), anddefined as the combination of a second single bijective internal encoding (GLj), of the linear multiplexing function (L), and of the inverses of said first bijective internal encodings (Gij).
  • 2. The method according to claim 1, wherein ∀i∈[[0, n-1]], yi0=Ti0([ai]=Gi0 ∘Di∘ƒ(ai+ki), yi1=Ti1[ai]=Gi1 ∘Ei∘ƒ(ai+ki), yi2=Ti2 [ai]=Gi2 ∘Fi∘ƒ(ai+ki), etc.
  • 3. The method according to claim 2, wherein zj=TLj[y0j, y1j . . . ]=GLj∘L(G0j−1[y0j], G1j−1[y1j] . . . ).
  • 4. The method according to claim 1, comprising prior to said step (a) random generation by a data processor (11b) of a server (10b) connected to the equipment (1a) of m−1 non-linear sharing functions (Ei, Fi . . . ) for each collection (Di, Ei, Fi . . . ), from which the m-th non-linear sharing function (Di) is built.
  • 5. The method according to claim 4, wherein said random generation further comprises random generation of internal encodings (Gij, GLj), construction of tables (Tij, TLj), and their transmission to the equipment (10a) for storage on the memory (12a).
  • 6. The method according to claim 1, comprising the repetition of said steps (a) and (b) so as to encrypt or decrypt a set of data comprising those of said n-tuple ({ai}i∈[[0,n-1]]).
  • 7. The method according to claim 1, further comprising a determination step (c) of the encrypted/decrypted (z) of said n-tuple of data ({ai}i∈[[0,n-1]]) by application to said second internal states ({zj}j∈[[0,m-1]]) of a third operation being: represented by a table (Tz) stored on the storage (12a) of the equipment (10a), anddefined as the sum of the inverses of said second bijective internal encodings (GLj).
  • 8. The method according to claim 7, wherein
  • 9. The method according to claim 1, wherein n=2.
  • 10. The method according to claim 9, wherein said linear multiplexing function (L) is the eXclusive OR function.
  • 11. The method according to claim 1, wherein m=3.
  • 12. The method according to claim 1, wherein each element (ai) of said n-tuple of data ({ai}i∈[[0,n-1]]) has a size of one byte or of one half-byte.
  • 13. The method according to claim 1, wherein said non-linear permutation function (ƒ) is that of a cryptographic algorithm selected from DES and AES.
  • 14. A non-transitory computer readable medium on which is stored a computer program product including code instructions for executing a method for encryption or decryption of a n-tuple of data ({ai}i∈[[0,n-1]]) with a n-tuple of predetermined secret keys ({ki}i∈[[0,n-1]]) comprising: (a) For each element (ai) of said n-tuple of data ({ai}i∈[[0,n-1]]), determination of m>n first internal states ({yij}j∈[[0,m-1]]) by application to said element (ai) of m first operations, each being: represented by a table (Tij) stored on a memory (12a) of the equipment (10a), anddefined as the combination of a single bijective internal encoding (Gij), of a non-linear sharing function (Di, Ei, Fi . . . ), and of the non-linear permutation function (ƒ) parameterized with the corresponding secret key (ki), said non-linear sharing functions (D_i, E_i, F_i . . . ) forming n collections ({(D_i, E_i, F_i . . . )}_(i ∈[[0, n-1]])) such that the m functions of a collection share any input datum in m fragments whereof the sum is equal to the input datum, with ∀i ∈[[0, n-1]], ∀x, x=Di(x)+Ei(x)+Fi(x)+ . . . ;all of said first internal states yij determined for all said elements (ai) forming m n-tuples of internal states ({{yij}i∈[[0,n-1]]}j∈[[0,m-1]]);(b) For each n-tuple of first internal states ({yij}i∈[[0,n-1]]), determination of a second internal state (zj) by application to said internal states (yij) of the n-tuple of first internal states ({yij}i∈[[0,n-1]]) of a second operation being: represented by a table (TLj) stored on the memory (12a) of the equipment (10a), anddefined as the combination of a second single bijective internal encoding (GLj), of the linear multiplexing function (L), and of the inverses of said first bijective internal encodings (Gij).
Priority Claims (1)
Number Date Country Kind
17 50215 Jan 2017 FR national
US Referenced Citations (5)
Number Name Date Kind
20100299515 Michiels et al. Nov 2010 A1
20120045050 Farrugia et al. Feb 2012 A1
20150270949 Michiels Sep 2015 A1
20150270950 Michiels Sep 2015 A1
20160330019 Michiels Nov 2016 A1
Foreign Referenced Citations (3)
Number Date Country
2922234 Sep 2015 EP
2924677 Sep 2015 EP
2996278 Mar 2016 EP
Non-Patent Literature Citations (10)
Entry
Chow et al., “White-Box Cryptography and an AES implementation”, SAC, pp. 1-18. (Year: 2002).
Billet O., Gilbert H., Ech-Chatbi C. (2004) Cryptanalysis of a White Box AES Implementation. In: Handschuh H., Hasan M.A. (eds) Selected Areas in Cryptography. SAC 2004. Lecture Notes in Computer Science, vol. 3357. Springer, Berlin, Heidelberg (Year: 2004).
(AES) Federal Information Processing Standards. Nov. 26, 2001. doi:10.6028/NIST.FIPS.197. 197. (Year: 2001).
(DES) Federal Information Processing Standards. Oct. 25, 1999. NIST.FIPS.46-3 (Year: 1999).
S. Dziembowski and K. Pietrzak, “Leakage-Resilient Cryptography,” 2008 49th Annual IEEE Symposium on Foundations of Computer Science, Philadelphia, PA, 2008, pp. 293-302, doi: 10.1109/FOCS.2008.56. (Year: 2008).
Rivain et al., “Provably Secure Higher-Order Masking of AES”, Cryptographic Hardware and Embedded Systems, CHES 2010, 12th International Workshop, Santa Barbara, CA, USA, Aug. 17-20, 2010, 20 pages.
Preliminary Research Report received for French Application No. 1750215, dated Oct. 26, 2017, 4 pages (1 page of French Translation Cover Sheet and 3 pages of original document).
Ishai et al., “Private Circuits: Securing Hardware against Probing Attacks”, Annual International Cryptology Conference, Advances in Cryptology, CRYPTO 2003, pp. 462-479.
European Search Report and Written Opinion received for EP Patent Application No. 18305016.0, dated May 8, 2018, 5 pages of Original Document Only.
Chow et al., “Selected Areas in Cryptography, White-Box Cryptography and an AES Implementation”, Selected Areas in Cryptography, 9th Annual International Workshop, SAC 2002, Lecture Notes in Computer Science, vol. 2595, pp. 250-270.
Related Publications (1)
Number Date Country
20180198611 A1 Jul 2018 US