Predicate |
Object |
assignee |
http://rdf.ncbi.nlm.nih.gov/pubchem/patentassignee/MD5_35398726ac7f92470e7099fa9ce91924 http://rdf.ncbi.nlm.nih.gov/pubchem/patentassignee/MD5_f8dcd4bd52e518e31e7517cfd8f6c881 http://rdf.ncbi.nlm.nih.gov/pubchem/patentassignee/MD5_da58c3211f340c0cf87de7d676e9d3ee |
classificationCPCAdditional |
http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04L2209-16 |
classificationCPCInventive |
http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04L9-0841 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G06F7-72 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G06F7-58 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04L9-3066 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04L9-0869 |
classificationIPCInventive |
http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/G06F21-00 http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/H04L9-30 http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/G06F7-58 http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/G06F7-72 |
filingDate |
2012-02-09-04:00^^<http://www.w3.org/2001/XMLSchema#date> |
inventor |
http://rdf.ncbi.nlm.nih.gov/pubchem/patentinventor/MD5_20aac7a6b32f74ff6efa6c5328458a65 http://rdf.ncbi.nlm.nih.gov/pubchem/patentinventor/MD5_03cb9b8a9989c1fe8416122467b17acb |
publicationDate |
2013-08-15-04:00^^<http://www.w3.org/2001/XMLSchema#date> |
publicationNumber |
WO-2013116916-A1 |
titleOfInvention |
System and method for generating and protecting cryptographic keys |
abstract |
In the present disclosure, implementations of Diffie-Hellman key agreement are provided that, when embodied in software, resist extraction of cryptographically sensitive parameters during software execution by white-box attackers. Four embodiments are taught that make extraction of sensitive parameters difficult during the generation of the public key and the computation of the shared secret. The embodiments utilize transformed random numbers in the derivation of the public key and shared secret. The traditional attack model for Diffie-Hellman implementations considers only black-box attacks, where attackers analyze only the inputs and outputs of the implementation. In contrast, white-box attacks describe a much more powerful type of attacker who has total visibility into the software implementation as it is being executed. |
isCitedBy |
http://rdf.ncbi.nlm.nih.gov/pubchem/patent/WO-2016209939-A1 http://rdf.ncbi.nlm.nih.gov/pubchem/patent/EP-3493460-A1 http://rdf.ncbi.nlm.nih.gov/pubchem/patent/WO-2018167198-A1 http://rdf.ncbi.nlm.nih.gov/pubchem/patent/CN-110663215-A http://rdf.ncbi.nlm.nih.gov/pubchem/patent/US-11316671-B2 http://rdf.ncbi.nlm.nih.gov/pubchem/patent/EP-3376705-A1 http://rdf.ncbi.nlm.nih.gov/pubchem/patent/US-11290272-B2 http://rdf.ncbi.nlm.nih.gov/pubchem/patent/US-11394525-B2 http://rdf.ncbi.nlm.nih.gov/pubchem/patent/WO-2019106166-A1 http://rdf.ncbi.nlm.nih.gov/pubchem/patent/US-11201725-B2 |
priorityDate |
2012-02-09-04:00^^<http://www.w3.org/2001/XMLSchema#date> |
type |
http://data.epo.org/linked-data/def/patent/Publication |