Patents by Inventor Hermann Drexler
Hermann Drexler has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 10805066Abstract: A processor device has an executable implementation of a cryptographic algorithm implemented thereon, which algorithm is adapted to produce an output text from an input text employing a secret key K. The implementation of the algorithm comprises a key-dependent computing step S which comprises a key combination of input values x derived directly or indirectly from the input text with key values SubK derived directly or indirectly from the key; the key-dependent computing step S is represented by a table which is masked with input masking and/or output masking to form a masked table TabSSubK; and a new masked table TabSKneu is generated in the processor device.Type: GrantFiled: December 7, 2016Date of Patent: October 13, 2020Assignee: GIESECKE + DEVRIENT MOBILE SECURITY GMBHInventors: Sven Bauer, Hermann Drexler, Jürgen Pulkus
-
Patent number: 10615962Abstract: A processor device has an executable implementation of the cryptographic algorithm DES implemented with an XOR linkage operation at the round exit and an implemented computation step S arranged to map expanded right input values r? as computation step entry values x=r? onto exit values s=S[x]. The computation step S is implemented as a key-dependent computation step further comprises a key linkage operation for linking input values of the round with key values of the round derived directly or indirectly from the key. The computation step S is implemented as a combined key-dependent computation step T which further comprises: a permutation operation P associated with the round, arranged to be applied to exit values s of the computation step S and to supply the exit values s of the computation step in permutated form to the XOR linkage operation at the round exit.Type: GrantFiled: October 28, 2016Date of Patent: April 7, 2020Assignee: GIESECKE+DEVRIENT MOBILE SECURITY GMBHInventors: Sven Bauer, Hermann Drexler, Jürgen Pulkus
-
Patent number: 10438513Abstract: The invention provides a processor device having an executable, white-box-masked implementation of a cryptographic algorithm implemented thereon. The white-box masking comprises an affine mapping A, which is so designed that every bit in the output values w of the affine mapping A depends on at least one bit of the obfuscation values y, thereby attaining that the output values w of the affine mapping A are statistically balanced.Type: GrantFiled: October 30, 2015Date of Patent: October 8, 2019Assignee: GIESECKE+DEVRIENT MOBILE SECURITY GMBHInventors: Hermann Drexler, Sven Bauer, Jürgen Pulkus
-
Patent number: 10431123Abstract: Methods are provided for testing and hardening software applications for the carrying out digital transactions which comprise a white-box implementation of a cryptographic algorithm. The method comprises the following steps: (a) feeding one plaintext of a plurality of plaintexts to the white-box implementation; (b) reading out and storing the contents of the at least one register of the processor stepwise while processing the machine commands of the white-box implementation stepwise; (c) repeating the steps (a) and (b) with a further plaintext of the plurality of plaintexts N-times; and (d) statistically evaluating the contents of the registers and the plaintexts, the intermediate results and/or the ciphertexts generated from the plaintexts by searching for correlations between the contents of the registers and the plaintexts, the intermediate results and/or the ciphertexts generated from the plaintexts to establish the secret key.Type: GrantFiled: November 9, 2015Date of Patent: October 1, 2019Assignee: GIESECKE+DEVRIENT MOBILE SECURITY GMBHInventors: Hermann Drexler, Sven Bauer
-
Patent number: 10403174Abstract: A processor device has an executable implementation of a cryptographic algorithm implemented thereon that is white-box-masked by a function f. The implementation comprises an implemented computation step S by which input values x are mapped to output values s=S[x], and which is masked to a white-box-masked computation step T? by means of an invertible function f. As a mapping f there is provided a combination (f=(c1, c2, . . . )*A) of an affine mapping A having an entry width BA and a number of one or several invertible mappings c1, c2, . . . having an entry width Bc1, Bc2, . . . respectively, wherein BA=Bc1+Bc2+ . . . . Output values w are generated altogether by the mapping f. The affine mapping A is constructed by a construction method coordinated with the invertible mappings c1, c2, and etc.Type: GrantFiled: October 30, 2015Date of Patent: September 3, 2019Assignee: GIESECKE+DEVRIENT MOBILE SECURITY GMBHInventors: Hermann Drexler, Sven Bauer, Jürgen Pulkus
-
Patent number: 10249220Abstract: A processor device has an executable implementation of a cryptographic algorithm implemented being white-box-masked by a function f. The implementation comprises an implemented computation step S by which input values x are mapped to output values s=S[x], and which is masked to a white-box-masked computation step T? by means of an invertible function f. As a mapping f there is provided a combination (f=(c1, c2, . . . )*A) of an affine mapping A having an entry width BA and a number of one or several invertible mappings c1, c2, . . . having an entry width Bc1, Bc2, . . . respectively, wherein BA=Bc1+Bc2+ . . . . Output values w are generated altogether by the mapping f. Multiplicities of sets Mxi, i=1, 2, . . . =Mx11, Mx12, . . . Mx21, Mx22, . . . are formed from the output values a of the affine mapping A.Type: GrantFiled: October 30, 2015Date of Patent: April 2, 2019Assignee: GIESECKE+DEVRIENT MOBILE SECURITY GMBHInventors: Hermann Drexler, Sven Bauer, Jürgen Pulkus
-
Publication number: 20180367297Abstract: A processor device has an executable implementation of a cryptographic algorithm implemented thereon, which algorithm is adapted to produce an output text from an input text employing a secret key K. The implementation of the algorithm comprises a key-dependent computing step S which comprises a key combination of input values x derived directly or indirectly from the input text with key values SubK derived directly or indirectly from the key; the key-dependent computing step S is represented by a table which is masked with input masking and/or output masking to form a masked table TabSSubK; and a new masked table TabSKneu is generated in the processor device.Type: ApplicationFiled: December 7, 2016Publication date: December 20, 2018Applicant: GIESECKE+DEVRIENT MOBILE SECURITY GMBHInventors: Sven BAUER, Hermann DREXLER, Jürgen PULKUS
-
Publication number: 20180309568Abstract: A processor device has an executable implementation of the cryptographic algorithm DES implemented with an XOR linkage operation at the round exit and an implemented computation step S arranged to map expanded right input values r? as computation step entry values x=r? onto exit values s=S[x]. The computation step S is implemented as a key-dependent computation step further comprises a key linkage operation for linking input values of the round with key values of the round derived directly or indirectly from the key. The computation step S is implemented as a combined key-dependent computation step T which further comprises: a permutation operation P associated with the round, arranged to be applied to exit values s of the computation step S and to supply the exit values s of the computation step in permutated form to the XOR linkage operation at the round exit.Type: ApplicationFiled: October 28, 2016Publication date: October 25, 2018Inventors: Sven BAUER, Hermann DREXLER, Jürgen PULKUS
-
Publication number: 20170352298Abstract: A processor device has an executable implementation of a cryptographic algorithm implemented being white-box-masked by a function f. The implementation comprises an implemented computation step S by which input values x are mapped to output values s=S[x], and which is masked to a white-box-masked computation step T? by means of an invertible function f. As a mapping f there is provided a combination (f=(c1, c2, . . . )*A) of an affine mapping A having an entry width BA and a number of one or several invertible mappings c1, c2, . . . having an entry width Bc1, Bc2, . . . respectively, wherein BA=Bc1+Bc2+ . . . . Output values w are generated altogether by the mapping f. Multiplicities of sets Mxi, i=1, 2, . . . =Mx11, Mx12, . . . Mx21, Mx22, . . . are formed from the output values a of the affine mapping A.Type: ApplicationFiled: October 30, 2015Publication date: December 7, 2017Applicant: GIESECKE & DEVRIENT GMBHInventors: Hermann DREXLER, Sven BAUER, Jürgen PULKUS
-
Publication number: 20170324543Abstract: The invention provides a processor device having an executable, white-box-masked implementation of a cryptographic algorithm implemented thereon. The white-box masking comprises an affine mapping A, which is so designed that every bit in the output values w of the affine mapping A depends on at least one bit of the obfuscation values y, thereby attaining that the output values w of the affine mapping A are statistically balanced.Type: ApplicationFiled: October 30, 2015Publication date: November 9, 2017Inventors: Hermann DREXLER, Sven BAUER, Jürgen PULKUS
-
Publication number: 20170324542Abstract: A processor device has an executable implementation of a cryptographic algorithm implemented thereon that is white-box-masked by a function f The implementation comprises an implemented computation step S by which input values x are mapped to output values s=S[x], and which is masked to a white-box-masked computation step T? by means of an invertible function f. As a mapping f there is provided a combination (f=(c1, c2, . . . )*A) of an affine mapping A having an entry width BA and a number of one or several invertible mappings c1, c2, . . . having an entry width Bc1, Bc2, . . . respectively, wherein BA=Bc1+Bc2+ . . . . Output values w are generated altogether by the mapping f. The affine mapping A is constructed by a construction method coordinated with the invertible mappings c1, c2, and etc.Type: ApplicationFiled: October 30, 2015Publication date: November 9, 2017Inventors: Hermann DREXLER, Sven BAUER, Jürgen PULKUS
-
Publication number: 20170324547Abstract: Methods are provided for testing and hardening software applications for the carrying out digital transactions which comprise a white-box implementation of a cryptographic algorithm. The method comprises the following steps: (a) feeding one plaintext of a plurality of plaintexts to the white-box implementation; (b) reading out and storing the contents of the at least one register of the processor stepwise while processing the machine commands of the white-box implementation stepwise; (c) repeating the steps (a) and (b) with a further plaintext of the plurality of plaintexts N-times; and (d) statistically evaluating the contents of the registers and the plaintexts, the intermediate results and/or the ciphertexts generated from the plaintexts by searching for correlations between the contents of the registers and the plaintexts, the intermediate results and/or the ciphertexts generated from the plaintexts to establish the secret key.Type: ApplicationFiled: November 9, 2015Publication date: November 9, 2017Applicant: GIESECKE & DEVRIENT GMBHInventors: Hermann DREXLER, Sven BAUER
-
Patent number: 9288038Abstract: The invention relates to a data carrier having a semiconductor chip. In order to prevent an attacker from determining secret data of the chip from intercepted signal patterns of the chip, security-relevant operations are performed only with commands or command strings of the operating program whose use does not permit the processed data to be inferred from the signal patterns.Type: GrantFiled: May 23, 2013Date of Patent: March 15, 2016Assignee: Giesecke & Devrient GmbHInventors: Harald Vater, Hermann Drexler, Eric Johnson
-
Publication number: 20130254559Abstract: The invention relates to a data carrier having a semiconductor chip. In order to prevent an attacker from determining secret data of the chip from intercepted signal patterns of the chip, security-relevant operations are performed only with commands or command strings of the operating program whose use does not permit the processed data to be inferred from the signal patterns.Type: ApplicationFiled: May 23, 2013Publication date: September 26, 2013Applicant: Giesecke & Devrient GmbHInventors: Harald VATER, Hermann DREXLER, Eric JOHNSON
-
Patent number: 8457302Abstract: The invention relates to a data carrier (1) having a semiconductor chip (5). In order to prevent an attacker from determining secret data of the chip (5) from intercepted signal patterns of the chip (5), security-relevant operations are performed only with commands or command strings of the operating program whose use does not permit the processed data to be inferred from the signal patterns.Type: GrantFiled: May 17, 1999Date of Patent: June 4, 2013Assignee: Giesecke & Devrient GmbHInventors: Harald Vater, Hermann Drexler, Eric Johnson
-
Patent number: 7983414Abstract: In a method for protected execution of a cryptographic calculation in which a key with at least two key parameters is drawn on, an integrity check of the key is performed, in order to prevent a cryptographic attack in which conclusions are drawn as to at least one second key parameter by corrupting at least one first key parameter. A further method serves to determine a key for a cryptographic calculation with at least two key parameters provided for use in the first-mentioned method. A computer program product and a portable data carrier have corresponding features. The methods enable particularly good protection of cryptographic calculations against attacks.Type: GrantFiled: September 9, 2003Date of Patent: July 19, 2011Assignee: Giesecke & Devrient GmbHInventors: Markus Bockes, Hermann Drexler, Helmut Kahl
-
Patent number: 7636438Abstract: The invention relates to a method for testing the authenticity of a data carrier (1) and/or an external device (2) which enters into data exchange with the data carrier (1). According to the invention, the data carrier (1) and the external device (2) are each equipped with a special additional apparatus (4, 6) for generating and/or testing authenticity data. Data transmission between the data carrier (1) and the external device (2) as required for authenticity testing is performed at least partly via a special transmission channel (B). The transmission channel (B) for transmitting authenticity data is separated physically or logically from a transmission channel (A) for transmitting standard data so that there is no mutual interference of data transmission via the two transmission channels (A, B).Type: GrantFiled: September 7, 1998Date of Patent: December 22, 2009Assignee: Giesecke & Devrient GmbHInventors: Michael Lamla, Hermann Drexler, Wolfgang Rankl, Franz Weikmann, Wolfgang Effing
-
Patent number: 7602916Abstract: The invention relates to a data carrier having a semiconductor chip (5) with at least one memory. The memory contains an operating program that is able to perform at least one operation (h). In order to prevent unauthorized access to the data (x) processed with the operation (h), both said data and the operation (h) itself are disguised. The disguising of the data (x) and the operation (h) is coordinated such that the disguised operation (hR1R, hR1R2) generates either the output data (y) of the undisguised operation (h) or disguised output data (y{circle around (x)}R2) from which the output data (y) can be determined.Type: GrantFiled: September 7, 1999Date of Patent: October 13, 2009Assignee: Giesecke & Devrient GmbHInventors: Harald Vater, Hermann Drexler
-
Patent number: 7447913Abstract: The invention relates to a data storage medium having a semiconductor chip which has at least one memory in which an operating program is stored which contains a number of commands, with each command producing signals which can be detected from outside the semiconductor chip. According to the invention the data storage medium is designed in order to split secret data, which is stored in the semiconductor chip in order to carry out security-relevant or safety-relevant operations or is generated by this semiconductor chip, into at least three data parts, with an arithmetic unit being included in order to calculate a random number and in order to divide the random number, with the first data part being the integer result of the division process, the second part being the remainder of the division process, and the third part being the random number itself.Type: GrantFiled: December 20, 2000Date of Patent: November 4, 2008Assignee: Giesecke & Devrient GmbHInventors: Hermann Drexler, Harald Vater
-
Patent number: 7441125Abstract: The invention relates to a data storage medium having a semiconductor chip which has at least one memory in which an operating program is stored which contains a number of commands, with each command producing signals which can be detected from outside the semiconductor chip. According to the invention, the data storage medium is designed such that data which is used more than once for a calculation process is scrambled using different functions.Type: GrantFiled: December 20, 2000Date of Patent: October 21, 2008Assignee: Giesecke & Devrient GmbHInventors: Hermann Drexler, Harald Vater