Browse Prior Art Database

Methods & Techniques for Protecting WDE/block-cipher Software from Massively Parallel Systems

IP.com Disclosure Number: IPCOM000249800D
Publication Date: 2017-Apr-06
Document File: 3 page(s) / 63K

Publishing Venue

The IP.com Prior Art Database

Related People

Vipul Goel: INVENTOR

Abstract

1)This invention solves the problem of brute-force attacks on WDE software by randomizing the start-point in huge sequences of data to make it resistant to massively parallel brute-force attacks. 2)This invention will also make it harder to break WDE encryption in case of some weakness-or-flaws found in the encryption algorithm at a later stage, because target encrypted data is not fixed. 3)This invention will also increase the mathematical burden for brute-force attacks.

This text was extracted from a PDF file.
This is the abbreviated version, containing approximately 54% of the total text.

Copyright © 2017 Symantec Corporation. All rights reserved. 1

Methods & Techniques for Protecting

WDE/block-cipher Software from

Massively Parallel Systems

Vipul Goel

Symantec Corporation

Abstract

1) This invention solves the problem of brute-force attacks on WDE software by randomizing the start-

point in huge sequences of data to make it resistant to massively parallel brute-force attacks.

2) This invention will also make it harder to break WDE encryption in case of some weakness-or-flaws

found in the encryption algorithm at a later stage, because target encrypted data is not fixed.

3) This invention will also increase the mathematical burden for brute-force attacks.

Copyright © 2017 Symantec Corporation. All rights reserved. 2

Copyright © 2017 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. For a full list of Symantec trademarks, please visit http://www.symantec.com/about/profile/policies/trademarks/currentlist.jsp Any Symantec products described in this document are distributed under licenses restricting their use, copying, distribution, and decompilation/reverse engineering. No part of this document may be reproduced in any form by any means without prior written authorization of Symantec Corporation and its licensors, if any. THE DOCUMENTATION IS PROVIDED “AS IS” AND ALL EXPRESS OR IMPLIED CONDITIONS, REPRESENTATIONS AND WARRANTIES, INCLUDING ANY IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE OR NON-INFRINGEMENT, ARE DISCLAIMED, EXCEPT TO THE EXTENT THAT SUCH DISCLAIMERS ARE HELD TO BE LEGALLY INVALID. SYMANTEC CORPORATION SHALL NOT BE LIABLE FOR INCIDENTAL OR CONSEQUENTIAL DAMAGES IN CONNECTION WITH THE FURNISHING, PERFORMANCE, OR USE OF THIS DOCUMENTATION. THE INFORMATION CONTAINED IN THIS DOCUMENTATION IS SUBJECT TO CHANGE WITHOUT NOTICE.

Symantec Corporation

35...