-
公开(公告)号:US20230269065A1
公开(公告)日:2023-08-24
申请号:US18173569
申请日:2023-02-23
申请人: FortifyIQ, Inc.
发明人: Yaacov Belenky , Ury Kreimer , Alexander Kesler
CPC分类号: H04L9/002 , G06F21/577 , G06F2221/033
摘要: In a general aspect, a method for testing vulnerability of a cryptographic function (CF) to a side-channel attack includes providing a plurality of input values to the function, where the CF, for each input value calculates a sum of the input value and a first value of the CF, and replaces a second value of the CF with the sum. The method further includes measuring a set of samples including a respective side-channel leakage sample for each input value. The method also includes iteratively performing a series of operations including splitting the set of samples into a plurality of subsets based on the input values, calculating a respective value for each subset based on samples of the subset, and comparing the respective values for different subsets to discover respective bit values of the first value and the second value from their least significant bits to most significant bits.
-
公开(公告)号:US12132817B2
公开(公告)日:2024-10-29
申请号:US17861445
申请日:2022-07-11
申请人: FORTIFYIQ, INC.
发明人: Ury Kreimer , Alexander Kesler , Vadim Bugaenko , Yaacov Belenky
CPC分类号: H04L9/003 , H04L9/0618 , H04L9/0643 , H04L2209/04
摘要: A method of improving performance of a data processor comprising: in a field of characteristic 2 computing XY by performing a series of: (i) multiplications of two different elements of the field; and (ii) raising an element of the field to a power Z wherein Z is a power of 2; wherein the number of multiplications (i) is at least two less than the number of ones (1s) in the binary representation of Y.
-
公开(公告)号:US20240089086A1
公开(公告)日:2024-03-14
申请号:US18461206
申请日:2023-09-05
申请人: FortifyIQ, Inc.
发明人: Ury Kreimer , Yaacov Belenky , Alexander Kesler
CPC分类号: H04L9/0631 , G06F17/16 , H04L9/002
摘要: Techniques include replacing many of the functions used in finite-field-based arithmetic with lookup tables (LUTs) and combining such LUTs with redundancy-based protection. Advantageously, using LUTs makes it possible to dramatically decrease the redundancy level (e.g., from d=8 to d=3 or 4) and the power consumption and increase the maximal frequency, while preserving the same protection level, latency and performance. The improvement is applicable not only to AES, but also to other algorithms based on a finite field arithmetic, and in particular SM4, ARIA, and Camellia which use Sboxes very similar to or the same as the AES Sbox.
-
公开(公告)号:US11995191B2
公开(公告)日:2024-05-28
申请号:US17444832
申请日:2021-08-11
申请人: FortifyIQ, Inc.
发明人: Yaacov Belenky , Ury Kreimer , Alexander Kesler
CPC分类号: G06F21/577 , H04L9/0643 , G06F2221/034
摘要: A method for testing an HMAC implementation for vulnerability to a side-channel attack can include mounting a template attack. The attack can include generating, based on first side-channel leakage information associated with execution of a hash function of the HMAC implementation, a plurality of template tables. Each template table can correspond, respectively, with a subset of bit positions of an internal state of the hash function. The attack can further include generating, based on second side-channel leakage information, a plurality of hypotheses for an internal state of an invocation of the hash function based on a secret key. The method can further include generating, using the hash function, respective hash values generated from each of the plurality of hypotheses and a message. The method can also include comparing each of the respective hash values with a hash value generated using the secret key to determine vulnerability of the HMAC implementation.
-
公开(公告)号:US11418317B2
公开(公告)日:2022-08-16
申请号:US17422884
申请日:2020-01-16
申请人: FORTIFYIQ, INC.
发明人: Ury Kreimer , Alexander Kesler , Vadim Bugaenko , Yaacov Belenky
摘要: A semiconductor intellectual property (IP) core comprising a transformation engine designed and configured to represent each element of a field GF(28) using a polynomial of degree no higher than 7+d, where d>0 is a redundancy parameter. Also disclosed in the specification are several other IP cores and several different methods.
-
公开(公告)号:US20220414227A1
公开(公告)日:2022-12-29
申请号:US17444832
申请日:2021-08-11
申请人: FortifyIQ, Inc.
发明人: Yaacov Belenky , Ury Kreimer , Alexander Kesler
摘要: A method for testing an HMAC implementation for vulnerability to a side-channel attack can include mounting a template attack. The attack can include generating, based on first side-channel leakage information associated with execution of a hash function of the HMAC implementation, a plurality of template tables. Each template table can correspond, respectively, with a subset of bit positions of an internal state of the hash function. The attack can further include generating, based on second side-channel leakage information, a plurality of hypotheses for an internal state of an invocation of the hash function based on a secret key. The method can further include generating, using the hash function, respective hash values generated from each of the plurality of hypotheses and a message. The method can also include comparing each of the respective hash values with a hash value generated using the secret key to determine vulnerability of the HMAC implementation.
-
-
-
-
-