Abstract:
A distributed technique for implementing a cryptographic process performs operations in parallel on both valid and irrelevant data to prevent differentiation of the operations based on an encryption key content. A control entity switches or points valid data to appropriate CPU(s) that are responsible for operations such as squaring or multiplying. Irrelevant data is also switched or pointed to appropriate CPU(s) that execute operations in parallel with the CPU(s) operating on the valid data. The distributed technique contributes to obscuring side channel analysis phenomena from observation, such that cryptographic operations cannot easily be tied to the content of the encryption key.
Abstract:
An apparatus and method for configuring a wireless station for use within a wireless local area network are disclosed. In at least one exemplary embodiment, a pairwise master key is generated by the wireless station and an access point within the wireless local area network. The pairwise master key may be based, at least in part, on a transient identity key pair of the wireless station. The transient identity key pair may be generated by the wireless station in response to receiving a message from the access point. In some embodiments, a public transient identity key of the transient identity key pair may be provided to additional access points to enable the wireless station to authenticate with the additional access points.
Abstract:
A new enrollee device is configured for a communication network using an electronic device and a network registrar. The new enrollee device is a headless device that lacks a first user interface for configuring the new enrollee device for the communication network. The electronic device obtains, at a sensor, sensor information that is indicative of a device key associated with the new enrollee device. The electronic device determines the device key based on the sensor information. The device key is provided to the network registrar to cause the network registrar to configure the new enrollee device for the communication network.
Abstract:
An apparatus and method for configuring access points and wireless devices for use within a wireless local area network (WLAN) is disclosed. In at least one exemplary embodiment, a network manager may obtain the public keys of an access point and the wireless devices to be included in the WLAN. The network manager may generate and provide a public key list including the public keys of the wireless devices to the access point. The access point may establish communication links with the wireless devices corresponding to the public keys in the public key list. The network manager may generate a de-authorization list that includes the public keys of access points no longer authorized to operate within the WLAN. The de-authorization list may be distributed to wireless devices within the WLAN. The wireless devices may refuse connections to access points listed on the de-authorization list.
Abstract:
Various features pertain to cryptographic ciphers such as Advanced Encryption Standard (AES) block ciphers. In some examples described herein, a modified masked AES SubBytes procedure uses a static lookup table that is its own inverse in GF(22). The static lookup table facilitates computation of the multiplicative inverse during nonlinear substitution operations in GF(22) In an AES encryption example, the AES device combines plaintext with a round key to obtain combined data, then routes the combined data through an AES SubBytes substitution stage that employs the static lookup table and a dynamic table to perform a masked multiplicative inverse in GF(22) to obtain substituted data. The substituted data is then routed through additional cryptographic AES stages to generate ciphertext. The additional stages may include further SubBytes stages that also exploit the static and dynamic tables. Other examples employ either a static lookup table or a dynamic lookup table but not both.
Abstract:
A user device can be configured for network access, such as for guest network access. In one example, a first device receives an indication of a transaction that uses the first device. The first device communicates a request for network access to an access point of the network in response to receiving the indication of the transaction. The first device then receives a first key from the access point. The first device provides the first key to the user device. The user device is to use the first key to obtain the network access to the network.
Abstract:
Techniques are described for securely provisioning a client device. A client device may output first client information over a secure interface to a trusted device to be transmitted to an authentication server. Second client information related to the first client information may be transmitted to the authentication server. The authentication server may link the second client information and the first client information. The client device may receive an encrypted authentication credential from the authentication server. The authentication credential may be encrypted based at least in part on the first client information or the second client information. The client device may decrypt the encrypted authentication credential using the first client information, the second client information, or a shared secret key.
Abstract:
Methods, systems, and devices are described for provisioning of devices, such as UEs, for service at a wireless network. One or more device parameters may be identified for use in provisioning the device on the wireless network, which may be provided to a network element. The network element may use the provided parameters to access a subscription server. The subscription server may provide verification and/or subscription parameters of the device that may then be used by the device to verify that the device is authorized to access the wireless network.
Abstract:
Certain aspects of the present disclosure generally relate to wireless communications and, more particularly, to ultra low power paging frames for wake up and discovery. One example apparatus for wireless communications generally includes at least one interface configured to obtain a frame via a first radio and a second radio, wherein the interface receives a frame from another apparatus via the second radio while the first radio is in a first power state; and a processing system configured to take one or more actions based on a command field included in the frame. A second example apparatus for wireless communications generally includes at least one interface configured to obtain a frame via a first radio and a second radio, wherein the interface receives a frame from another apparatus via the second radio while the first radio is in a first power state; and a processing system configured to take one or more actions based on whether or not an authentication code included in the frame matches a local authentication code.
Abstract:
Techniques for encrypting the data in the memory of a computing device are provided. An example method for protecting data in a memory according to the disclosure includes encrypting data associated with a store request using a memory encryption device of the processor to produce encrypted data. Encrypting the data includes: obtaining a challenge value, providing the challenge value to a physically unclonable function module to obtain a response value, and encrypting the data associated with the store request using the response value as an encryption key to generate the encrypted data. The method also includes storing the encrypted data and the challenge value associated with the encrypted data in the memory.