-
公开(公告)号:US20250023872A1
公开(公告)日:2025-01-16
申请号:US18702638
申请日:2022-10-18
Applicant: CRYPTOGRAPHY RESEARCH, INC.
Inventor: Sangeetha Chamaraj , Matthew E. Orzen , Denis Alexandrovich Pochuev
IPC: H04L9/40
Abstract: An application executing at a first platform receives, from a tester device, a first request to generate a secure data asset. Responsive to authenticating the client, the application sends, to a second platform, a second request to determine whether the client has access to the secure data asset. Responsive to receiving an indication, from the second platform, that the client has access to the secure data asset, the application performs one or more operations to generate the secure data asset. The application sends, to the tester device, the generated secure data asset.
-
公开(公告)号:US20240427921A1
公开(公告)日:2024-12-26
申请号:US18739831
申请日:2024-06-11
Applicant: CRYPTOGRAPHY RESEARCH, INC.
Inventor: Matthew E. Orzen , Joel Wittenauer
Abstract: A system receives, from a first provisioning entity, a request for first secure device data related to a semiconductor device. The first secure device data is associated with one or more provisioning operations performed, on the semiconductor device, by a second provisioning entity. Based on determining that the first provisioning entity has permission to access the first secure device data, the first secure device data is provided to the first provisioning entity. Second secure device data associated with one or more provisioning operations performed by the first provisioning entity on the semiconductor device is received from the first provisioning entity.
-
公开(公告)号:US20240396709A1
公开(公告)日:2024-11-28
申请号:US18670037
申请日:2024-05-21
Applicant: Cryptography Research, Inc.
Inventor: Pascal Sasdrich , Begül Bilgin , Michael Hutter
Abstract: An input data may be received. A portion of a cryptographic operation may be performed with the received input data at a first function component. During the performance of the cryptographic operation at the first function component, a pre-charge operation may be performed at a second function component. Furthermore, the second function component may be used to perform another portion of the cryptographic operation with a result of the portion of the cryptographic operation performed at the first function component.
-
公开(公告)号:US12056219B2
公开(公告)日:2024-08-06
申请号:US17553545
申请日:2021-12-16
Applicant: Cryptography Research, Inc.
Inventor: Mark Evan Marson , Michael Alexander Hamburg , Helena Handschuh
Abstract: Aspects of the present disclosure involve implementations that may be used to protect neural network models against adversarial attacks by obfuscating neural network operations and architecture. Obfuscation techniques include obfuscating weights and biases of neural network nodes, obfuscating activation functions used by neural networks, as well as obfuscating neural network architecture by introducing dummy operations, dummy nodes, and dummy layers into the neural networks.
-
5.
公开(公告)号:US12013751B2
公开(公告)日:2024-06-18
申请号:US16972560
申请日:2019-06-05
Applicant: Cryptography Research, Inc.
Inventor: Mark Evan Marson , Scott C. Best , Helena Handschuh , Winthrop John Wu
CPC classification number: G06F11/10 , H04L9/0866 , H04L9/3278
Abstract: A value corresponding to a physical variation of a device may be received. Furthermore, helper data associated with the physical variation of the device may be received. A result data may be generated based on a combination of the value corresponding to the physical variation of the device and the helper data. An error correction operation may be performed on the result data to identify one or more code words associated with the error correction operation. Subsequently, a target data may be generated based on the one or more code words.
-
公开(公告)号:US11961420B2
公开(公告)日:2024-04-16
申请号:US17309933
申请日:2020-01-06
Applicant: Cryptography Research, Inc.
Inventor: Michael Alexander Hamburg
CPC classification number: G09C1/00 , G06F7/57 , G06F7/728 , H04L9/3013 , H04L9/302 , H04L9/3066
Abstract: Aspects of the present disclosure describe a method and a system to support execution of the method to perform a cryptographic operation involving identifying an N-word number, X=XN−1 . . . X1Xo, to be squared, performing a first loop comprising M first loop iterations, wherein M is a largest integer not exceeding (N+1)/2, each of the M first loop iterations comprising a second loop that comprises a plurality of second loop iterations, wherein an iteration m of the second loop that is within an iteration j of the first loop comprises computing a product Xa*Xb of a word Xa and a word Xb, wherein a+b=2j+m, j≥0 and m≥0, and wherein all second loops have an equal number of second loop iterations.
-
公开(公告)号:US11914870B2
公开(公告)日:2024-02-27
申请号:US17435360
申请日:2020-03-04
Applicant: CRYPTOGRAPHY RESEARCH, INC.
Inventor: Elke De Mulder , Michael Hutter , Samantha Gummalla
IPC: G06F3/06
CPC classification number: G06F3/0623 , G06F3/0655 , G06F3/0679
Abstract: Aspects of the present disclosure calculate masked data shares dynamically inside the CPU boundary, and use a plurality of memory channels to write the masked data shares to an external memory location and/or to read the data shares from that external memory location. Each dynamically generated mask value is uniquely associated with a corresponding memory channel during writing data to the external memory. The modified masked data is unmasked or remasked during a subsequent read operation.
-
公开(公告)号:US11882102B2
公开(公告)日:2024-01-23
申请号:US17306526
申请日:2021-05-03
Applicant: CRYPTOGRAPHY RESEARCH, INC.
Inventor: Philippe Alain Martineau , Ambuj Kumar , William Craig Rawlings
CPC classification number: H04L63/061 , H04L9/0866 , H04L9/0869 , H04L9/3271 , H04L63/0853 , H04W12/04 , H04W12/06 , H04W12/50 , H04L2209/80 , H04L2463/061
Abstract: A base key that is stored at a device may be received. A network identification may further be received. A device identification key may be generated based on a combination of the network identification and the base key. Furthermore, the device identification key may be used to authenticate the device with a network that corresponds to the network identification.
-
公开(公告)号:US11863670B2
公开(公告)日:2024-01-02
申请号:US17601205
申请日:2020-04-04
Applicant: CRYPTOGRAPHY RESEARCH, INC.
Inventor: Mark Evan Marson , Michael Hutter , Bart Stevens
CPC classification number: H04L9/0891 , H04L9/003 , H04L9/16
Abstract: Disclosed are memory encryption systems and methods that rotate encryption keys for robust resistance against side-channel-analysis (SCA)-based attacks on communication paths between an encryption engine within a trust boundary and an external memory component. A key data structure has a plurality of keys that are used to encrypt a plurality of memory blocks in the external memory. The memory blocks encrypted with the oldest key of the key data structure are identified. Encrypted data is read from the identified memory blocks. The encrypted data is decrypted from the identified memory blocks. The data is then re-encrypted using the selected key that is newer than the oldest key, and re-written to the identified memory blocks.
-
公开(公告)号:US20230388290A1
公开(公告)日:2023-11-30
申请号:US18216093
申请日:2023-06-29
Applicant: Cryptography Research Inc
Inventor: Paul Carl Kocher , Benjamin Chen-Min Jun , Andrew John Leiserson
IPC: H04L9/40 , H04L9/08 , H04L9/14 , H04L9/32 , G06F21/54 , G06F21/71 , H04W12/04 , H04W12/041 , G06F21/64 , G06F21/57
CPC classification number: H04L63/0823 , H04L9/083 , H04L9/0897 , H04L9/14 , H04L9/3247 , G06F21/54 , G06F21/71 , H04W12/04 , H04W12/041 , G06F21/64 , G06F21/57 , H04L63/061 , H04L63/083 , G06F2221/2101
Abstract: A mechanism for providing secure feature and key management in integrated circuits is described. An example integrated circuit includes a secure memory to store a secret key, and a security manager core, coupled to the secure memory, to receive a digitally signed command, verify a signature associated with the command using the secret key, and configure operation of the integrated circuit using the command.
-
-
-
-
-
-
-
-
-