-
公开(公告)号:US20180026782A1
公开(公告)日:2018-01-25
申请号:US15217760
申请日:2016-07-22
Applicant: QUALCOMM Incorporated
Inventor: Lu Xiao , Jing Deng , Justin Yongjin Kim
IPC: H04L9/00
CPC classification number: H04L9/002 , G06F7/72 , G06F21/75 , G06F21/755 , H04L9/003 , H04L9/302 , H04L2209/12
Abstract: A method of implementing security in a modular exponentiation function for cryptographic operations is provided. A key is obtained as a parameter when the modular exponentiation function is invoked. The key may be one of either a public key or a private key of a cryptographic key pair. Within the modular exponentiation function, the method ascertains whether the key is greater than L bits long, where L is a positive integer. A countermeasure against an attack is implemented if the key is greater than L bits long. The countermeasure may include one or more techniques (e.g., hardware and/or software techniques) that inhibit or prevent information about the key from being ascertained through analysis. One or more exponentiation operations may then be performed using the key. The same modular exponentiation function may be used to perform encryption and decryption operations but with different keys.
-
公开(公告)号:US10747883B2
公开(公告)日:2020-08-18
申请号:US15631575
申请日:2017-06-23
Applicant: QUALCOMM Incorporated
Inventor: Dhamim Packer Ali , Dhaval Patel , Justin Yongjin Kim , Maria Miranda , Cory David Feitelson , Eric Taseski
IPC: G06F7/04 , G06F12/00 , G06F12/14 , G06F13/00 , G11C7/00 , G06F21/57 , G06F15/78 , H04L9/32 , G06F21/44 , G06F21/51 , G06F21/64 , G06F15/76 , H04L9/06 , H04L9/08 , G06F8/65
Abstract: Various additional and alternative aspects are described herein. In some aspects, the present disclosure provides a method of authenticating executable images in a system-on-chip (SoC), the method comprising: storing a plurality of executable images; storing, as separate from the plurality of executable images, a signed image of hashes comprising a plurality of hashes corresponding to the plurality of executable images and a first signature; authenticating the signed image of hashes based on the first signature; and using a first hash of the plurality of hashes to authenticate a first executable image of the plurality of executable images when the signed image of hashes passes authentication.
-
公开(公告)号:US10367637B2
公开(公告)日:2019-07-30
申请号:US15217760
申请日:2016-07-22
Applicant: QUALCOMM Incorporated
Inventor: Lu Xiao , Jing Deng , Justin Yongjin Kim
Abstract: A method of implementing security in a modular exponentiation function for cryptographic operations is provided. A key is obtained as a parameter when the modular exponentiation function is invoked. The key may be one of either a public key or a private key of a cryptographic key pair. Within the modular exponentiation function, the method ascertains whether the key is greater than L bits long, where L is a positive integer. A countermeasure against an attack is implemented if the key is greater than L bits long. The countermeasure may include one or more techniques (e.g., hardware and/or software techniques) that inhibit or prevent information about the key from being ascertained through analysis. One or more exponentiation operations may then be performed using the key. The same modular exponentiation function may be used to perform encryption and decryption operations but with different keys.
-
-