Side channel power attack defense with pseudo random clock operation
    2.
    发明授权
    Side channel power attack defense with pseudo random clock operation 有权
    侧通道电源攻击防御与伪随机时钟操作

    公开(公告)号:US09401802B2

    公开(公告)日:2016-07-26

    申请号:US14447792

    申请日:2014-07-31

    Inventor: Robert A. Card

    CPC classification number: H04L9/003 G09C1/00 H04L2209/08 H04L2209/12

    Abstract: Apparatus and methods are provided for defending an electronic circuit secret algorithm and secret parameter values against a side-attack. In an example, a method can include receiving first one or more parameters for altering a clock signal of the electronic device at a non-volatile memory register, and altering a frequency of the clock signal of the electronic device during execution of an authentication routine according to the first one or more parameters.

    Abstract translation: 提供了设备和方法来防御电子电路秘密算法和抵御侧攻的秘密参数值。 在一个示例中,一种方法可以包括接收用于在非易失性存储器寄存器处改变电子设备的时钟信号的第一个或多个参数,以及在认证程序执行期间改变电子设备的时钟信号的频率, 到第一个或多个参数。

    Cryptographic key split combiner
    3.
    发明授权
    Cryptographic key split combiner 有权
    加密密钥分解组合器

    公开(公告)号:US08712046B2

    公开(公告)日:2014-04-29

    申请号:US13544132

    申请日:2012-07-09

    CPC classification number: H04L9/0861 H04L9/085 H04L9/0866 H04L9/0869

    Abstract: A cryptographic key split combiner includes a plurality of key split generators adapted to generate cryptographic key splits, a key split randomizer adapted to randomize the cryptographic key splits to produce a cryptographic key, and a digital signature generator. Each of the key split generators is adapted to generate key splits from seed data. The digital signature generator is adapted to generate a digital signature based on the cryptographic key. The digital signature generator can also be adapted to generate the digital signature based on a credential value. A process for forming cryptographic keys includes generating a plurality of cryptographic key splits from seed data. The cryptographic key splits are randomized to produce a cryptographic key. A digital signature is generated based on the cryptographic key. Generating a digital signature based on the cryptographic key can include generating the digital signature based on a credential value.

    Abstract translation: 密码分组组合器包括适于产生加密密钥分割的多个密钥分解生成器,适于随机化加密密钥分裂以产生加密密钥的密钥分离随机器,以及数字签名生成器。 每个密钥分割生成器适于从种子数据生成密钥分割。 数字签名生成器适于基于加密密钥生成数字签名。 数字签名生成器还可以适于基于证书值生成数字签名。 用于形成加密密钥的过程包括从种子数据生成多个密码密钥分割。 加密密钥分割被随机化以产生加密密钥。 基于加密密钥生成数字签名。 基于加密密钥生成数字签名可以包括基于证书值生成数字签名。

    Table masking for resistance to power analysis attacks
    4.
    发明授权
    Table masking for resistance to power analysis attacks 有权
    表掩蔽抵抗力分析攻击

    公开(公告)号:US08184806B2

    公开(公告)日:2012-05-22

    申请号:US12911013

    申请日:2010-10-25

    CPC classification number: H04L9/003 H04L9/0618 H04L2209/043

    Abstract: Tables are defined to permit output masking for table look-ups to be carried out to resist power analysis attacks on cryptographic operations. A set of individually defined random values is used to mask each entry in a substitution table, defining a masked substitution table. A mask table is also defined such that the values of each entry, masked with the corresponding random value, is the value of a fixed mask. The masked substitution tables and the mask tables may be used in cryptographic operations to permit the output of table look-ups to be masked, without directly using the fixed mask value in the computations of the cryptographic operations.

    Abstract translation: 表被定义为允许执行用于表查找的输出掩蔽以抵抗对加密操作的功率分析攻击。 一组单独定义的随机值用于屏蔽替代表中的每个条目,定义一个被掩蔽的替换表。 掩模表也被定义为使得用对应的随机值掩蔽的每个条目的值是固定掩码的值。 掩蔽替换表和掩码表可以用于加密操作,以允许在表的查询的输出被屏蔽,而不直接在加密操作的计算中使用固定的掩码值。

    User authentication method and user authentication system
    5.
    发明授权
    User authentication method and user authentication system 有权
    用户认证方式和用户认证系统

    公开(公告)号:US08140854B2

    公开(公告)日:2012-03-20

    申请号:US10504940

    申请日:2003-02-13

    Applicant: Hideharu Ogawa

    Inventor: Hideharu Ogawa

    CPC classification number: H04L63/083 G06F21/31 G06F21/33 G06F21/36 H04L63/104

    Abstract: The present invention is a user verification method and a user verification system, in which a password derivation pattern for each user is pre-registered into a verification server, and when a user is to use the system, the verification server generates a presented pattern and presents this to the user, the user inputs a password corresponding to the user's own password derivation pattern for the presented pattern, the verification server performs verification of the inputted password based on the presented pattern and the user's own password derivation pattern that was registered, and a verification result is then notified to the usage target system.

    Abstract translation: 本发明是一种用户验证方法和用户验证系统,其中每个用户的密码导出模式被预先注册到验证服务器中,并且当用户要使用该系统时,验证服务器生成呈现的模式和 用户向用户输入与用户自己的密码导出模式对应的密码,验证服务器根据所呈现的模式和用户自己的密码导出模式对注册的密码进行验证,以及 然后将验证结果通知给使用目标系统。

    Method for the secure, distributed generation of an encryption key
    6.
    发明授权
    Method for the secure, distributed generation of an encryption key 有权
    用于安全,分布式生成加密密钥的方法

    公开(公告)号:US07970135B1

    公开(公告)日:2011-06-28

    申请号:US09806222

    申请日:2000-07-06

    Applicant: Joerg Schwenk

    Inventor: Joerg Schwenk

    CPC classification number: H04L9/0841 Y04S40/24

    Abstract: In a method for the secure, distributed generation of an encryption key for a cryptographic method, where the encryption key, as well as a public key are generated using deterministic methods from a large random number (seed), the seed (S) is generated on the user side by consulting variables known only to the user, and a public key (V) that is transmitted in advance from the trust center. Generation information suitable for generating the seed and, on the basis of which, the seed is able to be derived deterministically from the trust center, by consulting information known only to the center, is produced on the user side, and transmitted to the trust center to create the seed in parallel.

    Abstract translation: 在用于密码方法的加密密钥的安全分布式生成的方法中,其中使用来自大随机数(种子)的确定性方法生成加密密钥以及公共密钥,生成种子(S) 在用户侧通过咨询仅对用户知道的变量,以及从信任中心预先发送的公开密钥(V)。 生成信息适合于生成种子,并且基于此可以从信任中心确定地导出种子,只需通过咨询仅针对中心的信息,就可以在用户端生成并发送给信任中心 并行创建种子。

    Method for making seed value used in pseudo random number gnerator and device thereof
    7.
    发明授权
    Method for making seed value used in pseudo random number gnerator and device thereof 有权
    用于伪随机数变换器中的种子值的方法及其装置

    公开(公告)号:US07773748B2

    公开(公告)日:2010-08-10

    申请号:US11235546

    申请日:2005-09-27

    CPC classification number: G06F7/588 H04L9/0662 H04L2209/30

    Abstract: A seed value making method and device for a PRNG (Pseudo Random Number Generator) are provided. The seed value making method includes the steps of: accumulating in memory units of a First Data Pool data from various external sources, analyzing the data to determine a source type, computing entropy estimations for each of the external sources basing on the source type as determined, and generating a seed value by using the entropy estimations and the data accumulated in the memory units of the First Data Pool. Accordingly, in generating a seed value, dynamic estimation of random sources rate, and classification of sources on slow and fast ones, and reliable and unreliable ones, can be provided, and also, seed values can be made with taking in account rate and reliability of the sources.

    Abstract translation: 提供了一种用于PRNG(伪随机数生成器)的种子价值制造方法和装置。 种子价值制造方法包括以下步骤:在来自各种外部源的第一数据池数据的存储器单元中积累,分析数据以确定源类型,基于所确定的源类型来计算每个外部源的熵估计 ,并且通过使用熵估计和在第一数据池的存储单元中累积的数据来生成种子值。 因此,在生成种子价值时,可以提供随机源速率的动态估计,慢速,快速源的分类以及可靠和不可靠的种子值,并且可以考虑种子价值和可靠性 的来源。

    Lightweight Streaming Protection by Sequence Number Scrambling
    8.
    发明申请
    Lightweight Streaming Protection by Sequence Number Scrambling 有权
    通过序列号加扰进行轻量级流保护

    公开(公告)号:US20100189257A1

    公开(公告)日:2010-07-29

    申请号:US12361211

    申请日:2009-01-28

    Abstract: Methods and apparatus for securely streaming multimedia packets, such as RTP packets, are disclosed, in which the payloads of the packets are shuffled. This reordering is performed using a shuffling function that depends on sequence numbers associated with each of the packets, a pre-determined group size N, and a pre-determined initialization value; in some embodiments this shuffling function comprises a cryptographic hashing function or other one-way function. A receiving device may reverse the shuffling, using a similar shuffling function, if the pre-determined group size N and the pre-determined initialization value are known.

    Abstract translation: 公开了用于安全地流式传输诸如RTP分组的多媒体分组的方法和装置,其中分组的有效载荷被混洗。 使用依赖于与每个分组相关联的序列号,预定组大小N和预定义的初始化值的混洗功能来执行该重新排序; 在一些实施例中,该混洗功能包括密码散列函数或其他单向函数。 如果预定的组大小N和预定的初始化值已知,则接收设备可以使用类似的混洗功能来反转混洗。

    EXTENSIVE CIPHERTEXT FEEDBACK
    9.
    发明申请
    EXTENSIVE CIPHERTEXT FEEDBACK 有权
    丰富的信息反馈

    公开(公告)号:US20100124328A1

    公开(公告)日:2010-05-20

    申请号:US12273316

    申请日:2008-11-18

    CPC classification number: H04L9/0618 H04L9/065 H04L2209/08 H04L2209/12

    Abstract: Some embodiments of a method and apparatus for encrypting and decrypting data have been presented. In one embodiment, a stream cipher is run in parallel with a block cipher to output a stream of bits with a length equal to a number of ciphertext blocks in an output stream of the block cipher. The method may further include pre-processing a current plaintext block based on the stream of bits and the number of ciphertext blocks in the output stream of the block cipher. Then the block cipher may encipher the pre-processed block to generate a current ciphertext block.

    Abstract translation: 已经提出了用于加密和解密数据的方法和装置的一些实施例。 在一个实施例中,流密码与块密码并行运行,以输出长度等于块密码的输出流中密文块数的长度的比特流。 该方法还可以包括基于比特流和块密码的输出流中的密文块的数量来预处理当前明文块。 然后块密码可以加密预处理的块以生成当前的密文块。

    METHOD FOR SECURELY EXTENDING KEY STREAM TO ENCRYPT HIGH-ENTROPY DATA
    10.
    发明申请
    METHOD FOR SECURELY EXTENDING KEY STREAM TO ENCRYPT HIGH-ENTROPY DATA 失效
    用于安全地扩展关键流的加密高密度数据的方法

    公开(公告)号:US20080095370A1

    公开(公告)日:2008-04-24

    申请号:US11550779

    申请日:2006-10-18

    CPC classification number: H04L9/0662 H04L2209/30

    Abstract: A stream stretcher is provided for securely expanding a key stream to match fee length of a data block to be encrypted and/or decrypted. A key stream is obtained having a length of LZ bits. A length LD corresponding, to a data block to be encrypted/decrypted is obtained, where LD>LZ. LD−LZ new bits are recursively generated by combining at least two bits of the key stream. The LD−LZ new bits are appended to the key stream to generate a stretched key stream. The data block may then be encrypted/decrypted with the stretched key stream. The at least two bits are selected to have offsets that form a full positive difference set.

    Abstract translation: 提供流担架,用于安全地扩展密钥流以匹配要加密和/或解密的数据块的费用长度。 获得具有长度为L个Z位的密钥流。 获得与要加密/解密的数据块相对应的长度L SUB D,其中L D D Z L。 通过组合密钥流的至少两个比特来递归地生成新比特。 新的比特被添加到密钥流中以产生延伸的密钥流。 然后可以用拉伸的密钥流对数据块进行加密/解密。 选择至少两个位以具有形成完全正差分集的偏移。

Patent Agency Ranking