-
公开(公告)号:US20210256165A1
公开(公告)日:2021-08-19
申请号:US17169074
申请日:2021-02-05
Applicant: CRYPTOGRAPHY RESEARCH, INC.
Inventor: Guilherme Ozari de Almeida , Elena Trichina , Elke De Mulder
Abstract: Systems and methods for protecting from external monitoring attacks cryptographic data processing operations involving universal polynomial hash functions computation. An example method may comprise: receiving an input data block and an iteration result value; performing a first field multiplication operation to produce a new iteration result value, by iteratively processing, starting from a first bit position, bits of a combination of the input data block and the iteration result value, wherein the first bit position is represented by one of: a least-significant bit and a most-significant bit; performing a second field multiplication operation to produce a new mask correction value, by iteratively processing operand bits starting from a second bit position, wherein the second bit position is represented by one of: a least-significant bit and a most-significant bit, and wherein the second bit position is different from the first bit position; applying the new mask correction value to the new iteration result value; and producing, based on the new iteration result value, a value of a cryptographic hash function to be utilized by at least one of: an authenticated encryption operation or an authenticated decryption operation.
-
公开(公告)号:US20160028728A1
公开(公告)日:2016-01-28
申请号:US14811473
申请日:2015-07-28
Applicant: CRYPTOGRAPHY RESEARCH, INC.
Inventor: Craig E. Hampel , Jean-Michel Cioranesco , Rodrigo Portella do Canto , Guilherme Ozari de Almeida , Christopher Gori
CPC classification number: H04L63/0876 , G06F12/1408 , G06F21/6209 , G06F21/71 , G06F2212/1052 , G06F2221/2105 , G06F2221/2141 , G06F2221/2145 , H04L9/3234 , H04L9/3242 , H04L9/3247 , H04L63/10
Abstract: Systems and methods for implementing access control by systems-on-chip (SoCs). An example SoC may comprise an access control unit employed to: receive a message comprising an access control data item; validate the message using a value of a message digest function of contents of the message and a value of a state variable reflecting a state of communications between the access control unit and a programming agent that has initiated the message, wherein the value of the state variable is derived from a previous value of the message digest function calculated within a current communication session between the access control unit and the programming agent; update the state variable using the value of the message digest function of the contents of the message; and control, using the access control data item, access by an initiator device to a target device.
Abstract translation: 通过片上系统(SoC)实现访问控制的系统和方法。 示例SoC可以包括访问控制单元,其用于:接收包括访问控制数据项的消息; 使用所述消息的内容的消息摘要功能的值和反映所述访问控制单元与已经发起所述消息的编程代理之间的通信状态的状态变量的值来验证所述消息,其中,所述状态变量的值 从在访问控制单元和编程代理之间的当前通信会话中计算的消息摘要功能的先前值导出; 使用消息内容的消息摘要功能的值更新状态变量; 并且使用访问控制数据项来控制由发起者设备到目标设备的访问。
-
公开(公告)号:US12261935B2
公开(公告)日:2025-03-25
申请号:US17105247
申请日:2020-11-25
Applicant: Cryptography Research, Inc.
Inventor: Elena Trichina , Guilherme Ozari de Almeida , Elke De Mulder
Abstract: Systems and methods for protecting from external monitoring attacks cryptographic data processing operations involving computation of a universal polynomial hash function, such as GHASH function. An example method may comprise: receiving an input data block, an iteration result value, and a mask value; performing a non-linear operation to produce a masked result value, wherein a first operand of the non-linear operation is represented by a combination of the iteration result value and the input data block, and the second operand of the non-linear operation is represented by a secret hash value, and wherein one of the first operand or the second operand is masked using a mask value; determining, based on the mask value, a mask correction value; and producing a new iteration result value by applying the mask correction value to the masked result value.
-
公开(公告)号:US10482275B2
公开(公告)日:2019-11-19
申请号:US15111972
申请日:2015-01-27
Applicant: Cryptography Research, Inc.
Inventor: Craig E. Hampel , Jean-Michel Cioranesco , Rodrigo Portella do Canto , Guilherme Ozari de Almeida
Abstract: Systems and methods for implementing access control by systems-on-chip (SoCs). An example SoC may comprise: an access control unit comprising a secure memory for storing access control data, the access control unit to: receive a message comprising an access control data item; store the access control data item in the secure memory; perform at least one of: authenticating the message using a message digest function, or validating contents of the secure memory by comparing a stored reference value with a calculated value of a message digest function of the contents of the secure memory; and control, in view of the access control data item, access by an initiator device to a target device.
-
公开(公告)号:US12229322B2
公开(公告)日:2025-02-18
申请号:US17169074
申请日:2021-02-05
Applicant: CRYPTOGRAPHY RESEARCH, INC.
Inventor: Guilherme Ozari de Almeida , Elena Trichina , Elke De Mulder
Abstract: Systems and methods for protecting from external monitoring attacks cryptographic data processing operations involving universal polynomial hash functions computation. An example method may comprise: receiving an input data block and an iteration result value; performing a first field multiplication operation to produce a new iteration result value, by iteratively processing, starting from a first bit position, bits of a combination of the input data block and the iteration result value, wherein the first bit position is represented by one of: a least-significant bit and a most-significant bit; performing a second field multiplication operation to produce a new mask correction value, by iteratively processing operand bits starting from a second bit position, wherein the second bit position is represented by one of: a least-significant bit and a most-significant bit, and wherein the second bit position is different from the first bit position; applying the new mask correction value to the new iteration result value; and producing, based on the new iteration result value, a value of a cryptographic hash function to be utilized by at least one of: an authenticated encryption operation or an authenticated decryption operation.
-
公开(公告)号:US10915667B2
公开(公告)日:2021-02-09
申请号:US16471716
申请日:2017-12-13
Applicant: CRYPTOGRAPHY RESEARCH, INC.
Inventor: Guilherme Ozari de Almeida , Elena Trichina , Elke De Mulder
Abstract: Systems and methods for protecting from external monitoring attacks cryptographic data processing operations involving universal polynomial hash functions computation. An example method may comprise: receiving an input data block and an iteration result value; performing a first field multiplication operation to produce a new iteration result value, by iteratively processing, starting from a first bit position, bits of a combination of the input data block and the iteration result value, wherein the first bit position is represented by one of: a least-significant bit and a most-significant bit; performing a second field multiplication operation to produce a new mask correction value, by iteratively processing operand bits starting from a second bit position, wherein the second bit position is represented by one of: a least-significant bit and a most-significant bit, and wherein the second bit position is different from the first bit position; applying the new mask correction value to the new iteration result value; and producing, based on the new iteration result value, a value of a cryptographic hash function to be utilized by at least one of: an authenticated encryption operation or an authenticated decryption operation.
-
公开(公告)号:US20180034628A1
公开(公告)日:2018-02-01
申请号:US15646614
申请日:2017-07-11
Applicant: Cryptography Research, Inc.
Inventor: Elena Trichina , Guilherme Ozari de Almeida , Elke De Mulder
CPC classification number: H04L9/0631 , G09C1/00 , H04L9/0637 , H04L9/0643 , H04L9/3236 , H04L2209/046 , H04L2209/12
Abstract: Systems and methods for protecting from external monitoring attacks cryptographic data processing operations involving computation of a universal polynomial hash function, such as GHASH function. An example method may comprise: receiving an input data block, an iteration result value, and a mask value; performing a non-linear operation to produce a masked result value, wherein a first operand of the non-linear operation is represented by a combination of the iteration result value and the input data block, and the second operand of the non-linear operation is represented by a secret hash value, and wherein one of the first operand or the second operand is masked using a mask value; determining, based on the mask value, a mask correction value; and producing a new iteration result value by applying the mask correction value to the masked result value.
-
公开(公告)号:US20240211171A1
公开(公告)日:2024-06-27
申请号:US18531350
申请日:2023-12-06
Applicant: Cryptography Research, Inc.
Inventor: Winthrop John Wu , Bryan Wang , Marufa Kaniz , Guilherme Ozari de Almeida , Scott C. Best
IPC: G06F3/06
CPC classification number: G06F3/0658 , G06F3/0619 , G06F3/0679
Abstract: A request to perform a memory operation addressed to a first address corresponding to a first logical unit of logical units of a memory is received. Address mask data that corresponds to the logical units is identified. Multiple transformed addresses are determined using the first address and the address mask data. The transformed addresses can include a target address corresponding to the first logical unit and additional addresses corresponding to other logical units. The memory operation is performed at the target address corresponding to the first logical unit and dummy memory operations are performed at the additional addresses corresponding to the additional logical units.
-
公开(公告)号:US10855443B2
公开(公告)日:2020-12-01
申请号:US15646614
申请日:2017-07-11
Applicant: Cryptography Research, Inc.
Inventor: Elena Trichina , Guilherme Ozari de Almeida , Elke De Mulder
Abstract: Systems and methods for protecting from external monitoring attacks cryptographic data processing operations involving computation of a universal polynomial hash function, such as GHASH function. An example method may comprise: receiving an input data block, an iteration result value, and a mask value; performing a non-linear operation to produce a masked result value, wherein a first operand of the non-linear operation is represented by a combination of the iteration result value and the input data block, and the second operand of the non-linear operation is represented by a secret hash value, and wherein one of the first operand or the second operand is masked using a mask value; determining, based on the mask value, a mask correction value; and producing a new iteration result value by applying the mask correction value to the masked result value.
-
公开(公告)号:US09853974B2
公开(公告)日:2017-12-26
申请号:US14811473
申请日:2015-07-28
Applicant: CRYPTOGRAPHY RESEARCH, INC.
Inventor: Craig E. Hampel , Jean-Michel Cioranesco , Rodrigo Portella do Canto , Guilherme Ozari de Almeida , Christopher Gori
CPC classification number: H04L63/0876 , G06F12/1408 , G06F21/6209 , G06F21/71 , G06F2212/1052 , G06F2221/2105 , G06F2221/2141 , G06F2221/2145 , H04L9/3234 , H04L9/3242 , H04L9/3247 , H04L63/10
Abstract: Systems and methods for implementing access control by systems-on-chip (SoCs). An example SoC may comprise an access control unit employed to: receive a message comprising an access control data item; validate the message using a value of a message digest function of contents of the message and a value of a state variable reflecting a state of communications between the access control unit and a programming agent that has initiated the message, wherein the value of the state variable is derived from a previous value of the message digest function calculated within a current communication session between the access control unit and the programming agent; update the state variable using the value of the message digest function of the contents of the message; and control, using the access control data item, access by an initiator device to a target device.
-
-
-
-
-
-
-
-
-