PROTECTING PARALLEL MULTIPLICATION OPERATIONS FROM EXTERNAL MONITORING ATTACKS

    公开(公告)号:US20210256165A1

    公开(公告)日:2021-08-19

    申请号:US17169074

    申请日:2021-02-05

    Abstract: Systems and methods for protecting from external monitoring attacks cryptographic data processing operations involving universal polynomial hash functions computation. An example method may comprise: receiving an input data block and an iteration result value; performing a first field multiplication operation to produce a new iteration result value, by iteratively processing, starting from a first bit position, bits of a combination of the input data block and the iteration result value, wherein the first bit position is represented by one of: a least-significant bit and a most-significant bit; performing a second field multiplication operation to produce a new mask correction value, by iteratively processing operand bits starting from a second bit position, wherein the second bit position is represented by one of: a least-significant bit and a most-significant bit, and wherein the second bit position is different from the first bit position; applying the new mask correction value to the new iteration result value; and producing, based on the new iteration result value, a value of a cryptographic hash function to be utilized by at least one of: an authenticated encryption operation or an authenticated decryption operation.

    IMPLEMENTING ACCESS CONTROL BY SYSTEM-ON-CHIP
    2.
    发明申请
    IMPLEMENTING ACCESS CONTROL BY SYSTEM-ON-CHIP 有权
    通过系统芯片实现访问控制

    公开(公告)号:US20160028728A1

    公开(公告)日:2016-01-28

    申请号:US14811473

    申请日:2015-07-28

    Abstract: Systems and methods for implementing access control by systems-on-chip (SoCs). An example SoC may comprise an access control unit employed to: receive a message comprising an access control data item; validate the message using a value of a message digest function of contents of the message and a value of a state variable reflecting a state of communications between the access control unit and a programming agent that has initiated the message, wherein the value of the state variable is derived from a previous value of the message digest function calculated within a current communication session between the access control unit and the programming agent; update the state variable using the value of the message digest function of the contents of the message; and control, using the access control data item, access by an initiator device to a target device.

    Abstract translation: 通过片上系统(SoC)实现访问控制的系统和方法。 示例SoC可以包括访问控制单元,其用于:接收包括访问控制数据项的消息; 使用所述消息的内容的消息摘要功能的值和反映所述访问控制单元与已经发起所述消息的编程代理之间的通信状态的状态变量的值来验证所述消息,其中,所述状态变量的值 从在访问控制单元和编程代理之间的当前通信会话中计算的消息摘要功能的先前值导出; 使用消息内容的消息摘要功能的值更新状态变量; 并且使用访问控制数据项来控制由发起者设备到目标设备的访问。

    Protecting polynomial hash functions from external monitoring attacks

    公开(公告)号:US12261935B2

    公开(公告)日:2025-03-25

    申请号:US17105247

    申请日:2020-11-25

    Abstract: Systems and methods for protecting from external monitoring attacks cryptographic data processing operations involving computation of a universal polynomial hash function, such as GHASH function. An example method may comprise: receiving an input data block, an iteration result value, and a mask value; performing a non-linear operation to produce a masked result value, wherein a first operand of the non-linear operation is represented by a combination of the iteration result value and the input data block, and the second operand of the non-linear operation is represented by a secret hash value, and wherein one of the first operand or the second operand is masked using a mask value; determining, based on the mask value, a mask correction value; and producing a new iteration result value by applying the mask correction value to the masked result value.

    Protecting parallel multiplication operations from external monitoring attacks

    公开(公告)号:US12229322B2

    公开(公告)日:2025-02-18

    申请号:US17169074

    申请日:2021-02-05

    Abstract: Systems and methods for protecting from external monitoring attacks cryptographic data processing operations involving universal polynomial hash functions computation. An example method may comprise: receiving an input data block and an iteration result value; performing a first field multiplication operation to produce a new iteration result value, by iteratively processing, starting from a first bit position, bits of a combination of the input data block and the iteration result value, wherein the first bit position is represented by one of: a least-significant bit and a most-significant bit; performing a second field multiplication operation to produce a new mask correction value, by iteratively processing operand bits starting from a second bit position, wherein the second bit position is represented by one of: a least-significant bit and a most-significant bit, and wherein the second bit position is different from the first bit position; applying the new mask correction value to the new iteration result value; and producing, based on the new iteration result value, a value of a cryptographic hash function to be utilized by at least one of: an authenticated encryption operation or an authenticated decryption operation.

    Protecting parallel multiplication operations from external monitoring attacks

    公开(公告)号:US10915667B2

    公开(公告)日:2021-02-09

    申请号:US16471716

    申请日:2017-12-13

    Abstract: Systems and methods for protecting from external monitoring attacks cryptographic data processing operations involving universal polynomial hash functions computation. An example method may comprise: receiving an input data block and an iteration result value; performing a first field multiplication operation to produce a new iteration result value, by iteratively processing, starting from a first bit position, bits of a combination of the input data block and the iteration result value, wherein the first bit position is represented by one of: a least-significant bit and a most-significant bit; performing a second field multiplication operation to produce a new mask correction value, by iteratively processing operand bits starting from a second bit position, wherein the second bit position is represented by one of: a least-significant bit and a most-significant bit, and wherein the second bit position is different from the first bit position; applying the new mask correction value to the new iteration result value; and producing, based on the new iteration result value, a value of a cryptographic hash function to be utilized by at least one of: an authenticated encryption operation or an authenticated decryption operation.

    PROTECTING POLYNOMIAL HASH FUNCTIONS FROM EXTERNAL MONITORING ATTACKS

    公开(公告)号:US20180034628A1

    公开(公告)日:2018-02-01

    申请号:US15646614

    申请日:2017-07-11

    Abstract: Systems and methods for protecting from external monitoring attacks cryptographic data processing operations involving computation of a universal polynomial hash function, such as GHASH function. An example method may comprise: receiving an input data block, an iteration result value, and a mask value; performing a non-linear operation to produce a masked result value, wherein a first operand of the non-linear operation is represented by a combination of the iteration result value and the input data block, and the second operand of the non-linear operation is represented by a secret hash value, and wherein one of the first operand or the second operand is masked using a mask value; determining, based on the mask value, a mask correction value; and producing a new iteration result value by applying the mask correction value to the masked result value.

    OBFUSCATION OF DATA IN A MEMORY
    8.
    发明公开

    公开(公告)号:US20240211171A1

    公开(公告)日:2024-06-27

    申请号:US18531350

    申请日:2023-12-06

    CPC classification number: G06F3/0658 G06F3/0619 G06F3/0679

    Abstract: A request to perform a memory operation addressed to a first address corresponding to a first logical unit of logical units of a memory is received. Address mask data that corresponds to the logical units is identified. Multiple transformed addresses are determined using the first address and the address mask data. The transformed addresses can include a target address corresponding to the first logical unit and additional addresses corresponding to other logical units. The memory operation is performed at the target address corresponding to the first logical unit and dummy memory operations are performed at the additional addresses corresponding to the additional logical units.

    Protecting polynomial hash functions from external monitoring attacks

    公开(公告)号:US10855443B2

    公开(公告)日:2020-12-01

    申请号:US15646614

    申请日:2017-07-11

    Abstract: Systems and methods for protecting from external monitoring attacks cryptographic data processing operations involving computation of a universal polynomial hash function, such as GHASH function. An example method may comprise: receiving an input data block, an iteration result value, and a mask value; performing a non-linear operation to produce a masked result value, wherein a first operand of the non-linear operation is represented by a combination of the iteration result value and the input data block, and the second operand of the non-linear operation is represented by a secret hash value, and wherein one of the first operand or the second operand is masked using a mask value; determining, based on the mask value, a mask correction value; and producing a new iteration result value by applying the mask correction value to the masked result value.

Patent Agency Ranking