-
公开(公告)号:US10382193B2
公开(公告)日:2019-08-13
申请号:US15311741
申请日:2015-05-15
Applicant: Cryptography Research, Inc.
Inventor: Sami James Saab , Pankaj Rohatgi , Craig E. Hampel
Abstract: Systems and methods for performing cryptographic data processing operations in a manner resistant to external monitoring attacks. An example method may comprise: executing, by a processing device, a first data manipulation instruction, the first data manipulation instruction affecting an internal state of the processing device; executing a second data manipulation instruction, the second data manipulation instruction interacting with said internal state; and breaking a detectable interaction of the first data manipulation instruction and the second data manipulation instruction by executing a third data manipulation instruction utilizing an unpredictable data item.
-
公开(公告)号:US20210218546A1
公开(公告)日:2021-07-15
申请号:US17122310
申请日:2020-12-15
Applicant: Cryptography Research, Inc.
Inventor: Sami James Saab , Pankaj Rohatgi , Craig E. Hampel
Abstract: Systems and methods for performing cryptographic data processing operations in a manner resistant to external monitoring attacks. An example method may comprise: executing, by a processing device, a first data manipulation instruction, the first data manipulation instruction affecting a state of the processing device; executing a second data manipulation instruction, the second data manipulation instruction interacting with said internal state; and breaking a detectable interaction of the first data manipulation instruction and the second data manipulation instruction by executing a third data manipulation instruction utilizing an unpredictable data item.
-
公开(公告)号:US11757617B2
公开(公告)日:2023-09-12
申请号:US17122310
申请日:2020-12-15
Applicant: Cryptography Research, Inc.
Inventor: Sami James Saab , Pankaj Rohatgi , Craig E. Hampel
CPC classification number: H04L9/002 , G06F9/30007 , G06F21/556 , H04L9/003 , H04L9/0822 , H04L9/0631 , H04L2209/12
Abstract: Systems and methods for performing cryptographic data processing operations in a manner resistant to external monitoring attacks. An example method may comprise: executing, by a processing device, a first data manipulation instruction, the first data manipulation instruction affecting a state of the processing device; executing a second data manipulation instruction, the second data manipulation instruction interacting with said internal state; and breaking a detectable interaction of the first data manipulation instruction and the second data manipulation instruction by executing a third data manipulation instruction utilizing an unpredictable data item.
-
4.
公开(公告)号:US20200021426A1
公开(公告)日:2020-01-16
申请号:US16519330
申请日:2019-07-23
Applicant: Cryptography Research, Inc.
Inventor: Sami James Saab , Pankaj Rohatgi , Craig E. Hampel
Abstract: Systems and methods for performing cryptographic data processing operations in a manner resistant to external monitoring attacks. An example method may comprise: executing, by a processing device, a first data manipulation instruction, the first data manipulation instruction affecting a state of the processing device; executing a second data manipulation instruction, the second data manipulation instruction interacting with said internal state; and breaking a detectable interaction of the first data manipulation instruction and the second data manipulation instruction by executing a third data manipulation instruction utilizing an unpredictable data item.
-
公开(公告)号:US20200175162A1
公开(公告)日:2020-06-04
申请号:US16061409
申请日:2016-10-12
Applicant: CRYPTOGRAPHY RESEARCH, INC.
Inventor: Sami James Saab , Elke De Mulder , Pankaj Rohatgi , Craig E. Hampel , Jeremy Cooper , Winthrop Wu
Abstract: Embodiments herein facilitate resisting side channel attacks through various implementations and combinations of implementations. In embodiments, this is accomplished by preventing sensitive data from consecutively following other data through potentially vulnerable resources which otherwise may cause data to leak. Where such vulnerabilities to attacks are known, suspected, or as a proactive precaution, a cleaner can be used to inhibit the sensitive data from passing through the vulnerable areas consecutively and thus inhibit the leakage. Embodiments also envision utilizing certain types of circuits to assist in preventing leakage. By using such circuits one can reduce or even potentially eliminate the requirement for cleaners as mentioned previously.
-
公开(公告)号:US10897344B2
公开(公告)日:2021-01-19
申请号:US16519330
申请日:2019-07-23
Applicant: Cryptography Research, Inc.
Inventor: Sami James Saab , Pankaj Rohatgi , Craig E. Hampel
Abstract: Systems and methods for performing cryptographic data processing operations in a manner resistant to external monitoring attacks. An example method may comprise: executing, by a processing device, a first data manipulation instruction, the first data manipulation instruction affecting a state of the processing device; executing a second data manipulation instruction, the second data manipulation instruction interacting with said internal state; and breaking a detectable interaction of the first data manipulation instruction and the second data manipulation instruction by executing a third data manipulation instruction utilizing an unpredictable data item.
-
7.
公开(公告)号:US20170085368A1
公开(公告)日:2017-03-23
申请号:US15311741
申请日:2015-05-15
Applicant: Cryptography Research, Inc.
Inventor: Sami James Saab , Pankaj Rohatgi , Craig E. Hampel
CPC classification number: H04L9/002 , G06F9/30007 , G06F21/556 , H04L9/003 , H04L9/0631 , H04L9/0822 , H04L2209/12
Abstract: Systems and methods for performing cryptographic data processing operations in a manner resistant to external monitoring attacks. An example method may comprise: executing, by a processing device, a first data manipulation instruction, the first data manipulation instruction affecting an internal state of the processing device; executing a second data manipulation instruction, the second data manipulation instruction interacting with said internal state; and breaking a detectable interaction of the first data manipulation instruction and the second data manipulation instruction by executing a third data manipulation instruction utilizing an unpredictable data item.
-
-
-
-
-
-