-
公开(公告)号:US10560260B2
公开(公告)日:2020-02-11
申请号:US16283574
申请日:2019-02-22
Applicant: Cryptography Research, Inc.
Inventor: Megan Anneke Wachs , Ambuj Kumar , Benjamin Che-Ming Jun
Abstract: Values and a sequence of operations associated with generating a key may be received. A determination may be made as to whether the sequence of operations associated with the key matches an authorized sequence of operations. The key may be outputted when the received sequence of operations matches the authorized sequence of operations and the key may not be outputted when the received sequence of operations does not match the authorized sequence of operations.
-
公开(公告)号:US20200007328A1
公开(公告)日:2020-01-02
申请号:US16445708
申请日:2019-06-19
Applicant: Cryptography Research, Inc.
Inventor: Ambuj Kumar , Mark Evan Marson , Daniel Robert Beitel
Abstract: A first entity may provide a request to transmit data from the first entity to a second entity. The first entity may receive a session key from the second entity in response to the request where the session key is encrypted by a second key that is based on a combination of a public key and a location associated with the second entity. A location associated with the first entity may be identified. Furthermore, a first key may be generated based on a combination of the location associated with the first entity and a private key that corresponds to the public key. The first key may decrypt data encrypted by the second key when the location associated with the first entity corresponds to the location associated with the second entity.
-
公开(公告)号:US20190342092A1
公开(公告)日:2019-11-07
申请号:US16405065
申请日:2019-05-07
Applicant: Cryptography Research, Inc.
Inventor: Helena Handschuh
Abstract: An indication of a key generation function may be received from a server. A random value may be received based on a volatile memory of a device. A cryptographic key may be generated based on the key generation function from the server and the random value that is based on the volatile memory of the device. The cryptographic key may be stored at a non-volatile memory of the device.
-
公开(公告)号:US10423807B2
公开(公告)日:2019-09-24
申请号:US15935279
申请日:2018-03-26
Applicant: Cryptography Research, Inc.
Inventor: Joshua M. Jaffe
Abstract: Methods and systems for masking certain cryptographic operations in a manner designed to defeat side-channel attacks are disclosed herein. Squaring operations can be masked to make squaring operations indistinguishable or less distinguishable from multiplication operations. In general, squaring operations are converted into multiplication operations by masking them asymmetrically. Additional methods and systems are disclosed for defeating DPA, cross-correlation, and high-order DPA attacks against modular exponentiation.
-
公开(公告)号:US20190273604A1
公开(公告)日:2019-09-05
申请号:US16283574
申请日:2019-02-22
Applicant: Cryptography Research, Inc.
Inventor: Megan Anneke Wachs , Ambuj Kumar , Benjamin Che-Ming Jun
Abstract: Values and a sequence of operations associated with generating a key may be received. A determination may be made as to whether the sequence of operations associated with the key matches an authorized sequence of operations. The key may be outputted when the received sequence of operations matches the authorized sequence of operations and the key may not be outputted when the received sequence of operations does not match the authorized sequence of operations.
-
96.
公开(公告)号:US10382193B2
公开(公告)日:2019-08-13
申请号:US15311741
申请日:2015-05-15
Applicant: Cryptography Research, Inc.
Inventor: Sami James Saab , Pankaj Rohatgi , Craig E. Hampel
Abstract: Systems and methods for performing cryptographic data processing operations in a manner resistant to external monitoring attacks. An example method may comprise: executing, by a processing device, a first data manipulation instruction, the first data manipulation instruction affecting an internal state of the processing device; executing a second data manipulation instruction, the second data manipulation instruction interacting with said internal state; and breaking a detectable interaction of the first data manipulation instruction and the second data manipulation instruction by executing a third data manipulation instruction utilizing an unpredictable data item.
-
公开(公告)号:US10262141B2
公开(公告)日:2019-04-16
申请号:US15395809
申请日:2016-12-30
Applicant: Cryptography Research, Inc.
Inventor: Paul C. Kocher , Pankaj Rohatgi , Joshua M. Jaffe
IPC: G06F8/71 , H04L9/00 , H04L9/06 , H04L9/08 , H04L9/16 , H04L9/32 , G06F12/14 , G06F21/55 , G06F21/57 , G06F21/60 , G06F21/75 , G06F21/76 , G06F9/445 , H04L29/06
Abstract: A computing device includes a secure storage hardware to store a secret value and processing hardware comprising at least one of a cache or a memory. During a secure boot process the processing hardware loads untrusted data into at least one of the cache or the memory of the processing hardware, the untrusted data comprising an encrypted data segment and a validator, retrieves the secret value from the secure storage hardware, derives an initial key based at least in part on an identifier associated with the encrypted data segment and the secret value, verifies, using the validator, whether the encrypted data segment has been modified, and decrypts the encrypted data segment using a first decryption key derived from the initial key to produce a decrypted data segment responsive to verifying that the encrypted data segment has not been modified.
-
公开(公告)号:US20190018934A1
公开(公告)日:2019-01-17
申请号:US16122362
申请日:2018-09-05
Applicant: Cryptography Research, Inc.
Inventor: Paul C. Kocher , Helena Handschuh
IPC: G06F21/10
CPC classification number: G06F21/10 , G06F2221/0724
Abstract: A media storage device includes a media security controller circuit and a memory to store data that relates to a media item to be rendered by a rendering device. The media security controller circuit sends a message to the rendering device that causes the rendering device to obtain a portion of data from memory of the media storage device and provide it to the media security controller circuit. The portion is received and transformed by the media security controller circuit. The media security controller circuit sends the transformed portion to the rendering device.
-
公开(公告)号:US10019564B2
公开(公告)日:2018-07-10
申请号:US14670379
申请日:2015-03-26
Applicant: Cryptography Research, Inc.
Inventor: Benjamin Che-Ming Jun , Matthew Evan Orzen , Joel Patrick Wittenauer , Steven C. Woo
CPC classification number: G06F21/44 , H04L9/321 , H04L9/3271 , H04L63/08
Abstract: Pairing data associated with a second device may be received at a first device. The pairing data may be received from a server. A first authentication proof may be generated based on the pairing data received from the server. A second authentication proof may be received from the second device. Furthermore, an authentication status of the second device may be updated based on a comparison of the first authentication proof that is based on the pairing data received from the server and the second authentication proof that is received from the second device.
-
公开(公告)号:US09940463B2
公开(公告)日:2018-04-10
申请号:US15691601
申请日:2017-08-30
Applicant: Cryptography Research, Inc.
Inventor: Paul Kocher , Pankaj Rohatgi , Joshua M. Jaffe
IPC: H04L9/32 , G06F21/57 , G06F9/445 , H04L9/16 , H04L9/08 , G06F12/14 , H04L9/00 , G06F21/60 , G06F21/76 , H04L9/06 , G06F9/44 , H04L29/06 , G06F21/75
CPC classification number: G06F21/575 , G06F8/71 , G06F9/44505 , G06F12/1408 , G06F21/556 , G06F21/602 , G06F21/755 , G06F21/76 , G06F2212/402 , G06F2221/034 , G06F2221/2107 , G06F2221/2125 , G06F2221/2145 , H04L9/003 , H04L9/0631 , H04L9/085 , H04L9/0861 , H04L9/088 , H04L9/0894 , H04L9/16 , H04L9/3236 , H04L9/3247 , H04L63/0428 , H04L63/0869 , H04L2209/24 , H04L2209/38 , H04L2209/56 , H04L2463/061
Abstract: A method for device authentication comprises receiving, by processing hardware of a first device, a message from a second device to authenticate the first device. The processing hardware retrieves a secret value from secure storage hardware operatively coupled to the processing hardware. The processing hardware derives a validator from the secret value using a path through a key tree, wherein the path is based on the message, wherein deriving the validator using the path through the key tree comprises computing a plurality of successive intermediate keys starting with a value based on the secret value and leading to the validator, wherein each successive intermediate key is derived based on at least a portion of the message and a prior key. The first device then sends the validator to the second device.
-
-
-
-
-
-
-
-
-