-
121.
公开(公告)号:US20210119789A1
公开(公告)日:2021-04-22
申请号:US17133304
申请日:2020-12-23
Applicant: Intel Corporation
Inventor: Santosh Ghosh , Marcio Juliato , Manoj Sastry
Abstract: A method comprises receiving an image of an update for a software module, a rate parameter, an index parameter, and a public key, generating a 32-byte aligned string, computing a state parameter using the 32-byte aligned string, generating a modified message representative, computing a Merkle Tree root node, and in response to a determination that the Merkle Tree root node matches the public key, forwarding, to a remote device, the image of the update for a software module, the state parameter; and the modified message representative.
-
公开(公告)号:US20210006576A1
公开(公告)日:2021-01-07
申请号:US17025797
申请日:2020-09-18
Applicant: Intel Corporation
Inventor: Marcio Juliato , Shabbir Ahmed , Qian Wang , Christopher Gutierrez , Vuk Lesi , Manoj Sastry
Abstract: Systems, apparatuses, and methods to accelerate classification of malicious activity by an intrusion detection system are provided. An intrusion detection system can speculate on classification of labels in a random forest model based on temporary and incomplete set of features. Additionally, an intrusion detection system can classify malicious context based on a set of committed nodes in the random forest model.
-
公开(公告)号:US10833868B2
公开(公告)日:2020-11-10
申请号:US15856179
申请日:2017-12-28
Applicant: Intel Corporation
Inventor: Andrew Reinders , Manoj Sastry , Santosh Ghosh , Rafael Misoczki
Abstract: A technique includes generating a direct anonymous attestation (DAA)-based signature to prove an electronic device is a member of a group. Generating the signature includes determining a reciprocal of a prime modulus, and determining the reciprocal of the prime modulus comprises left bit shifting a Barrett multiplier by a predetermined number of bits and multiplying a result of the left bit shifting of the Barrett multiplier with the prime modulus.
-
公开(公告)号:US20190325166A1
公开(公告)日:2019-10-24
申请号:US16456339
申请日:2019-06-28
Applicant: Intel Corporation
Inventor: Vikram Suresh , Sanu Mathew , Rafael Misoczki , Santosh Ghosh , Raghavan Kumar , Manoj Sastry , Andrew H. Reinders
Abstract: Embodiments are directed to post quantum public key signature operation for reconfigurable circuit devices. An embodiment of an apparatus includes one or more processors; and a reconfigurable circuit device, the reconfigurable circuit device including a dedicated cryptographic hash hardware engine, and a reconfigurable fabric including logic elements (LEs), wherein the one or more processors are to configure the reconfigurable circuit device for public key signature operation, including mapping a state machine for public key generation and verification to the reconfigurable fabric, including mapping one or more cryptographic hash engines to the reconfigurable fabric, and combining the dedicated cryptographic hash hardware engine with the one or more mapped cryptographic hash engines for cryptographic signature generation and verification.
-
公开(公告)号:US20190319802A1
公开(公告)日:2019-10-17
申请号:US16456004
申请日:2019-06-28
Applicant: Intel Corporation
Inventor: RAFAEL MISOCZKI , Santosh Ghosh , Manoj Sastry , David Wheeler
Abstract: In one example an apparatus comprises a computer readable memory to store a public key associated with a signing device, communication logic to receive, from the signing device, a signature chunk which is a component of a signature generated by a hash-based signature algorithm, and at least a first intermediate node value associated with the signature chunk, verification logic to execute a first hash chain beginning with the signature chunk to produce at least a first computed intermediate node value, execute a second hash chain beginning with the at least one intermediate node value associated with the signature chunk to produce a first computed final node value, and use the first computed intermediate node value and the first computed final computed node value to validate the signature generated by the hash-based signature algorithm. Other examples may be described.
-
公开(公告)号:US20190319787A1
公开(公告)日:2019-10-17
申请号:US16456096
申请日:2019-06-28
Applicant: Intel Corporation
Inventor: ANDREW H. REINDERS , Santosh Ghosh , Manoj Sastry , Rafael Misoczki
Abstract: In one example an apparatus comprises an unsatisfied parity check (UPC) memory, an unsatisfied parity check (UPC) compute block communicatively coupled to the UPC memory, a first error memory communicatively coupled to the UPC compute block, a polynomial multiplication syndrome memory, a polynomial multiplication compute block communicatively coupled to the polynomial multiplication syndrome memory, a second error memory communicatively coupled to the polynomial multiplication compute block, a codeword memory communicatively coupled to the UPC compute block and the polynomial multiplication compute block, a multiplexer communicatively coupled to first error memory and to the polynomial multiplication compute block, and a controller communicatively coupled to the UPC memory, the polynomial multiplication syndrome memory, the codeword memory, and the multiplexer. Other examples may be described.
-
公开(公告)号:US20190319782A1
公开(公告)日:2019-10-17
申请号:US16455950
申请日:2019-06-28
Applicant: Intel Corporation
Inventor: SANTOSH GHOSH , Vikram Suresh , Sanu Mathew , Manoj Sastry , Andrew H. Reinders , Raghavan Kumar , Rafael Misoczki
Abstract: In one example an apparatus comprises a computer readable memory, an XMSS operations logic to manage XMSS functions, a chain function controller to manage chain function algorithms, a secure hash algorithm-2 (SHA2) accelerator, a secure hash algorithm-3 (SHA3) accelerator, and a register bank shared between the SHA2 accelerator and the SHA3 accelerator. Other examples may be described.
-
公开(公告)号:US20190041223A1
公开(公告)日:2019-02-07
申请号:US15858706
申请日:2017-12-29
Applicant: Intel Corporation
Inventor: Liuyang Yang , Manoj Sastry , Yonghong Huang , Xiruo Liu , Noor Abani
Abstract: An embodiment of a semiconductor package apparatus may include technology to acquire location related information, acquire local area characteristic information, and verify the location related information based on the local area characteristic information. Other embodiments are disclosed and claimed.
-
公开(公告)号:US20250106207A1
公开(公告)日:2025-03-27
申请号:US18373160
申请日:2023-09-26
Applicant: Intel Corporation
Inventor: Marcio Juliato , Manoj Sastry , Christopher Gutierrez , Vuk Lesi , Shabbir Ahmed
IPC: H04L9/40
Abstract: Techniques to perform time recovery from attacks on delayed authentication in a time synchronized network are described. One embodiment comprises a method for decoding time information and a message authentication code (MAC) from a time message, the time information to synchronize a local clock for a device to a network time of a time synchronized network (TSN), and the MAC to authenticate the time message, determining whether the time message is authentic using the MAC, discarding the time information when the time message is not authentic, performing a bounded search to identify authentic time information using the MAC, and passing the authentic time information to a clock manager to synchronize the local clock to the network time of the TSN when the authentic time information is identified. Other embodiments are described and claimed.
-
公开(公告)号:US20250080549A1
公开(公告)日:2025-03-06
申请号:US18240822
申请日:2023-08-31
Applicant: Intel Corporation
Inventor: Manoj Sastry , Christopher Gutierrez , Marcio Rogerio Juliato , Shabbir Ahmed , Vuk Lesi
Abstract: Techniques for an attack-aware digital twin in a time sensitive network are described. A method includes receiving time information for a network by an attack-aware digital twin (AADT), the AADT to simulate operations of a clock manager for a node in the network based on models of the clock manager, generating model clock control information to adjust a clock to a network time for the network, the model clock control information to contain a malicious time sample introduced by a time desynchronization attack in the network, and removing the malicious time sample from the model clock control information to adjust the clock to the network time for the network. Other embodiments are described and claimed.
-
-
-
-
-
-
-
-
-