-
公开(公告)号:US20220398339A1
公开(公告)日:2022-12-15
申请号:US17834511
申请日:2022-06-07
Applicant: Cryptography Research, Inc.
Inventor: Mark Evan Marson , Michael Alexander Hamburg , Helena Handschuh
Abstract: Described are implementations directed to protecting secret data against adversarial attacks by obfuscating the secret data during storage and communication. Obfuscation techniques include, among other things, splitting secret data into a plurality of portions, performing rotation of secret data, splitting secret data into a plurality of shares, modifying shares of secret data in view of the values of the shares, and various other protection mechanisms.
-
公开(公告)号:US11386236B2
公开(公告)日:2022-07-12
申请号:US16427636
申请日:2019-05-31
Applicant: Cryptography Research, Inc.
Inventor: Andrew John Leiserson , Mark Evan Marson , Megan Anneke Wachs
Abstract: A method of and system for gate-level masking of secret data during a cryptographic process is described. A mask share is determined, wherein a first portion of the mask share includes a first number of zero-values and a second number of one-values, and a second portion of the mask share includes the first number of one-values and the second number of zero-values. Masked data values and the first portion of the mask share are input into a first portion of masked gate logic, and the masked data values and the second portion of the mask share are input into a second portion of the masked gate logic. A first output from the first portion of the masked gate logic and a second output from the second portion of the masked gate logic are identified, wherein either the first output or the second output is a zero-value.
-
公开(公告)号:US20150169904A1
公开(公告)日:2015-06-18
申请号:US14565821
申请日:2014-12-10
Applicant: CRYPTOGRAPHY RESEARCH, INC.
Inventor: Andrew John Leiserson , Mark Evan Marson , Megan Anneke Wachs
CPC classification number: G06F21/72 , G06F21/71 , G06F21/755 , H04L9/003 , H04L2209/04 , H04L2209/12 , H04L2209/16
Abstract: A method of and system for gate-level masking of secret data during a cryptographic process is described. A mask share is determined, wherein a first portion of the mask share includes a first number of zero-values and a second number of one-values, and a second portion of the mask share includes the first number of one-values and the second number of zero-values. Masked data values and the first portion of the mask share are input into a first portion of masked gate logic, and the masked data values and the second portion of the mask share are input into a second portion of the masked gate logic. A first output from the first portion of the masked gate logic and a second output from the second portion of the masked gate logic are identified, wherein either the first output or the second output is a zero-value.
Abstract translation: 描述在密码处理期间秘密数据的门级掩蔽的方法和系统。 确定掩模共享,其中掩模共享的第一部分包括第一数量的零值和第二数量的一值,并且掩模共享的第二部分包括第一数量的一值,第二部分包括第二数量的一值 零值数。 掩蔽数据值和掩模共享的第一部分被输入到屏蔽门逻辑的第一部分中,并且掩蔽的数据值和掩模共享的第二部分被输入到被掩蔽的门逻辑的第二部分。 识别来自屏蔽门逻辑的第一部分的第一输出和来自屏蔽门逻辑的第二部分的第二输出,其中第一输出或第二输出都是零值。
-
公开(公告)号:US20240419831A1
公开(公告)日:2024-12-19
申请号:US18818336
申请日:2024-08-28
Applicant: Cryptography Research, Inc.
Inventor: Mark Evan Marson , Michael Alexander Hamburg , Helena Handschuh
Abstract: Aspects of the present disclosure involve implementations that may be used to protect neural network models against adversarial attacks by obfuscating neural network operations and architecture. Obfuscation techniques include obfuscating weights and biases of neural network nodes, obfuscating activation functions used by neural networks, as well as obfuscating neural network architecture by introducing dummy operations, dummy nodes, and dummy layers into the neural networks.
-
15.
公开(公告)号:US20240345916A1
公开(公告)日:2024-10-17
申请号:US18644084
申请日:2024-04-23
Applicant: Cryptography Research, Inc.
Inventor: Mark Evan Marson , Scott C. Best , Helena Handschuh , Winthrop John Wu
CPC classification number: G06F11/10 , H04L9/0866 , H04L9/3278
Abstract: A value corresponding to a physical variation of a device may be received. Furthermore, helper data associated with the physical variation of the device may be received. A result data may be generated based on a combination of the value corresponding to the physical variation of the device and the helper data. An error correction operation may be performed on the result data to identify one or more code words associated with the error correction operation. Subsequently, a target data may be generated based on the one or more code words.
-
16.
公开(公告)号:US20240078308A1
公开(公告)日:2024-03-07
申请号:US18267773
申请日:2021-12-16
Applicant: CRYPTOGRAPHY RESEARCH, INC.
Inventor: Mark Evan Marson , Michael Alexander Hamburg , Helena Handschuh
IPC: G06F21/55
CPC classification number: G06F21/55
Abstract: Aspects of the present disclosure involve implementations that may be used to protect neural network models against adversarial attacks by obfuscating neural network operations and architecture. Obfuscation techniques include obfuscating weights and biases of neural network nodes, obfuscating activation functions used by neural networks, as well as obfuscating neural network architecture by introducing dummy operations, dummy nodes, and dummy layers into the neural networks.
-
公开(公告)号:US11861051B2
公开(公告)日:2024-01-02
申请号:US16922205
申请日:2020-07-07
Applicant: Cryptography Research, Inc
Inventor: Andrew John Leiserson , Mark Evan Marson
CPC classification number: G06F21/755 , G06F21/78 , G09C1/00 , H04L9/003 , H04L9/0618 , H04L2209/08
Abstract: A cryptographic accelerator (processor) retrieves data blocks for processing from a memory. These data blocks arrive and are stored in an input buffer in the order they were stored in memory (or other known order)—typically sequentially according to memory address (i.e., in-order.) The processor waits until a certain number of data blocks are available in the input buffer and then randomly selects blocks from the input buffer for processing. This randomizes the processing order of the data blocks. The processing order of data blocks may be randomized within sets of data blocks associated with a single read transaction, or across sets of data blocks associated with multiple read transactions.
-
公开(公告)号:US11861047B2
公开(公告)日:2024-01-02
申请号:US17862134
申请日:2022-07-11
Applicant: Cryptography Research, Inc.
Inventor: Andrew John Leiserson , Mark Evan Marson , Megan Anneke Wachs
CPC classification number: G06F21/72 , G06F21/71 , G06F21/755 , H04L9/003 , H04L2209/04 , H04L2209/12 , H04L2209/16
Abstract: A method of and system for gate-level masking of secret data during a cryptographic process is described. A mask share is determined, wherein a first portion of the mask share includes a first number of zero-values and a second number of one-values, and a second portion of the mask share includes the first number of one-values and the second number of zero-values. Masked data values and the first portion of the mask share are input into a first portion of masked gate logic, and the masked data values and the second portion of the mask share are input into a second portion of the masked gate logic. A first output from the first portion of the masked gate logic and a second output from the second portion of the masked gate logic are identified, wherein either the first output or the second output is a zero-value.
-
公开(公告)号:US11416625B2
公开(公告)日:2022-08-16
申请号:US16963724
申请日:2019-01-30
Applicant: CRYPTOGRAPHY RESEARCH, INC.
Inventor: Mark Evan Marson , Michael A. Hamburg
Abstract: Systems and methods for protecting cryptographic keys stored in a non-volatile memory. An example method may comprise: storing a device root key in a non-volatile memory; storing a volatile key in a volatile memory; storing a masked cryptographic key in the non-volatile memory, wherein the masked cryptographic key is produced by combining a cryptographic key and the device root key; storing a masked device root key in the non-volatile memory, wherein the masked root key is produced by combining the device root key and the volatile key; and erasing the device root key from the non-volatile memory.
-
公开(公告)号:US20220198045A1
公开(公告)日:2022-06-23
申请号:US17553536
申请日:2021-12-16
Applicant: Cryptography Research, Inc.
Inventor: Mark Evan Marson , Michael Alexander Hamburg , Helena Handschuh
IPC: G06F21/62
Abstract: Aspects of the present disclosure involve implementations that may be used to protect neural network models against adversarial attacks by obfuscating neural network operations and architecture. Obfuscation techniques include obfuscating weights and biases of neural network nodes, obfuscating activation functions used by neural networks, as well as obfuscating neural network architecture by introducing dummy operations, dummy nodes, and dummy layers into the neural networks.
-
-
-
-
-
-
-
-
-