-
公开(公告)号:US11983280B2
公开(公告)日:2024-05-14
申请号:US17309937
申请日:2020-01-06
Applicant: Cryptography Research, Inc.
Inventor: Michael Alexander Hamburg , Michael Tunstall , Michael Hutter
CPC classification number: G06F21/602 , G06F7/523 , G06F7/588 , G06F17/16 , G06F21/78
Abstract: Aspects of the present disclosure involve a method and a system to support execution of the method to perform a cryptographic operation involving a first vector and a second vector, by projectively scaling the first vector, performing a first operation involving the scaled first vector and the second vector to obtain a third vector, generating a random number, storing the third vector in a first location, responsive to the random number having a first value, or in a second location, responsive to the random number having a second value, and performing a second operation involving a first input and a second input, wherein, based on the random number having the first value or the second value, the first input is the third vector stored in the first location or the second location and the second input is a fourth vector stored in the second location or the first location.
-
公开(公告)号:US11700111B2
公开(公告)日:2023-07-11
申请号:US16909530
申请日:2020-06-23
Applicant: Cryptography Research, Inc.
Inventor: Michael Tunstall
CPC classification number: H04L9/0625 , G06F21/755 , H04L9/003 , H04L9/0631 , H04L2209/043 , H04L2209/046 , H04L2209/24
Abstract: Systems and methods for protecting block cipher computation operations from external monitoring attacks. An example apparatus for implementing a block cipher may comprise a memory device to store instructions for computing a block cipher; and a processing device coupled to the memory device. The processing device performs a Data Encryption Standard (DES) cryptographic operation with multiple rounds of a Feistel structure, each round including a substitution function and a transformation function that combines an expansion function and a permutation function into a single operation. The transformation function transforms a first input portion of an internal state of the respective round and a second input portion of the internal state into a first output portion and a second output portion of data. The second output portion is equal to the first input portion and the first output portion is dependent on a combined permutation output from the transformation function.
-
13.
公开(公告)号:US20220166614A1
公开(公告)日:2022-05-26
申请号:US17532460
申请日:2021-11-22
Applicant: Cryptography Research, Inc.
Inventor: Michael Tunstall , Michael Alexander Hamburg , Qinglai Xiao
Abstract: Aspects of the present disclosure involve a method, a system and a computer readable memory to perform a cryptographic operation that includes identifying a first set of mutually coprime numbers, obtaining a second set of input numbers coprime with a corresponding one of the first set of mutually coprime numbers, obtaining an output number that is a weighted sum of the second set of input numbers, each of the second set of input numbers being taken with a weight comprising a product of all of the first set of mutually coprime numbers except the corresponding one of the first set of mutually coprime numbers, and performing the cryptographic operation using the output number.
-
公开(公告)号:US20210391975A1
公开(公告)日:2021-12-16
申请号:US17339689
申请日:2021-06-04
Applicant: Cryptography Research, Inc.
Inventor: Michael Tunstall
Abstract: A first share value and a second share value may be received. A combination of the first share value and the second share value may correspond to an exponent value. The value of a first register is updated using a first equation that is based on the first and second share values and the value of a second register is updated using a second equation that is based on the second share value. One of the value of the first register or the value of the second register is selected based on a bit value of the second share value.
-
15.
公开(公告)号:US20210173618A1
公开(公告)日:2021-06-10
申请号:US17124374
申请日:2020-12-16
Applicant: Cryptography Research, Inc.
Inventor: Michael Hutter , Michael Tunstall
IPC: G06F7/76 , G06F7/58 , G09C1/00 , H04L9/14 , G06F21/72 , H04L9/30 , G06F7/00 , H04L9/00 , H04L9/06
Abstract: A first input share value, a second input share value, and a third input share value may be received. The first input share value may be converted to a summation or subtraction between an input value and a combination of the second input share value and the third input share value. A random number value may be generated and combined with the second input share value and the third input share value to generate a combined value. Furthermore, a first output share value may be generated based on a combination of the converted first input share value, the combined value, and additional random number values.
-
16.
公开(公告)号:US11902432B2
公开(公告)日:2024-02-13
申请号:US17532460
申请日:2021-11-22
Applicant: Cryptography Research, Inc.
Inventor: Michael Tunstall , Michael Alexander Hamburg , Qinglai Xiao
CPC classification number: H04L9/0861 , G06F7/02
Abstract: Aspects of the present disclosure involve a method, a system and a computer readable memory to perform a cryptographic operation that includes identifying a first set of mutually coprime numbers, obtaining a second set of input numbers coprime with a corresponding one of the first set of mutually coprime numbers, obtaining an output number that is a weighted sum of the second set of input numbers, each of the second set of input numbers being taken with a weight comprising a product of all of the first set of mutually coprime numbers except the corresponding one of the first set of mutually coprime numbers, and performing the cryptographic operation using the output number.
-
公开(公告)号:US11418334B2
公开(公告)日:2022-08-16
申请号:US16756099
申请日:2018-10-08
Applicant: CRYPTOGRAPHY RESEARCH, INC.
Inventor: Michael Alexander Hamburg , Michael Tunstall
Abstract: Systems and methods for performing modular inversion operations in a manner protected from external monitoring attacks. An example method comprises: determining, by a processor, a first masked value based on a public cryptographic key and a first random integer value; determining a second masked value based on the public cryptographic key and a second random integer value, and determining, based on the first masked value and the second masked value, a private cryptographic key represented by a modular inversion of the public cryptographic key.
-
公开(公告)号:US20220075879A1
公开(公告)日:2022-03-10
申请号:US17309937
申请日:2020-01-06
Applicant: Cryptography Research, Inc.
Inventor: Michael Alexander Hamburg , Michael Tunstall , Michael Hutter
Abstract: Aspects of the present disclosure involve a method and a system to support execution of the method to perform a cryptographic operation involving a first vector and a second vector, by projectively scaling the first vector, performing a first operation involving the scaled first vector and the second vector to obtain a third vector, generating a random number, storing the third vector in a first location, responsive to the random number having a first value, or in a second location, responsive to the random number having a second value, and performing a second operation involving a first input and a second input, wherein, based on the random number having the first value or the second value, the first input is the third vector stored in the first location or the second location and the second input is a fourth vector stored in the second location or the first location.
-
公开(公告)号:US11251935B2
公开(公告)日:2022-02-15
申请号:US16816737
申请日:2020-03-12
Applicant: Cryptography Research, Inc.
Inventor: Michael Tunstall
Abstract: A value corresponding to an input for a cryptographic operation may be received. The value may blinded by multiplying the value based on an exponentiation of a random number raised to an exponent value that is associated with a public key. A cryptographic operation may be performed based on the blinded value.
-
公开(公告)号:US10594471B2
公开(公告)日:2020-03-17
申请号:US15073225
申请日:2016-03-17
Applicant: Cryptography Research, Inc.
Inventor: Michael Tunstall
Abstract: A value corresponding to an input for a cryptographic operation may be received. The value may blinded by multiplying the value based on an exponentiation of a random number raised to an exponent value that is associated with a public key. A cryptographic operation may be performed based on the blinded value.
-
-
-
-
-
-
-
-
-