-
公开(公告)号:US11520708B2
公开(公告)日:2022-12-06
申请号:US16707515
申请日:2019-12-09
Applicant: NXP B.V.
Inventor: Marcel Rene van Loon , Bruce Murray
IPC: G06F12/14 , G06F9/30 , G06F12/02 , G06F12/1018 , H04L9/06
Abstract: A memory system, comprising: i) a first electronic device comprising a processor, ii) a second electronic device being external to the first electronic device and comprising a memory, wherein the memory stores a memory image over at least a part of a data set stored on the memory, and iii) a hash value related to the memory image. The first electronic device and the second electronic device are coupled such that the processor has at least partial control over the second electronic device. The processor is configured to, when updating the data set stored on the memory of the second electronic device, also update the hash value related to the memory image using an incremental hashing operation so that only those parts of the memory image are processed that have changed.
-
公开(公告)号:US10341098B2
公开(公告)日:2019-07-02
申请号:US15414391
申请日:2017-01-24
Applicant: NXP B.V.
Inventor: Joppe Willem Bos , Bjorn Fay , Bruce Murray
Abstract: A method is provided for performing elliptic curve cryptography that reduces the number of required computations to produce, for example, a key pair. The number of computations is reduced by changing how a random nonce used in the computations is selected. In an embodiment, a look-up table is generated having pre-computed scalar values and elliptic curve points. Every time a new pseudo-random value is created for use in the ECDSA, a combination of the look-up table values is used to create multiple intermediate values. One of the multiple intermediate values is randomly chosen as a replacement value for one of the existing table entries. Each time the look-up table is used, multiple entries in the look-up table are updated to new look-up table values as described. In this manner, new randomness is provided in every step to generate the next pseudo-random nonce as a combination of multiple internally stored temporary look-up table values. Alternately, another mathematical group may be used.
-
公开(公告)号:US20190114115A1
公开(公告)日:2019-04-18
申请号:US15782292
申请日:2017-10-12
Applicant: NXP B.V.
Inventor: Thomas Wille , Bruce Murray
CPC classification number: G06F3/0679 , G06F12/0246 , G06F21/123 , G06F2221/2103 , G06F2221/2129 , G06K19/0723 , G11C16/06 , H04L9/0866 , H04L9/0877 , H04L9/3278
Abstract: In high security devices, like smart cards, the on-board software may be embedded in ROM (read only memory). But, based on flexibility arguments, non-volatile flash memory based software storage can be more preferred. This invention describes a method to recover from a situation of data loss on flash devices by combining the on-device available secure boot-loading with embedded physical unclonable functions (PUF), where the PUF provides the cryptographic key for starting the data recovery procedure.
-
公开(公告)号:US20180191498A1
公开(公告)日:2018-07-05
申请号:US15397462
申请日:2017-01-03
Applicant: NXP B.V.
Inventor: Bruce Murray
CPC classification number: H04L9/3013 , G06F7/725 , H04L9/0841 , H04L9/0844 , H04L9/14 , H04L9/3066
Abstract: A method of calculating the x-coordinate(xM) of a point mapping in an elliptic curve Diffie-Hellman key exchange protocol (EC-DHKF), wherein the point mapping is defined as sG+H, where sG is a point (xS,yS) on an elliptic curve and H is a point (xH,yH) on the elliptic curve, including: computing V=yS2 based upon the elliptic curve and xS; computing W=yH2 based upon the elliptic curve and xH; computing U=sqrt(W·V) mod p, where p is a large prime number; choosing U′=U or U′=p−U such that U′ based upon a characteristic agreed upon by the parties to the EC-DHKF; computing x based upon V, W, U′, xS, xH, and p.
-
公开(公告)号:US09979703B2
公开(公告)日:2018-05-22
申请号:US14569588
申请日:2014-12-12
Applicant: NXP B.V.
Inventor: Dimitri Warnez , Thierry Gouraud , Rafael Jan Josef Meeusen , Andreas Lessiak , Frank Siedel , Ernst Haselsteiner , Bruce Murray
IPC: H04L29/06 , H04L29/08 , H04L9/32 , G06F9/445 , H04W12/02 , H04W12/04 , G06F21/57 , H04W4/00 , H04W8/20
CPC classification number: H04L63/0428 , G06F8/65 , G06F21/572 , H04L9/32 , H04L9/3247 , H04L67/34 , H04L2463/062 , H04W4/50 , H04W8/205 , H04W12/02 , H04W12/04
Abstract: There is disclosed a method of providing a software update to a secure element comprised in a host device, comprising converting the software update into a sequence of ciphertext blocks using a chained encryption scheme, and transmitting said sequence of ciphertext blocks to the host device. Furthermore, there is disclosed a method of installing a software update on a secure element comprised in a host device, comprising receiving, by the host device, a sequence of ciphertext blocks generated by a method of providing a software update of the kind set forth, converting said sequence of ciphertext blocks into the software update, and installing the software update on the secure element. Furthermore, corresponding computer program products and a corresponding host device are disclosed.
-
-
-
-