DATA PROCESSING SYSTEM HAVING MEMORY PROTECTION AND METHOD THEREFOR

    公开(公告)号:US20200264976A1

    公开(公告)日:2020-08-20

    申请号:US16278246

    申请日:2019-02-18

    Applicant: NXP B.V.

    Abstract: A data processing system and method for protecting a memory from unauthorized accesses are provided. The data processing system includes a system bus, a memory coupled to the system bus through a memory controller, and a processing core including a cache system. The memory controller is coupled to the system bus for controlling accesses to the memory that are requested by the processing core. A memory protection circuit is coupled to the system bus and to the processing core. The memory protection circuit uses one or more memory safety violation (MSV) indicators stored in out-of-bounds areas of the memory for detecting when the processing core attempts to access an out-of-bounds area of the memory. The processing core generates an error signal, such as an interrupt, when an attempt to access the out-of-bounds area is detected. The out-of-bounds area may be an unallocated area of the memory. The MSV indicator may be written to the memory by executing a flush instruction of the cache system and may include the same number of bits as a cache line of the cache system. A data value of the MSV indicator may be a secret data value.

    Peripheral based memory safety scheme for multi-core platforms

    公开(公告)号:US10678474B1

    公开(公告)日:2020-06-09

    申请号:US16206066

    申请日:2018-11-30

    Applicant: NXP B.V.

    Abstract: A computing system using low-fat pointers, including: a memory configured to be accessed by the low-fat pointers; a processing core configured to access the memory; an interrupt controller configured to receive interrupts and to communicate interrupts to processes running on the processing core; and a memory safety peripheral configured to receive a pointer request, wherein the pointer is a low-fat pointer and to verify that the pointer request is within required memory bounds.

    Securing a cryptographic device against implementation attacks

    公开(公告)号:US09961057B2

    公开(公告)日:2018-05-01

    申请号:US14850886

    申请日:2015-09-10

    Applicant: NXP B.V.

    Abstract: Methods of securing a cryptographic device against implementation attacks, are described. A disclosed method comprises the steps of obtaining a key (230) from memory of the cryptographic device; providing the key and a constant input (210) to an encryption module (240); deriving an output (250) of encrypted data bits using the encryption module (240); providing the output (250), the key (230) and an input vector (270) to a key update module (260); and using said key update module (260) to modify the key based on at least a part (270a) of the input vector (270) to derive an updated key (230a). This prevents the value of the key from being derived using the updated key or by using side-channel attacks because the input is constant for all keys. Additionally, by altering the input vector, the updated key is also altered.

    Securing a cryptographic device
    15.
    发明授权

    公开(公告)号:US10567155B2

    公开(公告)日:2020-02-18

    申请号:US15143259

    申请日:2016-04-29

    Applicant: NXP B.V.

    Abstract: Methods of securing a cryptographic device against implementation attacks are described. A disclosed method comprises the steps of: generating secret values (324) using a pseudorandom generator (510); providing a key (330), an input (324) having a number of chunks and the secret values to an encryption module (340); indexing the chunks and the secret values (324); processing the input chunk wise by encrypting the secret values (324) indexed by the chunks using the key (330) and the encryption module (340); generating for each chunk a pseudorandom output (330′) of the encryption module (340), providing the pseudorandom output as the key (330′) when processing the next chunk; and performing a final transformation on the last pseudorandom output (330′) from the previous step by using it as a key to encrypt a fixed plaintext.

    SECURING A CRYPTOGRAPHIC DEVICE
    19.
    发明申请
    SECURING A CRYPTOGRAPHIC DEVICE 审中-公开
    保护CRYPTOGRAPHIC设备

    公开(公告)号:US20160323097A1

    公开(公告)日:2016-11-03

    申请号:US15143259

    申请日:2016-04-29

    Applicant: NXP B.V.

    Abstract: Methods of securing a cryptographic device against implementation attacks are described. A disclosed method comprises the steps of: generating secret values (324) using a pseudorandom generator (510); providing a key (330), an input (324) having a number of chunks and the secret values to an encryption module (340); indexing the chunks and the secret values (324); processing the input chunk wise by encrypting the secret values (324) indexed by the chunks using the key (330) and the encryption module (340); generating for each chunk a pseudorandom output (330′) of the encryption module (340), providing the pseudorandom output as the key (330′) when processing the next chunk; and performing a final transformation on the last pseudorandom output (330′) from the previous step by using it as a key to encrypt a fixed plaintext.

    Abstract translation: 描述了保护加密设备免遭实施攻击的方法。 所公开的方法包括以下步骤:使用伪随机发生器(510)产生秘密值(324); 提供密钥(330),具有多个块的输入(324)和秘密值给加密模块(340); 索引大块和秘密值(324); 通过使用密钥(330)和加密模块(340)加密由块索引的秘密值(324)来处理输入块; 为每个块生成加密模块(340)的伪随机输出(330'),在处理下一个块时提供伪随机输出作为密钥(330'); 并且通过使用它作为加密固定明文的密钥,对前一步骤的最后伪随机输出(330')执行最终变换。

    Probabilistic memory safety using cryptography

    公开(公告)号:US11295025B2

    公开(公告)日:2022-04-05

    申请号:US16427977

    申请日:2019-05-31

    Applicant: NXP B.V.

    Abstract: A chip for securing storage of information includes a manager to access a pointer and a cipher engine to decrypt stored data. The pointer includes a first area and a second area. The first area includes an address indicating a storage location of the data and the second area includes a safety tag. The cipher engine decrypts the data output from the storage location based on a key and the safety tag in the second area of the pointer. These and other operations may be performed based on metadata that indicate probabilities that a correct safety tag was used to decrypt the data. In another embodiment, the manager may be replaced with an L1 cache.

Patent Agency Ranking