COMBINED POST-QUANTUM SECURITY UTILIZING REDEFINED POLYNOMIAL CALCULATION

    公开(公告)号:US20220014363A1

    公开(公告)日:2022-01-13

    申请号:US17484820

    申请日:2021-09-24

    Abstract: Combined post-quantum security utilizing redefined polynomial calculation is described. An example of an apparatus includes a first circuit for key encapsulation operation; a second circuit for digital signature operation; and a NTT (Number Theoretic Transform) multiplier circuit, wherein the NTT multiplier circuit provides for polynomial multiplication for both the first circuit and the second circuit, wherein the apparatus is to remap coefficients of polynomials for the first circuit to a prime modulus for the second circuit, and perform polynomial multiplication for the first circuit utilizing the remapped coefficients of the polynomials for the first circuit.

    ROBUST STATE SYNCHRONIZATION FOR STATEFUL HASH-BASED SIGNATURES

    公开(公告)号:US20210306155A1

    公开(公告)日:2021-09-30

    申请号:US16830844

    申请日:2020-03-26

    Abstract: In one example an apparatus comprises a computer readable memory, a signing facility comprising a plurality of hardware security modules, and a state synchronization manager comprising processing circuitry to select, from the plurality of hardware security modules, a set of hardware security modules to be assigned to a digital signature process, the set of hardware security modules comprising at least a first hardware security module and a second hardware module, and assign a set of unique state synchronization counter sequences to the respective set of hardware security modules, the set of state synchronization counter sequences comprising at least a first state synchronization counter sequence and a second state synchronization counter sequence. Other examples may be described.

    CIRCUITRY AND METHODS FOR ATTENUATION AND OBFUSCATION FOR MITIGATING POWER AND ELECTROMAGNETIC FIELD ATTACKS ON ENCRYPTION CIRCUITRY

    公开(公告)号:US20250005209A1

    公开(公告)日:2025-01-02

    申请号:US18343609

    申请日:2023-06-28

    Abstract: Techniques for attenuation and obfuscation to mitigate power and/or electromagnetic (EM) field attacks on encryption circuitry are described. In certain examples, a system includes a processor core; and an accelerator coupled to the processor core, the accelerator comprising: encryption circuitry, coupled to a power source, to encrypt data into encrypted data, time-domain obfuscation control circuitry to connect and disconnect one or more capacitors to the encryption circuitry during the encrypt to provide obfuscation across a time-domain to maintain a software observable power consumption of the accelerator to about a value, and signature attenuation control circuitry to selectively connect the encryption circuitry during the encrypt to a shunt to drain power to maintain the software observable power consumption of the accelerator at about the value.

    Inference models for intrusion detection systems in time sensitive networks

    公开(公告)号:US12095782B2

    公开(公告)日:2024-09-17

    申请号:US17706955

    申请日:2022-03-29

    CPC classification number: H04L63/1416 H04J3/0667 H04L63/145 H04L63/1475

    Abstract: Techniques to secure a time sensitive network are described. An apparatus may establish a data stream between a first device and a second device in a network domain, the network domain includes a plurality of switching nodes, receive messages from the first device by the second device in the network domain, the messages to comprise time information to synchronize a first clock for the first device and a second clock for the second device to a network time for the network domain, update a correction field for a received message with a residence time and time delay value by the second device, determine whether the updated message is benign or malicious, update the correction field for the updated message with an inference time when the updated message is benign, and prevent relay of the updated message to other devices in the network domain when the updated message is malicious.

Patent Agency Ranking