-
公开(公告)号:US12045334B2
公开(公告)日:2024-07-23
申请号:US18305695
申请日:2023-04-24
Applicant: PROTON WORLD INTERNATIONAL N.V.
Inventor: Jean-Louis Modave , Michael Peeters
Abstract: The present disclosure relates to an authentication method of a first device by a second device, each first, second device having a processor, at least one memory, and an authentication circuit, in which the authentication circuit is configured to prohibit the processor from reading data stored in at least part of said memory. The authenticating includes generating a first datum, and a second datum. The second device verifies that the first and second data match.
-
公开(公告)号:US12001347B2
公开(公告)日:2024-06-04
申请号:US17653382
申请日:2022-03-03
Applicant: Proton World International N.V.
Inventor: Michael Peeters
CPC classification number: G06F12/1408 , G06F12/0238 , G06F12/1441 , G06F12/1458
Abstract: The present disclosure relates to secure storage, in a non-volatile memory, of initial data encrypted using a second data, including selecting a pointer aimed at an initial address of a memory cell of an initial part of the non-volatile memory, and encrypting the pointer using the second data; and-storing the encrypted pointer in the non-volatile memory.
-
公开(公告)号:US11669610B2
公开(公告)日:2023-06-06
申请号:US17224013
申请日:2021-04-06
Applicant: PROTON WORLD INTERNATIONAL N.V.
Inventor: Jean-Louis Modave , Michael Peeters
Abstract: The present disclosure relates to an authentication method of a first device by a second device, each first, second device having a processor, at least one memory, and an authentication circuit, in which the authentication circuit is configured to prohibit the processor from reading data stored in at least part of said memory. The authenticating includes generating a first datum, and a second datum. The second device verifies that the first and second data match.
-
公开(公告)号:US11025426B2
公开(公告)日:2021-06-01
申请号:US16249799
申请日:2019-01-16
Applicant: PROTON WORLD INTERNATIONAL N.V.
Inventor: Joan Daemen , Michael Peeters
Abstract: The disclosure concerns an encryption function applied to a first word, a second word, a third word, and a fourth word including: multiplying the third word by the fourth word; adding the result of the multiplication; subtracting the result of the addition to the second word from the result of the addition to the first word; adding the result of the subtraction; combining with a constant the result of the addition of the third word to the result of the subtraction; and multiplying by two the result of said combination and circularly shifting the codes of the respective results of the addition of the fourth word to the result of the subtraction, of the addition of the second word to the result of the multiplication, and of the addition of the first word to the result of the multiplication.
-
公开(公告)号:US10970384B2
公开(公告)日:2021-04-06
申请号:US16400495
申请日:2019-05-01
Applicant: Proton World International N.V.
Inventor: Jean-Louis Modave , Michael Peeters
Abstract: In authenticating a first circuit by a second circuit, the second circuit selects one of a set of public values and sends to the first circuit a request for a secret value corresponding to the selected one of the set of public values. The first circuit derives the secret value from the selected one of the set of public values using a seed from set of seeds that is stored in a destructive fashion such that each use of a seed destroys that seed. The set of seeds is smaller in number than the set of public values. The second circuit determines whether the secret value matches the selected one of the set of public values using a one-way function. A positive authentication is generated based upon the determination of a match.
-
公开(公告)号:US20180150634A1
公开(公告)日:2018-05-31
申请号:US15659445
申请日:2017-07-25
Inventor: Jean-Louis Modave , Fabrice Marinet , Michael Peeters
CPC classification number: G06F21/556 , G06F21/72 , G06F21/75 , G06F21/755 , G06F21/76 , H04L9/002 , H04L2209/043 , H04L2209/08
Abstract: An integrated circuit includes functional circuitry such as a processing core, memory interfaces, cryptographic circuitry, etc. The integrated circuit also includes protection circuitry to protect the functional circuitry of the integrated circuit against attacks by hidden channels. The protection circuitry, for each of a series of successive periods of time, selects a configuration of the functional circuitry from a set of configurations of the functional circuitry, sets a duration of the period of time, and applies the selected configuration of the functional circuitry for the set duration of the period of time.
-
-
-
-
-