SHARING CRYPTOGRAPHIC MATERIAL
    1.
    发明公开

    公开(公告)号:US20240048385A1

    公开(公告)日:2024-02-08

    申请号:US18482537

    申请日:2023-10-06

    申请人: PQShield Ltd

    IPC分类号: H04L9/32

    CPC分类号: H04L9/3213 H04L9/3247

    摘要: A method includes, at a first communications device: processing encapsulation keys of a plurality of second communications devices using an encapsulation function to generate a symmetric key, an authenticable token, and a ciphertext; and transmitting, to each of the second communications devices, the token and a respective portion of the ciphertext depending on the respective encapsulation key of that second communications device. The token is a cryptographic commitment of the symmetric key, and the ciphertext is a multi-recipient encapsulation of the symmetric key under the encapsulation keys of the second communications devices. The method further includes, at each second communications device: processing the respective decapsulation key and the respective portion of the ciphertext using a decapsulation function to generate a respective candidate copy of the symmetric key; authenticating the token, whereby to determine that the respective candidate copy of the symmetric key corresponds to the symmetric key.

    METHODS OF GENERATING A KEY AND A COMMUNICATION METHOD

    公开(公告)号:US20220294611A1

    公开(公告)日:2022-09-15

    申请号:US17825845

    申请日:2022-05-26

    申请人: PQShield Ltd.

    IPC分类号: H04L9/08 H04L9/32 H04L9/14

    摘要: A key generation method is provided. A first peer obtains an ephemeral key from a second peer via a server. The first peer uses the ephemeral key to compute a ciphertext that encrypts a first parameter. The first peer uses the first parameter to generate a session key. The ciphertext is sent to the server by the first peer to allow the second peer to generate the session key. The key may be subsequently used for communication, such as by using a key management algorithm such as Double Rachet.

    CRYPTOGRAPHIC ARCHITECTURE FOR CRYPTOGRAPHIC PERMUTATION

    公开(公告)号:US20220138349A1

    公开(公告)日:2022-05-05

    申请号:US17576299

    申请日:2022-01-14

    申请人: PQShield Ltd

    IPC分类号: G06F21/72 H04L9/06

    摘要: Cryptographic methods and systems are described. Certain examples relate to performing cryptographic operations that involve a cryptographic permutation. The methods and systems may be used to provide cryptographic functions such as hashing, encryption, decryption and random number generation. In one example, a cryptographic architecture is provided. The cryptographic architecture has a processor interface comprising a set of cryptographic registers, where the processor interface is accessible by at least one processing unit. The cryptographic architecture also has a cryptographic permutation unit comprising circuitry to perform a cryptographic permutation using data stored within the set of cryptographic registers. In examples, the at least one processing unit instructs the cryptographic permutation and accesses a result of the cryptographic permutation using the processor interface.

    CRYPTOGRAPHY USING A CRYPTOGRAPHIC STATE

    公开(公告)号:US20220066741A1

    公开(公告)日:2022-03-03

    申请号:US17478518

    申请日:2021-09-17

    申请人: PQShield Ltd

    摘要: Cryptographic methods and systems are described. Certain examples relate to performing cryptographic operations by updating a cryptographic state. The methods and systems may be used to provide cryptographic functions such as hashing, encryption, decryption and random number generation. In one example, a non-linear feedback shift register or expander sequence is defined. The non-linear feedback shift register or expander sequence has a plurality of stages to receive the cryptographic state, wherein at least one of the plurality of stages is updated as a non-linear function of one or more other stages. In certain examples, a cryptographic state is updated over a plurality of rounds. Examples adapted for authenticated encryption and decryption, hashing, and number generation are described.

    METHODS AND SYSTEMS FOR UPDATABLE ENCRYPTION

    公开(公告)号:US20230396432A1

    公开(公告)日:2023-12-07

    申请号:US18330051

    申请日:2023-06-06

    申请人: PQShield Ltd

    发明人: Rafaël Del Pino

    IPC分类号: H04L9/08

    CPC分类号: H04L9/0891

    摘要: Described herein are methods and systems for updating encryption keys. The updating may comprise application of an update token to a key to generate a second key. The updating may comprise application of a second update token to the key to generate a third key. The key may be the same key in both update operations.

    Secure update propagation with digital signatures

    公开(公告)号:US11635952B2

    公开(公告)日:2023-04-25

    申请号:US17125573

    申请日:2020-12-17

    申请人: PQShield Ltd

    摘要: Certain examples described herein relate to secure update propagation. The examples present systems and methods to transmit data in the form of updates over a network and to ensure the authenticity of the updates. The examples use a set-homomorphic digital signature scheme to sign updates such that a combined digital signature may be used to verify a batch of updates in place of a set of individual digital signatures. The combined digital signature may be generated by aggregating individual digital signatures.

    Cryptography using a cryptographic state

    公开(公告)号:US11822901B2

    公开(公告)日:2023-11-21

    申请号:US17478518

    申请日:2021-09-17

    申请人: PQShield Ltd

    摘要: Cryptographic methods and systems are described. Certain examples relate to performing cryptographic operations by updating a cryptographic state. The methods and systems may be used to provide cryptographic functions such as hashing, encryption, decryption and random number generation. In one example, a non-linear feedback shift register or expander sequence is defined. The non-linear feedback shift register or expander sequence has a plurality of stages to receive the cryptographic state, wherein at least one of the plurality of stages is updated as a non-linear function of one or more other stages. In certain examples, a cryptographic state is updated over a plurality of rounds. Examples adapted for authenticated encryption and decryption, hashing, and number generation are described.