-
公开(公告)号:US11018849B2
公开(公告)日:2021-05-25
申请号:US16666017
申请日:2019-10-28
Applicant: Cryptography Research, Inc.
Inventor: Matthew Pond Baker , Elena Trichina , Jean-Michel Cioranesco , Michael Hutter
Abstract: An integrated circuit may implement a masked substitution box that includes substitution function components, a decoder, and a logic component. Each of the substitution function components may receive a same input value and a different mask value and may generate a respective output mask value based on the same input value and respective different mask value The decoder may receive an input mask value and generate a decoded output value that is based on the received input mask value. The logic component may select one of the output mask values from one of the substitution function components based on the decoded output value.
-
公开(公告)号:US10855443B2
公开(公告)日:2020-12-01
申请号:US15646614
申请日:2017-07-11
Applicant: Cryptography Research, Inc.
Inventor: Elena Trichina , Guilherme Ozari de Almeida , Elke De Mulder
Abstract: Systems and methods for protecting from external monitoring attacks cryptographic data processing operations involving computation of a universal polynomial hash function, such as GHASH function. An example method may comprise: receiving an input data block, an iteration result value, and a mask value; performing a non-linear operation to produce a masked result value, wherein a first operand of the non-linear operation is represented by a combination of the iteration result value and the input data block, and the second operand of the non-linear operation is represented by a secret hash value, and wherein one of the first operand or the second operand is masked using a mask value; determining, based on the mask value, a mask correction value; and producing a new iteration result value by applying the mask correction value to the masked result value.
-
公开(公告)号:US20180062830A1
公开(公告)日:2018-03-01
申请号:US15673284
申请日:2017-08-09
Applicant: Cryptography Research, Inc.
Inventor: Matthew Pond Baker , Elena Trichina , Jean-Michel Cioranesco , Michael Hutter
CPC classification number: H04L9/0631 , G06F21/556 , G06F21/602 , G06F21/755 , H04L9/003 , H04L9/0618 , H04L2209/12
Abstract: An integrated circuit may implement a masked substitution box that includes a counter that generates counter values. An input mask component may generate unmasked input values based on a combination of respective counter values and an input mask value. Furthermore, a substitution function component may receive the unmasked input values and may generate output values based on respective unmasked input values and a substitution function. An output mask component may generate masked output values based on a combination of respective output values and an output mask value. The masked output values may be stored at memory elements.
-
公开(公告)号:US12261935B2
公开(公告)日:2025-03-25
申请号:US17105247
申请日:2020-11-25
Applicant: Cryptography Research, Inc.
Inventor: Elena Trichina , Guilherme Ozari de Almeida , Elke De Mulder
Abstract: Systems and methods for protecting from external monitoring attacks cryptographic data processing operations involving computation of a universal polynomial hash function, such as GHASH function. An example method may comprise: receiving an input data block, an iteration result value, and a mask value; performing a non-linear operation to produce a masked result value, wherein a first operand of the non-linear operation is represented by a combination of the iteration result value and the input data block, and the second operand of the non-linear operation is represented by a secret hash value, and wherein one of the first operand or the second operand is masked using a mask value; determining, based on the mask value, a mask correction value; and producing a new iteration result value by applying the mask correction value to the masked result value.
-
公开(公告)号:US20210256165A1
公开(公告)日:2021-08-19
申请号:US17169074
申请日:2021-02-05
Applicant: CRYPTOGRAPHY RESEARCH, INC.
Inventor: Guilherme Ozari de Almeida , Elena Trichina , Elke De Mulder
Abstract: Systems and methods for protecting from external monitoring attacks cryptographic data processing operations involving universal polynomial hash functions computation. An example method may comprise: receiving an input data block and an iteration result value; performing a first field multiplication operation to produce a new iteration result value, by iteratively processing, starting from a first bit position, bits of a combination of the input data block and the iteration result value, wherein the first bit position is represented by one of: a least-significant bit and a most-significant bit; performing a second field multiplication operation to produce a new mask correction value, by iteratively processing operand bits starting from a second bit position, wherein the second bit position is represented by one of: a least-significant bit and a most-significant bit, and wherein the second bit position is different from the first bit position; applying the new mask correction value to the new iteration result value; and producing, based on the new iteration result value, a value of a cryptographic hash function to be utilized by at least one of: an authenticated encryption operation or an authenticated decryption operation.
-
公开(公告)号:US10461925B2
公开(公告)日:2019-10-29
申请号:US15673284
申请日:2017-08-09
Applicant: Cryptography Research, Inc.
Inventor: Matthew Pond Baker , Elena Trichina , Jean-Michel Cioranesco , Michael Hutter
Abstract: An integrated circuit may implement a masked substitution box that includes a counter that generates counter values. An input mask component may generate unmasked input values based on a combination of respective counter values and an input mask value. Furthermore, a substitution function component may receive the unmasked input values and may generate output values based on respective unmasked input values and a substitution function. An output mask component may generate masked output values based on a combination of respective output values and an output mask value. The masked output values may be stored at memory elements.
-
公开(公告)号:US20210152331A1
公开(公告)日:2021-05-20
申请号:US17105247
申请日:2020-11-25
Applicant: Cryptography Research, Inc.
Inventor: Elena Trichina , Guilherme Ozari de Almeida , Elke De Mulder
Abstract: Systems and methods for protecting from external monitoring attacks cryptographic data processing operations involving computation of a universal polynomial hash function, such as GHASH function. An example method may comprise: receiving an input data block, an iteration result value, and a mask value; performing a non-linear operation to produce a masked result value, wherein a first operand of the non-linear operation is represented by a combination of the iteration result value and the input data block, and the second operand of the non-linear operation is represented by a secret hash value, and wherein one of the first operand or the second operand is masked using a mask value; determining, based on the mask value, a mask correction value; and producing a new iteration result value by applying the mask correction value to the masked result value.
-
公开(公告)号:US10771235B2
公开(公告)日:2020-09-08
申请号:US15682881
申请日:2017-08-22
Applicant: Cryptography Research, Inc.
Inventor: Jean-Michel Cioranesco , Elena Trichina , Elke De Mulder , Matthew Pond Baker
Abstract: Systems and methods for protecting block cipher computation operations, from external monitoring attacks. An example apparatus for implementing a block cipher may comprise: a first register configured to store a first pre-computed mask value represented by a combination of a first random value and a second random value; a second register configured to store an output mask value, wherein the output mask value is an inverse permutation function of the first random value; a third register configured to store a second pre-computed mask value represented by a combination the first pre-computed mask value and a permutation function of the output mask value; a fourth register configured to store an input mask value, wherein the input mask value is a combination of an expansion function of the first random value and a key mask value; a non-linear transformation circuit configured to apply the expansion function to a masked round state, perform a non-linear transformation of a combination of a masked key with an output of the expansion function, and apply the permutation function to the output of the non-linear transformation, wherein the non-linear transformation is defined using the input mask value stored in the fourth register and the output mask value stored in the second register; and two round feedback circuits configured to swap the masked round state produced by the non-linear transformation and combine the masked round state with the first pre-computed mask value stored in the first register and the second pre-computed mask value stored in the third register.
-
公开(公告)号:US20200026883A1
公开(公告)日:2020-01-23
申请号:US16471716
申请日:2017-12-13
Applicant: CRYPTOGRAPHY RESEARCH, INC.
Inventor: Guilherme Ozari de Almeida , Elena Trichina , Elke De Mulder
Abstract: Systems and methods for protecting from external monitoring attacks cryptographic data processing operations involving universal polynomial hash functions computation. An example method may comprise: receiving an input data block and an iteration result value; performing a first field multiplication operation to produce a new iteration result value, by iteratively processing, starting from a first bit position, bits of a combination of the input data block and the iteration result value, wherein the first bit position is represented by one of: a least-significant bit and a most-significant bit; performing a second field multiplication operation to produce a new mask correction value, by iteratively processing operand bits starting from a second bit position, wherein the second bit position is represented by one of: a least-significant bit and a most-significant bit, and wherein the second bit position is different from the first bit position; applying the new mask correction value to the new iteration result value; and producing, based on the new iteration result value, a value of a cryptographic hash function to be utilized by at least one of: an authenticated encryption operation or an authenticated decryption operation.
-
公开(公告)号:US12229322B2
公开(公告)日:2025-02-18
申请号:US17169074
申请日:2021-02-05
Applicant: CRYPTOGRAPHY RESEARCH, INC.
Inventor: Guilherme Ozari de Almeida , Elena Trichina , Elke De Mulder
Abstract: Systems and methods for protecting from external monitoring attacks cryptographic data processing operations involving universal polynomial hash functions computation. An example method may comprise: receiving an input data block and an iteration result value; performing a first field multiplication operation to produce a new iteration result value, by iteratively processing, starting from a first bit position, bits of a combination of the input data block and the iteration result value, wherein the first bit position is represented by one of: a least-significant bit and a most-significant bit; performing a second field multiplication operation to produce a new mask correction value, by iteratively processing operand bits starting from a second bit position, wherein the second bit position is represented by one of: a least-significant bit and a most-significant bit, and wherein the second bit position is different from the first bit position; applying the new mask correction value to the new iteration result value; and producing, based on the new iteration result value, a value of a cryptographic hash function to be utilized by at least one of: an authenticated encryption operation or an authenticated decryption operation.
-
-
-
-
-
-
-
-
-