GENERATING A KEY AT A DEVICE BASED ON A MEMORY OF THE DEVICE

    公开(公告)号:US20190342092A1

    公开(公告)日:2019-11-07

    申请号:US16405065

    申请日:2019-05-07

    Inventor: Helena Handschuh

    Abstract: An indication of a key generation function may be received from a server. A random value may be received based on a volatile memory of a device. A cryptographic key may be generated based on the key generation function from the server and the random value that is based on the volatile memory of the device. The cryptographic key may be stored at a non-volatile memory of the device.

    PROTECTING MEDIA ITEMS USING A MEDIA SECURITY CONTROLLER

    公开(公告)号:US20190018934A1

    公开(公告)日:2019-01-17

    申请号:US16122362

    申请日:2018-09-05

    CPC classification number: G06F21/10 G06F2221/0724

    Abstract: A media storage device includes a media security controller circuit and a memory to store data that relates to a media item to be rendered by a rendering device. The media security controller circuit sends a message to the rendering device that causes the rendering device to obtain a portion of data from memory of the media storage device and provide it to the media security controller circuit. The portion is received and transformed by the media security controller circuit. The media security controller circuit sends the transformed portion to the rendering device.

    PROTECTION OF TRANSFORMATIONS BY INTERMEDIATE RANDOMIZATION IN CRYPTOGRAPHIC OPERATIONS

    公开(公告)号:US20230254115A1

    公开(公告)日:2023-08-10

    申请号:US18008602

    申请日:2021-06-04

    CPC classification number: H04L9/0631 G06F17/142

    Abstract: Aspects of the present disclosure involve a method and a system to perform a cryptographic operation that involves a number theoretic transformation of a first vector to a second vector by obtaining components of the first vector, performing a plurality of iterations that each include determining a plurality of output values, wherein each of the plurality of output values is a linear combination of two or more input values, the input values into a first iteration being the components of the first vector and the output values of the last iteration being representative of components of the second vector, and wherein one or more of the output values of at least one iteration are randomized by multiplying at least one input value by a random number, and determining, based on the output values of the last of the plurality of iterations, the components of the second vector.

    MASKING WITH EFFICIENT UNMASKING VIA DOMAIN EMBEDDING IN CRYPTOGRAPHIC DEVICES AND APPLICATIONS

    公开(公告)号:US20250038977A1

    公开(公告)日:2025-01-30

    申请号:US18784550

    申请日:2024-07-25

    Abstract: Disclosed aspects and implementations are directed to systems and techniques for protecting cryptographic operations against side-channel attacks. In one example, polynomials associated with secret data and public data defined on a working domain having a first dimension are mapped to an auxiliary domain having a larger second dimension. The mapped polynomials are masked using masking polynomials associated with a kernel of a homomorphism transformation from the auxiliary domain to the working domain. One or more computations are then performed on the masked polynomials in the auxiliary domain and an output is transformed from the auxiliary domain to the working domain.

Patent Agency Ranking