Ring oscillator based true random number generator and a method for generating a random number

    公开(公告)号:US11962305B2

    公开(公告)日:2024-04-16

    申请号:US17303839

    申请日:2021-06-09

    申请人: NXP B.V.

    发明人: Björn Fay

    摘要: A true random number generator circuit includes a ring oscillator and a plurality of sampling circuits. The ring oscillator includes a plurality of series-connected stages coupled together in a ring. An output of a last stage of the ring oscillator is coupled to an input of a first stage of the ring oscillator. A sampling circuit of the plurality of sampling circuits has an input coupled to a node located between two adjacent stages of the plurality of series-connected stages. Every node of the ring oscillator is coupled to a corresponding sampling circuit of the plurality of sampling circuits. In another embodiment, a method for generating a random number is provided.

    More secure data reading with error correction codes

    公开(公告)号:US11960358B1

    公开(公告)日:2024-04-16

    申请号:US17937138

    申请日:2022-09-30

    申请人: NXP B.V.

    发明人: Björn Fay

    IPC分类号: G06F11/00 G06F11/10 G06F21/56

    摘要: Various embodiments relate to a memory controller configured to read data from a memory array, including: an error correction codes (ECC) encoder configured to encode data stored in the memory array; an ECC decoder configured to decode first data read from the memory array based upon a first read request and detect errors in the first data read from the memory array; and a fault controller configured to: command the memory controller to read other data from the memory array when the ECC detects an error; command the memory controller to re-read the first data from the memory array; when the ECC detects an error; compare the re-read first data to the read first data; and signal a fault attack when the re-read first data is different from the read first data.

    NUMBER THEORETIC TRANSFORM WITH PARALLEL COEFFICIENT PROCESSING

    公开(公告)号:US20240348441A1

    公开(公告)日:2024-10-17

    申请号:US18132274

    申请日:2023-04-07

    申请人: NXP B.V.

    IPC分类号: H04L9/30 G06F17/14

    CPC分类号: H04L9/3093 G06F17/14

    摘要: Electronic device and method for performing number theoretic transforms (NTTs) on polynomials for cryptography uses an arithmetic transformation on an input polynomial with n coefficients to divide the input polynomial into multiple polynomials each with less than n coefficients such that the coefficients of the multiple polynomials add up to n. An NTT transformation is executed on the multiple polynomials such that the coefficients of each of the multiple polynomials are processed in parallel butterfly operations. A cryptographic operation is performed based on the results of the NTT transformation.

    Enhanced tearing save encoding
    4.
    发明授权

    公开(公告)号:US12113550B1

    公开(公告)日:2024-10-08

    申请号:US18331499

    申请日:2023-06-08

    申请人: NXP B.V.

    发明人: Björn Fay

    摘要: A method for encoding data to be stored in a memory, including: encoding the data to be stored in memory with an error correcting code (ECC) as first encoded data, wherein the ECC is configured to have a minimum Hamming distance of at least 4t+1 in order to correct up to t bit errors and detect up to 3t bit errors where t≥1; determining a Hamming weight of the first encoded data; encoding the determined Hamming weight, wherein for all higher Hamming weights the encoding should have at least 2t+1 bit-positions that change from 1 to 0 per Hamming weight; concatenating the first encoded data and the encoded Hamming weight as concatenated data; and storing the concatenated data in the memory.

    LOW-ENTROPY MASKING FOR CRYPTOGRAPHY
    6.
    发明公开

    公开(公告)号:US20240356748A1

    公开(公告)日:2024-10-24

    申请号:US18135922

    申请日:2023-04-18

    申请人: NXP B.V.

    IPC分类号: H04L9/30

    CPC分类号: H04L9/3093

    摘要: System and method for masking secret polynomials for cryptography receives a secret polynomial function in a polynomial ring, which is masked with one or more masking polynomials in which at least some coefficients have a same value. An arithmetic operation is performed on coefficients of the masking polynomials with repeated coefficients to produce an output having integer values. A cryptographic operation is then performed with the output of the arithmetic operation.

    METHOD FOR SECURELY PROVISIONING A DEVICE INCORPORATING AN INTEGRATED CIRCUIT WITHOUT USING A SECURE ENVIRONMENT

    公开(公告)号:US20230063743A1

    公开(公告)日:2023-03-02

    申请号:US17445742

    申请日:2021-08-24

    申请人: NXP B.V.

    摘要: A method is provided for secure provisioning of a device. In the method, a plurality of integrated circuit (IC) devices is manufactured by a first entity for use in the device. The first entity provides signed provisioning software and stores in at least one provisioning IC device one or more keys used for provisioning the plurality of ICs. The provisioning device with the signed provisioning software is provided to a second entity. The second entity verifies the provisioning software using a stored key. The provisioning software encrypts provisioning assets provided by the second entity and provides the encrypted provisioning assets to the third entity. The signed provisioning software is provided to a third entity by the first entity. During manufacturing of the manufactured products by the third entity, the provisioning software verifies and decrypts the encrypted provisioning assets of the second entity to provision all the plurality of IC devices.

    Masked decoding of polynomials
    8.
    发明授权

    公开(公告)号:US11595195B2

    公开(公告)日:2023-02-28

    申请号:US17226770

    申请日:2021-04-09

    申请人: NXP B.V.

    摘要: Various embodiments relate to a method for masked decoding of a polynomial a using an arithmetic sharing a to perform a cryptographic operation in a data processing system using a modulus q, the method for use in a processor of the data processing system, including: subtracting an offset δ from each coefficient of the polynomial a; applying an arithmetic to Boolean (A2B) function on the arithmetic shares of each coefficient ai of the polynomial a to produce Boolean shares âi that encode the same secret value ai; and performing in parallel for all coefficients a shared binary search to determine which of coefficients ai are greater than a threshold t to produce a Boolean sharing value {circumflex over (b)} of the bitstring b where each bit of b decodes a coefficient of the polynomial a.

    METHOD FOR POST-QUANTUM SECURE IN-THE-FIELD TRUST PROVISIONING

    公开(公告)号:US20240313963A1

    公开(公告)日:2024-09-19

    申请号:US18183310

    申请日:2023-03-14

    申请人: NXP B.V.

    IPC分类号: H04L9/08 H04L9/32

    摘要: A method for provisioning a plurality of IC devices, the method including: providing, by a first entity, the plurality of IC devices; storing, by the first entity, in one of the plurality of IC devices used as a provisioning device, one or more keys, and a public key, wherein the one or more keys include a reprovisioning key for reprovisioning the remaining IC devices; installing, by the first entity, provisioning software in the provisioning device; signing, by the first entity, provisioning software using a private key, the private key corresponding to the public key; provisioning the remaining IC devices by the provisioning device including providing cryptographic assets to the remaining IC devices, wherein the cryptographic assets include cryptographic code and keys; and reserving space in the remaining IC devices for reprovisioning the remaining IC devices with updated cryptographic assets.

    RANDOM NUMBER GENERATOR REAL-TIME ENTROPY EVALUATION

    公开(公告)号:US20240201953A1

    公开(公告)日:2024-06-20

    申请号:US18081965

    申请日:2022-12-15

    申请人: NXP B.V.

    发明人: Björn Fay

    IPC分类号: G06F7/58 H03K3/84

    CPC分类号: G06F7/588 H03K3/84 H03K19/21

    摘要: An entropy generator comprises an entropy source to generate a random bitstream and an entropy evaluator communicatively coupled to the entropy source to receive the random bitstream. The entropy evaluator includes a first counter to maintain a repetition count of one or more patterns of multiple bits successively included in the random bitstream, and an alert generator communicatively coupled to the first counter to generate an alert in response to the repetition count exceeding a defined threshold. The repetition count may be based on one or more exclusive-or (XOR) operations of a current bit of the random bitstream with one or more previous bits of the random bitstream.