-
公开(公告)号:US20200174694A1
公开(公告)日:2020-06-04
申请号:US16206066
申请日:2018-11-30
Applicant: NXP B.V.
Inventor: Marcel MEDWED , Jan HOOGERBRUGGE , Ventzislav NIKOV
Abstract: A computing system using low-fat pointers, including: a memory configured to be accessed by the low-fat pointers; a processing core configured to access the memory; an interrupt controller configured to receive interrupts and to communicate interrupts to processes running on the processing core; and a memory safety peripheral configured to receive a pointer request, wherein the pointer is a low-fat pointer and to verify that the pointer request is within required memory bounds
-
公开(公告)号:US20200380140A1
公开(公告)日:2020-12-03
申请号:US16427977
申请日:2019-05-31
Applicant: NXP B.V.
Inventor: Marcel MEDWED , Jan HOOGERBRUGGE , Ventzislav NIKOV , Asier GOIKOETXEA YANCI
Abstract: A chip for securing storage of information includes a manager to access a pointer and a cipher engine to decrypt stored data. The pointer includes a first area and a second area. The first area includes an address indicating a storage location of the data and the second area includes a safety tag. The cipher engine decrypts the data output from the storage location based on a key and the safety tag in the second area of the pointer. These and other operations may be performed based on metadata that indicate probabilities that a correct safety tag was used to decrypt the data. in another embodiment, the manager may be replaced with an L1 cache.
-
公开(公告)号:US20190132116A1
公开(公告)日:2019-05-02
申请号:US15795890
申请日:2017-10-27
Applicant: NXP B.V.
Inventor: Wilhelmus Petrus Adrianus Johannus MICHIELS , Marcel MEDWED , Jan HOOGERBRUGGE , Ventzislav NIKOV , Bruce MURRAY , Joppe Willem BOS
Abstract: A method for implementing a pseudo-random function (PRF) using a white-box implementation of a cryptographic function in N rounds, including: receiving an input to the PRF; receiving a cryptographic key in a first round; encrypting, using the white-box implementation of the cryptographic function and the cryptographic key, an input message that is one of M possible input messages based upon a portion of the input to produce a first output; for each succeeding round: encrypting, using the white-box implementation of the cryptographic function and an ith cryptographic key, further input messages that are one of M possible input messages based upon a further portion of the input to produce an ith output, wherein the ith cryptographic key is the output from the preceding round, wherein the white-box implementation of the cryptographic function only produces a correct output for the M possible input messages and produces an incorrect output for input messages that are not one of the M possible input messages.
-
-