Method for protecting the integrity of a fixed-length data structure
    1.
    发明申请
    Method for protecting the integrity of a fixed-length data structure 有权
    保护固定长度数据结构完整性的方法

    公开(公告)号:US20140223192A1

    公开(公告)日:2014-08-07

    申请号:US13762195

    申请日:2013-02-07

    Abstract: One feature pertains to a mechanism to secure a data structure by using a computationally efficient algorithm. A plurality of keys and/or masks may be pre-generated upon boot-up or initiation of a session. An authentication code may be computed for each data structure (e.g., memory block or header block) by selecting a subset of the plurality of pre-generated keys and/or a mask from the plurality of pre-generated masks. The authentication code may be stored within the data structure for future verification of the integrity of the data structure. The keys and/or masks used for all authentication codes (e.g., for other data structures) may be selected from the same plurality of keys and/or masks during the same cycle or session.

    Abstract translation: 一个特征涉及通过使用计算有效的算法来保护数据结构的机制。 可以在启动或启动会话时预先生成多个键和/或掩码。 可以通过从多个预生成的掩模中选择多个预先生成的密钥的子集和/或掩码来为每个数据结构(例如,存储块或头块)计算认证码。 认证码可以存储在数据结构中,以便将来验证数据结构的完整性。 用于所有认证码(例如,对于其他数据结构)的密钥和/或掩码可以在相同周期或会话期间从相同的多个密钥和/或掩码中选择。

    Method for protecting the integrity of a fixed-length data structure
    2.
    发明授权
    Method for protecting the integrity of a fixed-length data structure 有权
    保护固定长度数据结构完整性的方法

    公开(公告)号:US09298947B2

    公开(公告)日:2016-03-29

    申请号:US13762195

    申请日:2013-02-07

    Abstract: One feature pertains to a mechanism to secure a data structure by using a computationally efficient algorithm. A plurality of keys and/or masks may be pre-generated upon boot-up or initiation of a session. An authentication code may be computed for each data structure (e.g., memory block or header block) by selecting a subset of the plurality of pre-generated keys and/or a mask from the plurality of pre-generated masks. The authentication code may be stored within the data structure for future verification of the integrity of the data structure. The keys and/or masks used for all authentication codes (e.g., for other data structures) may be selected from the same plurality of keys and/or masks during the same cycle or session.

    Abstract translation: 一个特征涉及通过使用计算有效的算法来保护数据结构的机制。 可以在启动或启动会话时预先生成多个键和/或掩码。 可以通过从多个预生成的掩模中选择多个预先生成的密钥的子集和/或掩码来为每个数据结构(例如,存储块或头块)计算认证码。 认证码可以存储在数据结构中,以便将来验证数据结构的完整性。 用于所有认证码(例如,对于其他数据结构)的密钥和/或掩码可以在相同周期或会话期间从相同的多个密钥和/或掩码中选择。

    Linear feedback shift register (LFSR)
    3.
    发明授权
    Linear feedback shift register (LFSR) 有权
    线性反馈移位寄存器(LFSR)

    公开(公告)号:US09026791B2

    公开(公告)日:2015-05-05

    申请号:US13793710

    申请日:2013-03-11

    CPC classification number: H04W12/06 G06F7/584 H04L9/0668 H04L2209/122

    Abstract: A wireless communication device is described. The wireless communication device includes a linear feedback shift register. The linear feedback shift register is initialized. The linear feedback shift register is a word based odd characteristic linear feedback shift register. The linear feedback shift register includes multiple 64-bit registers. A feedback function output is generated using the 64-bit registers. The feedback function output is placed into a highest register of the linear feedback shift register.

    Abstract translation: 描述无线通信设备。 无线通信装置包括线性反馈移位寄存器。 线性反馈移位寄存器被初始化。 线性反馈移位寄存器是一个基于字的奇特征线性反馈移位寄存器。 线性反馈移位寄存器包括多个64位寄存器。 使用64位寄存器生成反馈功能输出。 反馈功能输出置于线性反馈移位寄存器的最高寄存器中。

    LINEAR FEEDBACK SHIFT REGISTER (LFSR)
    6.
    发明申请
    LINEAR FEEDBACK SHIFT REGISTER (LFSR) 有权
    线性反馈移位寄存器(LFSR)

    公开(公告)号:US20140258721A1

    公开(公告)日:2014-09-11

    申请号:US13793710

    申请日:2013-03-11

    CPC classification number: H04W12/06 G06F7/584 H04L9/0668 H04L2209/122

    Abstract: A wireless communication device is described. The wireless communication device includes a linear feedback shift register. The linear feedback shift register is initialized. The linear feedback shift register is a word based odd characteristic linear feedback shift register. The linear feedback shift register includes multiple 64-bit registers. A feedback function output is generated using the 64-bit registers. The feedback function output is placed into a highest register of the linear feedback shift register.

    Abstract translation: 描述无线通信设备。 无线通信装置包括线性反馈移位寄存器。 线性反馈移位寄存器被初始化。 线性反馈移位寄存器是一个基于字的奇特征线性反馈移位寄存器。 线性反馈移位寄存器包含多个64位寄存器。 使用64位寄存器生成反馈功能输出。 反馈功能输出置于线性反馈移位寄存器的最高寄存器中。

    Hardware-based stack control information protection
    8.
    发明授权
    Hardware-based stack control information protection 有权
    基于硬件的堆栈控制信息保护

    公开(公告)号:US09390264B2

    公开(公告)日:2016-07-12

    申请号:US14256681

    申请日:2014-04-18

    CPC classification number: G06F21/56 G06F21/52 G06F21/54

    Abstract: Techniques for protecting contents of a stack associated with a processor are provided. The techniques include a method including receiving a store instruction from a software program being executed by the processor, the store instruction including control information associated with a subroutine, altering the control information to generate secured control information responsive to receiving the store instruction from the software program, storing the secured control information on the stack, receiving a load instruction from the software program; and responsive to receiving the load instruction from the software program, loading the secured control information from the stack, altering the secured control information to recover the control information, and returning the control information to the software program.

    Abstract translation: 提供了用于保护与处理器相关联的堆栈的内容的技术。 这些技术包括一种方法,包括从由处理器执行的软件程序接收存储指令,存储指令包括与子程序相关的控制信息,改变控制信息以产生响应于从软件程序接收存储指令的安全控制信息 将所述安全控制信息存储在所述堆栈上,从所述软件程序接收加载指令; 并且响应于从所述软件程序接收到所述加载指令,从所述堆栈加载所述安全控制信息,改变所述安全控制信息以恢复所述控制信息,以及将所述控制信息返回给所述软件程序。

    COUNTERMEASURES AGAINST SIDE-CHANNEL ATTACKS ON CRYPTOGRAPHIC ALGORITHMS
    9.
    发明申请
    COUNTERMEASURES AGAINST SIDE-CHANNEL ATTACKS ON CRYPTOGRAPHIC ALGORITHMS 审中-公开
    反对算法的反向通道攻击的对策

    公开(公告)号:US20150222421A1

    公开(公告)日:2015-08-06

    申请号:US14171558

    申请日:2014-02-03

    Abstract: Techniques for encrypting data are provided that can be used to help prevent side-channel attacks on the cryptographic algorithms. An example method according to these techniques includes permuting an order of first intermediate data according to a predetermined permutation to produce permuted intermediate data. The first inter mediate data is output by one or more first stages of a cryptographic algorithm. The method also includes permuting a key to be used by one or more second stages of a cryptographic algorithm according to the predetermined permutation, applying the one or more second stages of a cryptographic algorithm to the permuted intermediate data to generate second intermediate data, the one or more second stages of the cryptographic algorithm using the permuted key, and permuting the second intermediate data according to an inverse permutation of the predetermined permutation to generate output.

    Abstract translation: 提供了用于加密数据的技术,可用于帮助防止对密码算法的侧信道攻击。 根据这些技术的示例性方法包括根据预定的排列来排列第一中间数据的顺序以产生置换的中间数据。 第一中介数据由加密算法的一个或多个第一阶段输出。 该方法还包括根据预定的排列置换密码算法的一个或多个第二阶段使用的密钥,将密码算法的一个或多个第二阶段应用于置换的中间数据以产生第二中间数据,该一个 或更多的第二级的加密算法,并且根据预定排列的逆置换来置换第二中间数据以产生输出。

Patent Agency Ranking