Space-efficient, side-channel attack resistant table lookups

    公开(公告)号:US07142670B2

    公开(公告)日:2006-11-28

    申请号:US09943720

    申请日:2001-08-31

    IPC分类号: H04K1/00 H04L9/00

    摘要: Methods, apparatus and computer software and hardware products providing method, apparatus and system solutions for implementing table lookups in a side-channel attack resistant manner. Embodiments are provided for devices and situations where there is limited amount of RAM memory available or restrictions on memory addressing. The solutions solve problems associated with look up tables with large indices, as well as problems associated with looking up large sized tables or a collection of tables of large cumulative size, in limited devices, in an efficient side-channel attack resistant manner. These solutions provide defenses against both first-order side channel attacks as well as higher-order side channel attacks. One aspect of the present invention is the creation of one or more random tables which are used possibly in conjunction with other tables to perform a table lookup. This denies an adversary information about the table lookup from the side channel and thereby imparting side-channel resistance to the table lookup operation. Another aspect of the present invention is the use of a combination of some operations such as Table Split, Table Mask and Table Aggregate, to achieve this side-channel resistance within the limited amounts of available RAM and limited memory addressing capabilities of the device performing table lookups.

    System and method for protecting against leakage of sensitive information from compromising electromagnetic emanations from computing systems
    2.
    发明授权
    System and method for protecting against leakage of sensitive information from compromising electromagnetic emanations from computing systems 失效
    用于防止敏感信息泄露的计算机系统和方法免受来自计算系统的电磁辐射的影响

    公开(公告)号:US06978446B2

    公开(公告)日:2005-12-20

    申请号:US10109297

    申请日:2002-03-27

    IPC分类号: G06F21/00 G09F9/44

    CPC分类号: G06F21/556

    摘要: A method for changing an operation performed by an electronic device includes defining a process flow chart of the operation to be performed by the electronic device, the process flow chart having one or more primitive actions, the operation having one or more components, the primitive action operating on the components to produce an output. The method further includes determining a number of information dispersal units for each of the components. For each of the components, defining a set of information dispersal units, transforming one or more of the primitive actions of the operation using a transform function to create a transformed primitive action, and applying each of the transformed primitive actions to all the respective sets of information dispersal units to produce a transformed set of transformed information dispersal units.

    摘要翻译: 一种用于改变由电子设备执行的操作的方法包括定义由电子设备执行的操作的处理流程图,具有一个或多个原始动作的处理流程图,具有一个或多个组件的操作,原始动作 在组件上运行以产生输出。 该方法还包括为每个组件确定多个信息分散单元。 对于每个组件,定义一组信息分散单元,使用变换函数来变换操作的一个或多个原始动作以创建变换的原始动作,并且将每个经变换的原始动作应用于所有相应的组 信息分散单位来生成一组转换后的信息分散单元。

    Risk adaptive information flow based access control
    3.
    发明授权
    Risk adaptive information flow based access control 失效
    基于风险自适应信息流的访问控制

    公开(公告)号:US08650623B2

    公开(公告)日:2014-02-11

    申请号:US11623838

    申请日:2007-01-17

    摘要: Systems and methods are provided to manage risk associated with access to information within a given organization. The overall risk tolerance for the organization is determined and allocated among a plurality of subjects within the organization. Allocation is accomplished using either a centralized, request/response or free market mechanism. As requested from subjects within the organization for access to objects, i.e. information and data, are received, the amount of risk or risk level associated with each requested is quantified. Risk quantification can be accomplished using, for example, fuzzy multi-level security. The quantified risk associated with the access request in combination with the identity of the object and the identity of the subject are used to determine whether or not the request should be granted, denied or granted with appropriated mitigation measures.

    摘要翻译: 提供系统和方法来管理与给定组织内的信息访问相关的风险。 确定组织的整体风险承受能力,并在组织内的多个主体之间进行分配。 分配是使用集中式,请求/响应或自由市场机制完成的。 根据组织内用于访问对象(即信息和数据)的主体的要求,量化与每个请求相关联的风险或风险级别的数量。 可以使用例如模糊多级安全性来实现风险量化。 与访问请求相关的量化风险与对象的身份和主体的身份相结合,用于确定请求是否应被授予,拒绝或授予适当的缓解措施。

    Risk Adaptive Information Flow Based Access Control
    4.
    发明申请
    Risk Adaptive Information Flow Based Access Control 失效
    风险自适应信息流访问控制

    公开(公告)号:US20110173084A1

    公开(公告)日:2011-07-14

    申请号:US11623838

    申请日:2007-01-17

    IPC分类号: G06Q30/00 G06F21/00

    摘要: Systems and methods are provided to manage risk associated with access to information within a given organization. The overall risk tolerance for the organization is determined and allocated among a plurality of subjects within the organization. Allocation is accomplished using either a centralized, request/response or free market mechanism. As requested from subjects within the organization for access to objects, i.e. information and data, are received, the amount of risk or risk level associated with each requested is quantified. Risk quantification can be accomplished using, for example, fuzzy multi-level security. The quantified risk associated with the access request in combination with the identity of the object and the identity of the subject are used to determine whether or not the request should be granted, denied or granted with appropriated mitigation measures.

    摘要翻译: 提供系统和方法来管理与给定组织内的信息访问相关的风险。 确定组织的整体风险承受能力,并在组织内的多个主体之间分配。 分配是使用集中式,请求/响应或自由市场机制完成的。 根据组织内用于访问对象(即信息和数据)的主体的要求,量化与每个请求相关联的风险或风险级别的数量。 可以使用例如模糊多级安全性来实现风险量化。 与访问请求相关的量化风险与对象的身份和主体的身份相结合,用于确定请求是否应被授予,拒绝或授予适当的缓解措施。

    System for protecting against leakage of sensitive information from compromising electromagnetic emissions from computing systems
    5.
    发明授权
    System for protecting against leakage of sensitive information from compromising electromagnetic emissions from computing systems 失效
    用于防止敏感信息泄漏的计算系统免受电磁辐射危害的系统

    公开(公告)号:US06870090B2

    公开(公告)日:2005-03-22

    申请号:US10109819

    申请日:2002-03-28

    IPC分类号: G06F7/50 G06F21/00 H05K9/00

    摘要: An electronic device for distorting sensitive information in one or more electromagnetic emanations from the electronic device is disclosed. The device has one or more active layers having one or more electronic components that emit the electromagnetic emanations and one or more conductive substrate layers planarity adjacent to one or more of the active layers that distort the electromagnetic emanations. In alternative embodiments of the inventions, shielding is added with frequency selective openings. In other alternative embodiments, a signal source is added to distort sensitive information.

    摘要翻译: 公开了一种用于使来自电子设备的一个或多个电磁辐射中的敏感信息变形的电子设备。 该器件具有一个或多个有源层,其具有发射电磁发射的一个或多个电子元件,以及一个或多个导电衬底层与一个或多个有源层相邻的平面性,使电磁辐射失真。 在本发明的替代实施例中,屏蔽被添加有频率选择性开口。 在其他替代实施例中,添加信号源以扭曲敏感信息。

    Processing Galois Field arithmetic
    6.
    发明授权
    Processing Galois Field arithmetic 失效
    处理伽罗瓦域算术

    公开(公告)号:US06766344B2

    公开(公告)日:2004-07-20

    申请号:US09851236

    申请日:2001-05-08

    IPC分类号: G06F700

    CPC分类号: G06F7/724 G06F2207/7209

    摘要: Efficient parallel processing of algorithms involving Galois Field arithmetic use data slicing techniques to execute arithmetic operations on a computing hardware having SIMD (single-instruction, multiple-data) architectures. A W-bit wide word computer capable of operating on one or more sets of k-bit operands executes Galois Field arithmetic by mapping arithmetic operations of Galois Field GF(2n) to corresponding operations in subfields lower order (m

    摘要翻译: 涉及Galois Field算法的算法的有效并行处理使用数据分片技术对具有SIMD(单指令,多数据)架构的计算硬件执行算术运算。 能够对一个或多个k位操作数进行操作的W位宽字计算机通过将伽罗瓦域GF(2 )的算术运算映射到子字段低阶(m