-
公开(公告)号:US20240364538A1
公开(公告)日:2024-10-31
申请号:US18770352
申请日:2024-07-11
发明人: Ravi K. Maganti , Robert L. Carter, JR. , Bradford A. Shea , M. Erik Meinholz , Jeff J. Stapleton , Peter Bordow , Pierre Arbajian , Abhijit Rao
CPC分类号: H04L9/3249 , H04L9/0631 , H04L9/0656 , H04L9/0841 , H04L9/0844 , H04L9/0852 , H04L9/302 , H04L9/3247 , H04L9/3263
摘要: Systems, apparatuses, methods, and computer program products are disclosed for quantum computing (QC) detection. An example method includes generating QC detection data. The example method further includes generating a pair of asymmetric cryptographic keys comprising a public cryptographic key and a private cryptographic key, generating encrypted QC detection data based on the pair of asymmetric cryptographic keys, and destroying the private cryptographic key. The example method further includes monitoring a set of data environments for electronic information related to the encrypted QC detection data. Subsequently, the example method may include generating a QC detection alert control signal in response to detection of the electronic information related to the encrypted QC detection data.
-
公开(公告)号:US12120217B2
公开(公告)日:2024-10-15
申请号:US18213193
申请日:2023-06-22
发明人: Lex Aaron Anderson
CPC分类号: H04L9/008 , G06F21/60 , G06F21/602 , G06F21/606 , H04L9/0631 , H04L9/0861 , H04L9/302 , H04L2209/16
摘要: A fully homomorphic white-box implementation of one or more cryptographic operations is presented. This method allows construction of white-box implementations from general-purpose code without necessitating specialized knowledge in cryptography, and with minimal impact to the processing and memory requirements for non-white-box implementations. This method and the techniques that use it are ideally suited for securing “math heavy” implementations, such as codecs, that currently do not benefit from white-box security because of memory or processing concerns. Further, the fully homomorphic white-box construction can produce a white-box implementation from general purpose program code, such as C or C++.
-
公开(公告)号:US12058115B2
公开(公告)日:2024-08-06
申请号:US18127173
申请日:2023-03-28
申请人: PKWARE, INC.
发明人: Yuri Basin
CPC分类号: H04L63/06 , H04L9/0637 , H04L9/0643 , H04L9/0822 , H04L9/0825 , H04L9/083 , H04L9/0863 , H04L9/0894 , H04L9/0897 , H04L9/14 , H04L9/302 , H04L9/3226 , H04L9/3239 , H04L9/3242 , H04L9/3247 , H04L9/3263 , H04L63/08
摘要: A system and method are provided for the secure sharing of information across and open network and for performing management of keys used for encrypting and decrypting data.
-
公开(公告)号:US11979499B2
公开(公告)日:2024-05-07
申请号:US17610390
申请日:2020-04-29
申请人: nChain Licensing AG
CPC分类号: H04L9/302 , G06F21/64 , H04L9/3239 , H04L9/50 , H04L2209/46
摘要: Embodiments of the present disclosure provides protocols, methods and systems which provides advantages such as the resistance of centralisation of mining on a blockchain network, preferably a Proof-of-Work blockchain. A method in accordance with an embodiment may comprise generating a plurality of non-parallelisable challenges (or “puzzles”) and allocating one of said plurality of challenges to each miner on the network. The miner uses an inherently sequential (non-parallelisable) algorithm to find a solution to his allocated challenge. The challenges are generated by a committee of nodes, and a new set of challenges is generated for each block.
-
公开(公告)号:US11961420B2
公开(公告)日:2024-04-16
申请号:US17309933
申请日:2020-01-06
CPC分类号: G09C1/00 , G06F7/57 , G06F7/728 , H04L9/3013 , H04L9/302 , H04L9/3066
摘要: Aspects of the present disclosure describe a method and a system to support execution of the method to perform a cryptographic operation involving identifying an N-word number, X=XN−1 . . . X1Xo, to be squared, performing a first loop comprising M first loop iterations, wherein M is a largest integer not exceeding (N+1)/2, each of the M first loop iterations comprising a second loop that comprises a plurality of second loop iterations, wherein an iteration m of the second loop that is within an iteration j of the first loop comprises computing a product Xa*Xb of a word Xa and a word Xb, wherein a+b=2j+m, j≥0 and m≥0, and wherein all second loops have an equal number of second loop iterations.
-
公开(公告)号:US11909893B2
公开(公告)日:2024-02-20
申请号:US17850712
申请日:2022-06-27
申请人: Entrust Corporation
CPC分类号: H04L9/3268 , H04L9/321 , H04L9/302 , H04L9/3093
摘要: Content, such as an encryption key, may be transmitted between computing systems that both use more than one encryption algorithm. Secrets may be used to encode the content. The different encryption algorithms may be used to separately encrypt the encoded content and the secrets prior to communicating the encrypted, encoded content and encrypted secrets between computing systems.
-
公开(公告)号:US11909889B2
公开(公告)日:2024-02-20
申请号:US17740254
申请日:2022-05-09
发明人: Mayukh Ray , Tolga Acar , Timothy Michael Peters
CPC分类号: H04L9/3247 , H04L9/0825 , H04L9/0877 , H04L9/302 , H04L9/3213
摘要: A public-private key cryptographic scheme is described for granting authenticating a client to a remote device or service in order to access a secure resource. The client is provided the public key, but the private key is stored in a hardware security module (HSM) that the client is not able to access. The client requests a digital signature be generated from the private key from a secure vault service. The secure vault service accesses the HSM and generates the digital certificate, which is then passed to the client. The digital certificate may be added to a security token request submitted to an identity provider. The identity provider determines whether the digital signature came from the private key. If so, the identity provider provides authenticates the client and provides an access token that is usable by the client for authentication to the remote device with the secure resource
-
公开(公告)号:US11831787B2
公开(公告)日:2023-11-28
申请号:US17142473
申请日:2021-01-06
CPC分类号: H04L9/3268 , H04L9/006 , H04L9/302 , H04L9/3033 , H04L9/3247 , H04L63/0272 , H04L63/0281
摘要: Temporal key generation devices and methods are described. One such device of a first domain receives a “seed” to generate a private key associated with a public key for use in a second domain. The device uses the private key in cryptographic operations with the second domain. When the device loses power or is no longer connected to the second domain, the private key may be erased or no longer stored on the device.
-
公开(公告)号:US11824986B2
公开(公告)日:2023-11-21
申请号:US16956363
申请日:2018-12-18
申请人: SECURE-IC SAS
发明人: Sylvain Guilley , Cédric Murdica
CPC分类号: H04L9/302 , H04L9/004 , H04L9/3066 , H04L2209/04 , H04L2209/08
摘要: There is provided a device for protecting the execution of a cryptographic operation from attacks, the cryptographic operation being implemented by a cryptographic algorithm, the cryptographic operation comprising at least one modular operation between a main base (m) representing a data block and at least one scalar (d) in at least one finite starting group. The device is configured to determine at least one intermediary group (E′) different from the at least one starting group (E), the number of intermediary groups being equal to the number of starting groups E. The device is further configured to determine at least one final group (E″) from the at least one starting group E and the at least one intermediary group E′. The base m being mapped to an auxiliary element (x) in the at least one intermediary group and to an auxiliary base (m″) in the at least one final group E″. The device performs a first elementary operation in each final group (E″i), the first elementary operation consisting in executing the modular operation between the auxiliary base (m″) and an auxiliary scalar (da) in each final group E″, which provides at least one result, the auxiliary scalar (da) being determined from the auxiliary element (x) and from the main scalar (d). The device further performs a second elementary operation in each starting group E, the second elementary operation consisting in executing the modular operation between an additional auxiliary base and an additional auxiliary scalar d′b in each starting group, at least one of the additional auxiliary base and of the additional scalar being derived from the result of the first elementary operation.
-
10.
公开(公告)号:US11811909B2
公开(公告)日:2023-11-07
申请号:US17498243
申请日:2021-10-11
申请人: Preet Raj , Shashank Singh
发明人: Preet Raj , Shashank Singh
CPC分类号: H04L9/0631 , H04L9/0825 , H04L9/0861 , H04L9/302
摘要: The invention provides an information processing apparatus, method, and security protocol for secure storage and transfer of data using two-level encryption by combining RSA and AES keys. The apparatus includes circuitry (100) configured to receive encryption request, encrypt the data to generate first encryption data. The encryption of the data is based on an AES user key (103) and the received encryption request. The circuitry is further configured to encrypt the first encryption data to generate second encryption data, decrypt the second encryption data to generate first decryption data. The decryption of the second encryption data is based on a company AES key (107). The circuitry (100) is further configured to decrypt the first decryption data to generate the original data. The decryption of the first decryption data is based on an AES user key (103), and the second decryption data corresponds to the transmitted data.
-
-
-
-
-
-
-
-
-