Abstract:
Some demonstrative embodiments of the invention include a method, device and/or system to selectively operate a host connected to a token. The device may include, for example, a host processor to communicate with the token; and a secure module including a secure unit; and a controller to authenticate an identity of the token and, based on the identity, to selectively allow the secure unit to interact with another unit of the host. Other embodiments are described and claimed.
Abstract:
Some demonstrative embodiments of the invention include a method, device and/or system to encrypt and/or decrypt data. In one demonstrative embodiment, the device may include, for example, a storage; and an encryption/decryption module to: receive externally-encrypted data to be stored in the storage, wherein the externally-encrypted data is encrypted using an external key; decrypt the externally-encrypted data using the external key to generate decrypted data; and encrypt the decrypted data using a securely maintained internal key to generate internally-encrypted data. Other embodiments are described and claimed.
Abstract:
Embodiments of the invention provide a method and a device for manipulating data (108) by converting masked data in a first representation of a finite field into converted data in a second representation of the finite field (102), and manipulating the converted data (106) to obtain manipulated masked data.
Abstract:
A method for carrying out computations of modular exponentiation (M E mod N) by hardware involving Montgomery multiplication operations utilizing a non-reduced and extended Montgomery multiplication between a first (A) and a second (B) integer values, in which the number of iterations required is greater than the number of bits n of an odd modulus value N, and a pre-calculated auxiliary operand value M'=M*2 s mod N. The method comprises carrying out non-reduced and extended Montgomery multiplication (NRMM (s) ), by utilizing a first and a second multiplication units capable of storing the result of said multiplication. A pre-calculated auxiliary operand value M' is stored in the second multiplication unit and in a storage device. The following step are then performed: non-reduced and extended Montgomery multiplication is performed by the second multiplication unit, of its content by itself (NFMM (s) (M',M')), thereby obtaining non-reduced and extended Montgomery squaring of the content of said second multiplication unit; sequentially scanning the exponent bits E i (i=0,1, ) starting from its LSB, checking the state of each bit, and if the bit state is "1" and it is the first occurrence of exponent bit of state "1", the content of the second multiplication unit is stored in the first multiplication unit, otherwise, a non-reduced and extended Montgomery multiplication is performed by the first multiplication unit, of its content by the value stored in the storage device; storing the result of in the storage device; and repeating steps the above steps until all of the exponent bits are scanned. The modular exponentiation result is obtained by performing non-reduced and extend Montgomery multiplication, by the first multiplication unit, of its content, by 1.
Abstract:
The throughput of the memory system is improved where data in a data stream is cryptographically processed by a circuit without involving intimately any controller. The data stream is preferably controlled so that it has a selected data source among a plurality of sources and a selected destination among a plurality of destinations, all without involving the controller. The cryptographic circuit may preferably be configured to enable the processing of multiple pages, selection of one or more cryptographic algorithms among a plurality of algorithms to encryption and/or decryption without involving a controller, and to process data cryptographically in multiple successive stages without involvement of the controller. For a memory system cryptographically processing data from multiple data streams in an interleaved manner, when a session is interrupted, security configuration information may be lost so that it may become impossible to continue the process when the session is resumed. To retain the security configuration information, the controller preferably causes the security configuration information for the session to be stored before the interruption so that it is retrievable after the interruption.
Abstract:
Embodiments of the present invention provide a method, apparatus and system of securing an operating system. The apparatus, according to some demonstrative embodiments of the invention, may include a memory access controller to receive from a processor a program counter representing a requested address of a memory to be accessed by the processor during a kernel mode of operation, and to selectively enable the processor to access the requested address based on a comparison between the requested address and one or more allowable addresses. Other embodiments are described and claimed.
Abstract:
Embodiments of the present invention provide a method, apparatus and system of securing an operating system. The apparatus, according to some demonstrative embodiments of the invention, may include a memory access controller to receive from a processor a program counter representing a requested address of a memory to be accessed by the processor during a kernel mode of operation, and to selectively enable the processor to access the requested address based on a comparison between the requested address and one or more allowable addresses. Other embodiments are described and claimed.
Abstract:
Some demonstrative embodiments of the invention include a method, device an/or system of securely storing data, for example, by preventing unauthorized disclosure of the stored data, and/or ensuring the integrity of the stored data. An apparatus able to securely store data may include, according to some demonstrative embodiments of the invention, a secure control configuration, which may include a secure memory to securely store a key; an encryption module to generate an encrypted record by encrypting a data record to be stored using the key; and a controller to generate authentication information for authenticating the integrity of the encrypted record based on the key. The apparatus may also include a storage for storing the encrypted record and the authentication information. Other embodiments are described and claimed.
Abstract:
Embodiments of the invention provide a method and a device for manipulating data provided in a GF(2 2s ) representation, e.g., for implementing at least some AES encryption and/or decryption operations on data provided in a GF(2 2s ) representation, by converting the GF(2 2s ) into a GF((2 s ) 2 ) representation (102) and performing GF(2 2s ) equivalent operations in the GF((2 s ) 2 ) representation (104).
Abstract:
Disclosed are methods, circuit, devices and systems for provisioning cryptographic material to a target device. According to embodiments, a cryptographic material provisioning (CMP) module may be adapted to process a provisioning message with a first message portion which is encrypted with a native key of the target device and which includes first cryptographic material along with a first permissions data vector, wherein the CPM may be further adapted to process data bits of a second portion of the provisioning message using the first cryptographic material and in accordance with usage limitations defined in the first permissions data vector.