Patents Assigned to SecureRF Corporation
-
Publication number: 20200092111Abstract: Technologies are generally described for methods and devices for generating a final signature. The methods may comprise receiving a message by a processor. The methods may comprise generating a random number by a random number generator. The methods may comprise forwarding, by the processor, the random number to a cloaking element generator. The methods may comprise forwarding, by the processor, a private key to the cloaking element generator. The methods may comprise forwarding, by the processor, a group to the cloaking element generator. The methods may comprise forwarding, by the processor, a homomorphism to the cloaking element generator. The methods may comprise processing, by the cloaking element generator, the random number, the group, the private key, and the homomorphism to produce a cloaking element. The methods may comprise applying the cloaking element to transform the message into the final signature.Type: ApplicationFiled: November 22, 2019Publication date: March 19, 2020Applicant: SECURERF CORPORATIONInventors: IRIS ANSHEL, DORIAN GOLDFELD
-
Patent number: 10523440Abstract: Technologies are generally described for methods and devices for generating a final signature. The methods may comprise receiving a message by a processor. The methods may comprise generating a random number by a random number generator. The methods may comprise forwarding, by the processor, the random number to a cloaking element generator. The methods may comprise forwarding, by the processor, a private key to the cloaking element generator. The methods may comprise forwarding, by the processor, a group to the cloaking element generator. The methods may comprise forwarding, by the processor, a homomorphism to the cloaking element generator. The methods may comprise processing, by the cloaking element generator, the random number, the group, the private key, and the homomorphism to produce a cloaking element. The methods may comprise applying the cloaking element to transform the message into the final signature.Type: GrantFiled: September 20, 2016Date of Patent: December 31, 2019Assignee: SECURERF CORPORATIONInventors: Iris Anshel, Dorian Goldfeld
-
Patent number: 10505722Abstract: Systems and methods to produce cloaked keys and shared secret data are described. A first device may select a private key, for the first device, based on a first set of rewritten conjugates. The first device may receive a public key from a second device. The public key may be based on a private key of the second device. The private key of the second device may be based on a second set of rewritten conjugates. The first device may determine first and second cloaking elements based on the public key and the private key of the first device. The first device may produce a cloaked key based on the first and second cloaking elements, and the private key of the first device. The first device may produce shared secret data based on the private key of the first device and a second cloaked key from the second device.Type: GrantFiled: June 29, 2017Date of Patent: December 10, 2019Assignee: SecureRF CorporationInventors: Iris Anshel, Dorian Goldfeld
-
Patent number: 10459690Abstract: A side channel attack prevention system may use one or more of a function mutation generator, an element selector generator and/or a subword replacement module to produce a hardened result. The function mutation generator may evaluate a mutated function. The element selector generator may select a central group element in a group and insert that central group element within the group. The subword replacement module may identify a relation in a group and insert that relation in a random location of the group.Type: GrantFiled: January 12, 2018Date of Patent: October 29, 2019Assignee: SecureRF CorporationInventors: Iris Anshel, Dorian Goldfeld
-
Publication number: 20190307790Abstract: A system and method for generating a secret key to facilitate secure communications between users. A first and second and a function between the two monoids are selected, the function being a monoid homomorphism. A group and a group action of the group on the first monoid is selected. Each user is assigned a submonoid of the first monoid so that these submonoids satisfy a special symmetry property determined by the function, a structure of the first and second monoids, and the action of the group. A multiplication of an element in the second monoid and an element in the first monoid is obtained by combining the group action and the monoid homomorphism. First and second users choose private keys which are sequences of elements in their respective submonoids. A first result is obtained by multiplying an identity element by the first element of the sequence in a respective submonoid.Type: ApplicationFiled: June 5, 2019Publication date: October 10, 2019Applicant: SECURERF CORPORATIONInventors: IRIS ANSHEL, MICHAEL ANSHEL, DORIAN GOLDFELD
-
Publication number: 20190288848Abstract: A first module divides a string into a number of blocks. A second module associates the blocks with monoid elements in a list of first monoid elements to produce second monoid elements. A third module applies a first function to an initial monoid element and a first of the second monoid elements producing a first calculated monoid element and evaluates an action of the initial monoid element on the first function producing a second function. A fourth module applies the second function to the first calculated monoid element and to a second of the second monoid elements producing a second calculated monoid element and evaluates the action of the first calculated monoid element on the first function producing a third function.Type: ApplicationFiled: May 22, 2019Publication date: September 19, 2019Applicant: SECURERF CORPORATIONInventors: Iris Anshel, Dorian Goldfeld
-
Patent number: 10367640Abstract: Systems and methods for producing shared secret data are generally described. A first device may receive a public key from a second device. The public key may be based on a first secret element. The first device may generate a first ephemeral private key based on a second secret element, and may generate a second ephemeral private key based on a third secret element. The first device may generate a first element based on the public key and the first ephemeral private key, and may generate a second element based on the public key and the second ephemeral private key. The second element may relate to the shared secret data. The first device may generate a session public key based on the first element, the second secret element, and the third secret element. The shared secret data may be derivable, by the second device, from the session public key.Type: GrantFiled: May 3, 2017Date of Patent: July 30, 2019Assignee: SecureRF CorporationInventors: Iris Anshel, Dorian Goldfeld
-
Publication number: 20190169810Abstract: A system effective to communicate a message between two devices. A first device may include a plaintext to monoid element module effective to receive a plaintext message and apply a first function to the plaintext message to produce a first monoid element. A monoid element evaluator module may be effective to receive and insert submonoid generators into a monoid expression to produce a second monoid element in response. An encryption device module may be effective to apply a second function to the first monoid element, the second monoid element, the monoid expression, and a third monoid element to produce an encrypted plaintext message. Decryption may be performed on the encrypted plaintext message knowing the private key which includes the first function, the second function, the third monoid element and the submonoid generators list.Type: ApplicationFiled: February 8, 2019Publication date: June 6, 2019Applicant: Securerf CorporationInventors: IRIS ANSHEL, Dorian Goldfeld
-
Publication number: 20180270047Abstract: A system effective to communicate a message between two devices. A first device may include a plaintext to monoid element module effective to receive a plaintext message and apply a first function to the plaintext message to produce a first monoid element. A monoid element evaluator module may be effective to receive and insert submonoid generators into a monoid expression to produce a second monoid element in response. An encryption device module may be effective to apply a second function to the first monoid element, the second monoid element, the monoid expression, and a third monoid element to produce an encrypted plaintext message. Decryption may be performed on the encrypted plaintext message knowing the private key which includes the first function, the second function, the third monoid element and the submonoid generators list.Type: ApplicationFiled: May 18, 2018Publication date: September 20, 2018Applicant: SECURERF CORPORATIONInventors: Iris Anshel, Dorian Goldfeld
-
Publication number: 20180139040Abstract: A system effective to communicate a message between two devices. A first device may include a plaintext to monoid element module effective to receive a plaintext message and apply a first function to the plaintext message to produce a first monoid element. A monoid element evaluator module may be effective to receive and insert submonoid generators into a monoid expression to produce a second monoid element in response. An encryption device module may be effective to apply a second function to the first monoid element, the second monoid element, the monoid expression, and a third monoid element to produce an encrypted plaintext message. Decryption may be performed on the encrypted plaintext message knowing the private key which includes the first function, the second function, the third monoid element and the submonoid generators list.Type: ApplicationFiled: December 21, 2017Publication date: May 17, 2018Applicant: SECURERF CORPORATIONInventors: Iris Anshel, Dorian Goldfeld
-
Publication number: 20180097633Abstract: Technologies are generally described for methods and devices for generating a final signature. The methods may comprise receiving a message by a processor. The methods may comprise generating a random number by a random number generator. The methods may comprise forwarding, by the processor, the random number to a cloaking element generator. The methods may comprise forwarding, by the processor, a private key to the cloaking element generator. The methods may comprise forwarding, by the processor, a group to the cloaking element generator. The methods may comprise forwarding, by the processor, a homomorphism to the cloaking element generator. The methods may comprise processing, by the cloaking element generator, the random number, the group, the private key, and the homomorphism to produce a cloaking element. The methods may comprise applying the cloaking element to transform the message into the final signature.Type: ApplicationFiled: November 17, 2017Publication date: April 5, 2018Applicant: SECURERF CORPORATIONInventors: Iris Anshel, Dorian Goldfeld
-
Publication number: 20180071335Abstract: A system and method for generating a secret key to facilitate secure communications between users. A first and second and a function between the two monoids are selected, the function being a monoid homomorphism. A group and a group action of the group on the first monoid is selected. Each user is assigned a submonoid of the first monoid so that these submonoids satisfy a special symmetry property determined by the function, a structure of the first and second monoids, and the action of the group. A multiplication of an element in the second monoid and an element in the first monoid is obtained by combining the group action and the monoid homomorphism. First and second users choose private keys which are sequences of elements in their respective submonoids. A first result is obtained by multiplying an identity element by the first element of the sequence in a respective submonoid.Type: ApplicationFiled: September 13, 2017Publication date: March 15, 2018Applicant: SECURERF CORPORATIONInventors: IRIS ANSHEL, MICHAEL ANSHEL, DORIAN GOLDFELD
-
Publication number: 20180069705Abstract: A first module divides a string into a number of blocks. A second module associates the blocks with monoid elements in a list of first monoid elements to produce second monoid elements. A third module applies a first function to an initial monoid element and a first of the second monoid elements producing a first calculated monoid element and evaluates an action of the initial monoid element on the first function producing a second function. A fourth module applies the second function to the first calculated monoid element and to a second of the second monoid elements producing a second calculated monoid element and evaluates the action of the first calculated monoid element on the first function producing a third function.Type: ApplicationFiled: November 13, 2017Publication date: March 8, 2018Applicant: Securerf CorporationInventors: Iris Anshel, Dorian Goldfeld
-
Publication number: 20180013554Abstract: Systems and methods to produce cloaked keys and shared secret data are described. A first device may select a private key, for the first device, based on a first set of rewritten conjugates. The first device may receive a public key from a second device. The public key may be based on a private key of the second device. The private key of the second device may be based on a second set of rewritten conjugates. The first device may determine first and second cloaking elements based on the public key and the private key of the first device. The first device may produce a cloaked key based on the first and second cloaking elements, and the private key of the first device. The first device may produce shared secret data based on the private key of the first device and a second cloaked key from the second device.Type: ApplicationFiled: June 29, 2017Publication date: January 11, 2018Applicant: SECURERF CORPORATIONInventors: IRIS ANSHEL, DORIAN GOLDFELD
-
Publication number: 20170359166Abstract: A system effective to communicate a message between two devices. A first device may include a plaintext to monoid element module effective to receive a plaintext message and apply a first function to the plaintext message to produce a first monoid element. A monoid element evaluator module may be effective to receive and insert submonoid generators into a monoid expression to produce a second monoid element in response. An encryption device module may be effective to apply a second function to the first monoid element, the second monoid element, the monoid expression, and a third monoid element to produce an encrypted plaintext message. Decryption may be performed on the encrypted plaintext message knowing the private key which includes the first function, the second function, the third monoid element and the submonoid generators list.Type: ApplicationFiled: August 28, 2017Publication date: December 14, 2017Applicant: SECURERF CORPORATIONInventors: Iris Anshel, Dorian Goldfeld
-
Publication number: 20170324548Abstract: Systems and methods for producing shared secret data are generally described. A first device may receive a public key from a second device. The public key may be based on a first secret element. The first device may generate a first ephemeral private key based on a second secret element, and may generate a second ephemeral private key based on a third secret element. The first device may generate a first element based on the public key and the first ephemeral private key, and may generate a second element based on the public key and the second ephemeral private key. The second element may relate to the shared secret data. The first device may generate a session public key based on the first element, the second secret element, and the third secret element. The shared secret data may be derivable, by the second device, from the session public key.Type: ApplicationFiled: May 3, 2017Publication date: November 9, 2017Applicant: SECURERF CORPORATIONInventors: Iris Anshel, Dorian Goldfeld
-
Publication number: 20170257218Abstract: A first module divides a string into a number of blocks. A second module associates the blocks with monoid elements in a list of first monoid elements to produce second monoid elements. A third module applies a first function to an initial monoid element and a first of the second monoid elements producing a first calculated monoid element and evaluates an action of the initial monoid element on the first function producing a second function. A fourth module applies the second function to the first calculated monoid element and to a second of the second monoid elements producing a second calculated monoid element and evaluates the action of the first calculated monoid element on the first function producing a third function.Type: ApplicationFiled: May 19, 2017Publication date: September 7, 2017Applicant: SECURERF CORPORATIONInventors: Iris Anshel, Dorian Goldfeld
-
Publication number: 20170180124Abstract: A system and method for generating a secret key to facilitate secure communications between users. A first and second and a function between the two monoids are selected, the function being a monoid homomorphism. A group and a group action of the group on the first monoid is selected. Each user is assigned a submonoid of the first monoid so that these submonoids satisfy a special symmetry property determined by the function, a structure of the first and second monoids, and the action of the group. A multiplication of an element in the second monoid and an element in the first monoid is obtained by combining the group action and the monoid homomorphism. First and second users choose private keys which are sequences of elements in their respective submonoids. A first result is obtained by multiplying an identity element by the first element of the sequence in a respective submonoid.Type: ApplicationFiled: March 7, 2017Publication date: June 22, 2017Applicant: SECURERF CORPORATIONInventors: IRIS ANSHEL, Michael Anshel, Dorian Goldfeld
-
Publication number: 20170085387Abstract: Technologies are generally described for methods and devices for generating a final signature. The methods may comprise receiving a message by a processor. The methods may comprise generating a random number by a random number generator. The methods may comprise forwarding, by the processor, the random number to a cloaking element generator. The methods may comprise forwarding, by the processor, a private key to the cloaking element generator. The methods may comprise forwarding, by the processor, a group to the cloaking element generator. The methods may comprise forwarding, by the processor, a homomorphism to the cloaking element generator. The methods may comprise processing, by the cloaking element generator, the random number, the group, the private key, and the homomorphism to produce a cloaking element. The methods may comprise applying the cloaking element to transform the message into the final signature.Type: ApplicationFiled: September 20, 2016Publication date: March 23, 2017Applicant: SECURERF CORPORATIONInventors: IRIS ANSHEL, DORIAN GOLDFELD
-
Publication number: 20170033929Abstract: A first module divides a string into a number of blocks. A second module associates the blocks with monoid elements in a list of first monoid elements to produce second monoid elements. A third module applies a first function to an initial monoid element and a first of the second monoid elements producing a first calculated monoid element and evaluates an action of the initial monoid element on the first function producing a second function. A fourth module applies the second function to the first calculated monoid element and to a second of the second monoid elements producing a second calculated monoid element and evaluates the action of the first calculated monoid element on the first function producing a third function.Type: ApplicationFiled: October 13, 2016Publication date: February 2, 2017Applicant: Securerf CorporationInventors: Iris Anshel, Dorian Goldfeld