Patents Assigned to Cryptography Research, Inc.
-
Patent number: 11743028Abstract: Systems and methods for protecting block cipher computation operations, from external monitoring attacks.Type: GrantFiled: September 1, 2020Date of Patent: August 29, 2023Assignee: Cryptography Research, Inc.Inventors: Jean-Michel Cioranesco, Elena Trichina, Elke De Mulder, Matthew Pond Baker
-
Patent number: 11706026Abstract: A first entity may provide a request to transmit data from the first entity to a second entity. The first entity may receive a session key from the second entity in response to the request where the session key is encrypted by a second key that is based on a combination of a public key and a location associated with the second entity. A location associated with the first entity may be identified. Furthermore, a first key may be generated based on a combination of the location associated with the first entity and a private key that corresponds to the public key. The first key may decrypt data encrypted by the second key when the location associated with the first entity corresponds to the location associated with the second entity.Type: GrantFiled: July 30, 2021Date of Patent: July 18, 2023Assignee: Cryptography Research, Inc.Inventors: Ambuj Kumar, Mark Evan Marson, Daniel Robert Beitel
-
Patent number: 11700111Abstract: Systems and methods for protecting block cipher computation operations from external monitoring attacks. An example apparatus for implementing a block cipher may comprise a memory device to store instructions for computing a block cipher; and a processing device coupled to the memory device. The processing device performs a Data Encryption Standard (DES) cryptographic operation with multiple rounds of a Feistel structure, each round including a substitution function and a transformation function that combines an expansion function and a permutation function into a single operation. The transformation function transforms a first input portion of an internal state of the respective round and a second input portion of the internal state into a first output portion and a second output portion of data. The second output portion is equal to the first input portion and the first output portion is dependent on a combined permutation output from the transformation function.Type: GrantFiled: June 23, 2020Date of Patent: July 11, 2023Assignee: Cryptography Research, Inc.Inventor: Michael Tunstall
-
Patent number: 11695749Abstract: A mechanism for providing secure feature and key management in integrated circuits is described. An example integrated circuit includes a secure memory to store a secret key, and a security manager core, coupled to the secure memory, to receive a digitally signed command, verify a signature associated with the command using the secret key, and configure operation of the integrated circuit using the command.Type: GrantFiled: September 4, 2020Date of Patent: July 4, 2023Assignee: Cryptography Research, Inc.Inventors: Paul Carl Kocher, Benjamin Chen-Min Jun, Andrew John Leiserson
-
Patent number: 11664970Abstract: A container corresponding to executable code may be received. In response receiving the container, an assertion value may be stored in an assertion register. A final canary value may be generated based on a cycles combining a prior canary value and a mix value. A determination may be made as to whether the final canary value matches with the assertion value stored in the assertion register. In response to determining that the final canary value matches with the assertion value, one or more privilege registers may be programmed to provide access to hardware resources for the container corresponding to the executable user code.Type: GrantFiled: May 3, 2021Date of Patent: May 30, 2023Assignee: Cryptography Research, Inc.Inventors: Michael A. Hamburg, Megan Anneke Wachs
-
Patent number: 11658799Abstract: A first share value and a second share value may be received. A combination of the first share value and the second share value may correspond to an exponent value. The value of a first register is updated using a first equation that is based on the first and second share values and the value of a second register is updated using a second equation that is based on the second share value. One of the value of the first register or the value of the second register is selected based on a bit value of the second share value.Type: GrantFiled: June 4, 2021Date of Patent: May 23, 2023Assignee: Cryptography Research, Inc.Inventor: Michael Tunstall
-
Patent number: 11626970Abstract: A value corresponding to an input for a cryptographic operation may be received. The value may be masked by multiplying the value with a first number modulo a prime number. The cryptographic operation may subsequently be performed on the masked value.Type: GrantFiled: December 3, 2015Date of Patent: April 11, 2023Assignee: Cryptography Research, Inc.Inventors: Michael Tunstall, Francois Durvaux, Jr.
-
Patent number: 11620109Abstract: A first input share value, a second input share value, and a third input share value may be received. The first input share value may be converted to a summation or subtraction between an input value and a combination of the second input share value and the third input share value. A random number value may be generated and combined with the second input share value and the third input share value to generate a combined value. Furthermore, a first output share value may be generated based on a combination of the converted first input share value, the combined value, and additional random number values.Type: GrantFiled: December 16, 2020Date of Patent: April 4, 2023Assignee: Cryptography Research, Inc.Inventors: Michael Hutter, Michael Tunstall
-
Patent number: 11568114Abstract: Described are technologies of all-digital camouflage circuits. The camouflage circuit can include a first chain of inverters, synthesized with a first standard cell with a first transistor threshold, and a second chain of inverters, synthesized with a second standard cell with a second transistor threshold that is different than the first transistor threshold. A first flip-flop receives a first output of the first chain as a data input and a second output of the second chain as a clock input. A second flip-flop receives the second output as a data input and the first output of the first chain as a clock input. Given the different transistor thresholds, one flip-flop always outputs an active signal that corresponds to an input signal applied to the first chain and the second chain. The other flip-flop always output a constant signal, such an always low signal.Type: GrantFiled: August 15, 2019Date of Patent: January 31, 2023Assignee: Cryptography Research, Inc.Inventor: Scott C. Best
-
Patent number: 11539509Abstract: Disclosed is a method and a system to execute the method to perform a first hashing operation to compute a first hash value, store the first hash value in a plurality of output registers, store a second message in a plurality of input registers, perform a first iteration of a second hashing operation, with an input to the second hashing operation including the second message and the first hash value, determine that a first portion of the second message, stored in a first register of the plurality of input registers, has been processed in course of the second hashing operation, and move a first portion of the first hash value stored in a first register of the plurality of output registers to the first register of the plurality of input registers.Type: GrantFiled: January 27, 2021Date of Patent: December 27, 2022Assignee: Cryptography Research, Inc.Inventors: Michael Hutter, Matthew Pond Baker
-
Patent number: 11539535Abstract: An encrypted sequence that includes an authentication key may be received. A base key stored at a device may be identified and the encrypted sequence may be decrypted with the base key to obtain the authentication key. A challenge value may be received and the authentication key may be combined with the challenge value to generate a device ephemeral key. An authentication result may be generated for the device based on a combination of the device ephemeral key and the challenge value. Furthermore, the authentication result may be transmitted to a mobile network to authenticate the device.Type: GrantFiled: October 5, 2017Date of Patent: December 27, 2022Assignee: Cryptography Research, Inc.Inventors: Philippe Alain Martineau, Helena Handschuh
-
Patent number: 11515995Abstract: Systems and methods for efficient computation of univariate statistical moments.Type: GrantFiled: December 5, 2019Date of Patent: November 29, 2022Assignee: Cryptography Research, Inc.Inventors: Ilya Stupakov, Anton Kochepasov
-
Patent number: 11507659Abstract: Embodiments herein facilitate resisting side channel attacks through various implementations and combinations of implementations. In embodiments, this is accomplished by preventing sensitive data from consecutively following other data through potentially vulnerable resources which otherwise may cause data to leak. Where such vulnerabilities to attacks are known, suspected, or as a proactive precaution, a cleaner can be used to inhibit the sensitive data from passing through the vulnerable areas consecutively and thus inhibit the leakage. Embodiments also envision utilizing certain types of circuits to assist in preventing leakage. By using such circuits one can reduce or even potentially eliminate the requirement for cleaners as mentioned previously.Type: GrantFiled: September 25, 2020Date of Patent: November 22, 2022Assignee: Cryptography Research, Inc.Inventors: Sami Saab, Elke De Mulder, Pankaj Rohatgi, Craig E. Hampel, Jeremy Cooper, Winthrop Wu
-
Patent number: 11502047Abstract: The embodiments herein are directed to technologies for backside security meshes of semiconductor packages. One package includes a substrate having a first interconnect terminal of a first type and a second interconnect terminal of a second type. The package also includes a first security mesh structure disposed on a first side of an integrated circuit die and a conductive path coupled between the first interconnect terminal and the second interconnect terminal. The first security mesh structure is coupled to the first interconnect terminal and the second interconnect terminal being coupled to a terminal on a second side of the integrated circuit die.Type: GrantFiled: September 7, 2018Date of Patent: November 15, 2022Assignee: Cryptography Research Inc.Inventors: Scott C. Best, Ming Li
-
Patent number: 11500986Abstract: A masked logic gate protected against side-channel attacks using Boolean masking with d+1 shares for each input variable, where d is an integer at least equal to 1 representing the protection order is described. The masked logic gate includes a first input configured to receive a number of shares yj (j=0, 1, 2 . . . ); a second input configured to receive (d+1)2 shares xi (i=0, 1, 2 . . . ) representative of an intermediate result output by one layer of a tree of gates implementing low-latency masking with a protection order of d; and a (d+1)-share output obtained by applying a logic function of the masked logic gate to the shares of the first and second inputs using domain-oriented masking.Type: GrantFiled: September 22, 2020Date of Patent: November 15, 2022Assignee: Cryptography Research, Inc.Inventor: Simon Hoerder
-
Patent number: 11418334Abstract: Systems and methods for performing modular inversion operations in a manner protected from external monitoring attacks. An example method comprises: determining, by a processor, a first masked value based on a public cryptographic key and a first random integer value; determining a second masked value based on the public cryptographic key and a second random integer value, and determining, based on the first masked value and the second masked value, a private cryptographic key represented by a modular inversion of the public cryptographic key.Type: GrantFiled: October 8, 2018Date of Patent: August 16, 2022Assignee: Cryptography Research, Inc.Inventors: Michael Alexander Hamburg, Michael Tunstall
-
Patent number: 11403014Abstract: A request associated with one or more privileges assigned to a first entity may be received. Each of the one or more privileges may correspond to an operation of an integrated circuit. Information corresponding to the first entity and stored in a memory that is associated with the integrated circuit may be identified. Furthermore, the memory may be programmed to modify the information stored in the memory that is associated with the integrated circuit in response to the request associated with the one or more privileges assigned to the first entity.Type: GrantFiled: December 4, 2020Date of Patent: August 2, 2022Assignee: Cryptography Research, Inc.Inventors: Benjamin Che-Ming Jun, William Craig Rawlings, Ambuj Kumar, Mark Evan Marson
-
Patent number: 11386236Abstract: A method of and system for gate-level masking of secret data during a cryptographic process is described. A mask share is determined, wherein a first portion of the mask share includes a first number of zero-values and a second number of one-values, and a second portion of the mask share includes the first number of one-values and the second number of zero-values. Masked data values and the first portion of the mask share are input into a first portion of masked gate logic, and the masked data values and the second portion of the mask share are input into a second portion of the masked gate logic. A first output from the first portion of the masked gate logic and a second output from the second portion of the masked gate logic are identified, wherein either the first output or the second output is a zero-value.Type: GrantFiled: May 31, 2019Date of Patent: July 12, 2022Assignee: Cryptography Research, Inc.Inventors: Andrew John Leiserson, Mark Evan Marson, Megan Anneke Wachs
-
Patent number: 11329010Abstract: An anti-tamper layer is applied to a blank wafer. The layered wafer is then diced into shield dies. A shield die is oxide-to-oxide bonded to the top of an active die such that removing the shield die will damage the active die. The shield die may be sized and positioned such that wirebond pads along one or more edges of the active die remain exposed. The exposed wirebond pads may be used to electrically connect, via wirebonds, the active die to a substrate. A second shield die may be attached to the bottom of the active die to help protect against the use of bottom-to-top delayering.Type: GrantFiled: April 2, 2020Date of Patent: May 10, 2022Assignee: Cryptography Research, Inc.Inventors: Scott C. Best, Ming Li, Gary B. Bronner, Mark Evan Marson
-
Patent number: 11308196Abstract: Pairing data associated with a second device may be received at a first device. The pairing data may be received from a server. A first authentication proof may be generated based on the pairing data received from the server. A second authentication proof may be received from the second device. Furthermore, an authentication status of the second device may be updated based on a comparison of the first authentication proof that is based on the pairing data received from the server and the second authentication proof that is received from the second device.Type: GrantFiled: February 28, 2020Date of Patent: April 19, 2022Assignee: Cryptography Research, Inc.Inventors: Benjamin Che-Ming Jun, Matthew Evan Orzen, Joel Patrick Wittenauer, Steven C. Woo