Patents Assigned to Cryptography Research, Inc.
-
Patent number: 10389520Abstract: A first share value and a second share value may be received. A combination of the first share value and the second share value may correspond to an exponent value. The value of a first register is updated using a first equation that is based on the first and second share values and the value of a second register is updated using a second equation that is based on the second share value. One of the value of the first register or the value of the second register is selected based on a bit value of the second share value.Type: GrantFiled: September 25, 2015Date of Patent: August 20, 2019Assignee: Cryptography Research, Inc.Inventor: Michael Tunstall
-
Patent number: 10387597Abstract: A first and second set of simulation information of a circuit design may be received. Energy consumption values associated with signals may be calculated for each of the first and second sets of simulation information of the circuit design. The energy consumption values associated with the transitions of the plurality of signals for each time point of a plurality of time points may be aggregated based on when each of the transitions of the signals occurs for each of the first and second sets of simulation information. Furthermore, a possible Differential Power Analysis (DPA) leak may be identified at one of the time points based on a difference in aggregated energy consumption values between the first and second sets of simulation information.Type: GrantFiled: June 20, 2014Date of Patent: August 20, 2019Assignee: Cryptography Research, Inc.Inventors: Megan Anneke Wachs, Hai Lan, Andrew John Leiserson, Joseph William Inkenbrandt, Ralf Michael Schmitt
-
Patent number: 10379785Abstract: A virtual memory including virtual addresses may be generated. A first virtual address of the virtual memory may be mapped to a first physical address of a one-time programmable (OTP) memory of a device. Furthermore, a second virtual address of the virtual memory may be mapped to a second physical address of a static memory of the device. The virtual memory that is mapped to the OTP memory and the static memory may be provided for accessing of the data of the OTP memory of the device.Type: GrantFiled: May 12, 2016Date of Patent: August 13, 2019Assignee: Cryptography Research, IncInventors: Ambuj Kumar, Roy Moss
-
Patent number: 10382193Abstract: Systems and methods for performing cryptographic data processing operations in a manner resistant to external monitoring attacks. An example method may comprise: executing, by a processing device, a first data manipulation instruction, the first data manipulation instruction affecting an internal state of the processing device; executing a second data manipulation instruction, the second data manipulation instruction interacting with said internal state; and breaking a detectable interaction of the first data manipulation instruction and the second data manipulation instruction by executing a third data manipulation instruction utilizing an unpredictable data item.Type: GrantFiled: May 15, 2015Date of Patent: August 13, 2019Assignee: Cryptography Research, Inc.Inventors: Sami James Saab, Pankaj Rohatgi, Craig E. Hampel
-
Patent number: 10341106Abstract: A first entity may provide a request to transmit data from the first entity to a second entity. The first entity may receive a session key from the second entity in response to the request where the session key is encrypted by a second key that is based on a combination of a public key and a location associated with the second entity. A location associated with the first entity may be identified. Furthermore, a first key may be generated based on a combination of the location associated with the first entity and a private key that corresponds to the public key. The first key may decrypt data encrypted by the second key when the location associated with the first entity corresponds to the location associated with the second entity.Type: GrantFiled: February 20, 2018Date of Patent: July 2, 2019Assignee: Cryptography Research, Inc.Inventors: Ambuj Kumar, Mark Evan Marson, Daniel Robert Beitel
-
Patent number: 10333699Abstract: Share values for use in a cryptographic operation may be received and the cryptographic operation may be performed based on the share values. A pseudorandom number that is to be used by the cryptographic operation may be identified and the pseudorandom number may be generated based on a portion of the share values that are used in the cryptographic operation. The cryptographic operation may then be performed based on the generated pseudorandom number.Type: GrantFiled: July 8, 2016Date of Patent: June 25, 2019Assignee: Cryptography Research, Inc.Inventors: Pankaj Rohatgi, Elke De Mulder, Michael Hutter
-
Patent number: 10311255Abstract: A method of and system for gate-level masking of secret data during a cryptographic process is described. A mask share is determined, wherein a first portion of the mask share includes a first number of zero-values and a second number of one-values, and a second portion of the mask share includes the first number of one-values and the second number of zero-values. Masked data values and the first portion of the mask share are input into a first portion of masked gate logic, and the masked data values and the second portion of the mask share are input into a second portion of the masked gate logic. A first output from the first portion of the masked gate logic and a second output from the second portion of the masked gate logic are identified, wherein either the first output or the second output is a zero-value.Type: GrantFiled: December 28, 2016Date of Patent: June 4, 2019Assignee: Cryptography Research, Inc.Inventors: Andrew John Leiserson, Mark Evan Marson, Megan Anneke Wachs
-
Patent number: 10303623Abstract: A first non-volatile memory may store first data and a second non-volatile memory may store second data. An authentication component may be coupled with the first non-volatile memory and the second non-volatile memory and may receive a request to perform an authentication operation. In response to the request to perform the authentication operation, the authentication component may access the first data stored at the first non-volatile memory and the second data stored at the second non-volatile memory and determine whether the second data stored at the second non-volatile memory has become unreliable based on a memory disturbance condition. In response to determining that the second data stored at the second non-volatile memory has become unreliable, a corrective action associated with the first data stored at the first non-volatile memory may be performed.Type: GrantFiled: March 27, 2017Date of Patent: May 28, 2019Assignee: Cryptography Research, Inc.Inventors: Scott C. Best, Brent S. Haukness, Carl W. Werner
-
Patent number: 10262141Abstract: A computing device includes a secure storage hardware to store a secret value and processing hardware comprising at least one of a cache or a memory. During a secure boot process the processing hardware loads untrusted data into at least one of the cache or the memory of the processing hardware, the untrusted data comprising an encrypted data segment and a validator, retrieves the secret value from the secure storage hardware, derives an initial key based at least in part on an identifier associated with the encrypted data segment and the secret value, verifies, using the validator, whether the encrypted data segment has been modified, and decrypts the encrypted data segment using a first decryption key derived from the initial key to produce a decrypted data segment responsive to verifying that the encrypted data segment has not been modified.Type: GrantFiled: December 30, 2016Date of Patent: April 16, 2019Assignee: Cryptography Research, Inc.Inventors: Paul C. Kocher, Pankaj Rohatgi, Joshua M. Jaffe
-
Patent number: 10218496Abstract: Values and a sequence of operations associated with generating a key may be received. A determination may be made as to whether the sequence of operations associated with the key matches an authorized sequence of operations. The key may be outputted when the received sequence of operations matches the authorized sequence of operations and the key may not be outputted when the received sequence of operations does not match the authorized sequence of operations.Type: GrantFiled: July 24, 2015Date of Patent: February 26, 2019Assignee: Cryptography Research, Inc.Inventors: Megan Anneke Wachs, Ambuj Kumar, Benjamin Che-Ming Jun
-
Patent number: 10120985Abstract: A media storage device includes a media security controller and a memory to store data that relates to a media item to be rendered by a rendering device. The media security controller sends a message in response to the rendering device reading an authorization file. The message being for the rendering device to read a portion of data from the memory and to provide the portion of data to the media security controller. The media security controller receives the portion of the data from the rendering device, trans forms the portion of the data, and sends the transformed portion of the data to the rendering device.Type: GrantFiled: July 17, 2013Date of Patent: November 6, 2018Assignee: Cryptography Research, Inc.Inventors: Paul C. Kocher, Helena Handschuh
-
Patent number: 10095477Abstract: The embodiments described herein describe a chain of pattern generators organized in a ring topology. Each of the pattern generators in the chain includes asynchronous digital logic and implements an update rule that generates a bidirectional pattern within the chain of pattern generators. The asynchronous digital logic of a first pattern generator in the chain asynchronously updates a next state of the first pattern generator based on at least (a) a current state of the first pattern generator, (b) a second state of a second pattern generator that is before the first pattern generator in the chain, and (c) a third state of a third pattern generator that is after the first pattern generator in the chain.Type: GrantFiled: November 12, 2015Date of Patent: October 9, 2018Assignee: Cryptography Research Inc.Inventor: Scott C. Best
-
Patent number: 10084771Abstract: A mechanism for providing secure feature and key management in integrated circuits is described. An example method includes receiving, by a root authority system, data identifying a command that affects operation of an integrated circuit, singing, by the root authority system, the command using a root authority key to create a root signed block (RSB), and providing the RSB to a security manager of the integrated circuit.Type: GrantFiled: September 30, 2015Date of Patent: September 25, 2018Assignee: Cryptography Research, Inc.Inventors: Paul Carl Kocher, Benjamin Che-Ming Jun, Andrew John Leiserson
-
Publication number: 20180211065Abstract: Methods and systems for masking certain cryptographic operations in a manner designed to defeat side-channel attacks are disclosed herein. Squaring operations can be masked to make squaring operations indistinguishable or less distinguishable from multiplication operations. In general, squaring operations are converted into multiplication operations by masking them asymmetrically. Additional methods and systems are disclosed for defeating DPA, cross-correlation, and high-order DPA attacks against modular exponentiation.Type: ApplicationFiled: March 26, 2018Publication date: July 26, 2018Applicant: Cryptography Research, Inc.Inventor: JOSHUA M. JAFFE
-
Patent number: 10019564Abstract: Pairing data associated with a second device may be received at a first device. The pairing data may be received from a server. A first authentication proof may be generated based on the pairing data received from the server. A second authentication proof may be received from the second device. Furthermore, an authentication status of the second device may be updated based on a comparison of the first authentication proof that is based on the pairing data received from the server and the second authentication proof that is received from the second device.Type: GrantFiled: March 26, 2015Date of Patent: July 10, 2018Assignee: Cryptography Research, Inc.Inventors: Benjamin Che-Ming Jun, Matthew Evan Orzen, Joel Patrick Wittenauer, Steven C. Woo
-
Patent number: 10015164Abstract: The embodiments described herein describe technologies for Module management, including Module creation and Module deployment to a target device in an operation phase of a manufacturing lifecycle of the target device in a cryptographic manager (CM) environment. One implementation includes a Root Authority (RA) device that receives a command to create a Module and executes a Module Template to generate the Module in response to the command. The Module is deployed to an Appliance device. A set of instructions of the Module, when executed by the Appliance device, results in a secure construction of a sequence of operations to securely provision a data asset to the target device. The Appliance device is configured to distribute the data asset to a cryptographic manager (CM) core of the target device.Type: GrantFiled: November 6, 2014Date of Patent: July 3, 2018Assignee: Cryptography Research, Inc.Inventors: Michael Hamburg, Benjamin Che-Ming Jun, Paul C. Kocher, Daniel O'Loughlin, Denis Alexandrovich Pochuev
-
Patent number: 9970986Abstract: Systems and methods for authenticating integrated circuits. An example integrated circuit may comprise: a plurality of functional units electrically coupled to a power source; and an authenticating circuit comprising a plurality of voltage measurement units, each voltage measurement unit to measure, at one or more frequencies over one or more periods of time, a local voltage at a respective functional unit of the plurality of functional units.Type: GrantFiled: March 6, 2015Date of Patent: May 15, 2018Assignee: Cryptography Research, Inc.Inventors: Craig E. Hampel, Scott C. Best
-
Patent number: 9959429Abstract: Methods and systems for masking certain cryptographic operations in a manner designed to defeat side-channel attacks are disclosed herein. Squaring operations can be masked to make squaring operations indistinguishable or less distinguishable from multiplication operations. In general, squaring operations are converted into multiplication operations by masking them asymmetrically. Additional methods and systems are disclosed for defeating DPA, cross-correlation, and high-order DPA attacks against modular exponentiation.Type: GrantFiled: March 15, 2013Date of Patent: May 1, 2018Assignee: CRYPTOGRAPHY RESEARCH, INC.Inventor: Joshua M. Jaffe
-
Patent number: 9940463Abstract: A method for device authentication comprises receiving, by processing hardware of a first device, a message from a second device to authenticate the first device. The processing hardware retrieves a secret value from secure storage hardware operatively coupled to the processing hardware. The processing hardware derives a validator from the secret value using a path through a key tree, wherein the path is based on the message, wherein deriving the validator using the path through the key tree comprises computing a plurality of successive intermediate keys starting with a value based on the secret value and leading to the validator, wherein each successive intermediate key is derived based on at least a portion of the message and a prior key. The first device then sends the validator to the second device.Type: GrantFiled: August 30, 2017Date of Patent: April 10, 2018Assignee: Cryptography Research, Inc.Inventors: Paul Kocher, Pankaj Rohatgi, Joshua M. Jaffe
-
Patent number: 9940772Abstract: Chip cards are used to secure credit and debit payment transactions. To prevent fraudulent transactions, the card must protect cryptographic keys used to authenticate transactions. In particular, cards should resist differential power analysis and/or other attacks. To address security risks posed by leakage of partial information about keys during cryptographic transactions, cards may be configured to perform periodic cryptographic key update operations. The key update transformation prevents adversaries from exploiting partial information that may have been leaked about the card's keys. Update operations based on a hierarchical structure can enable efficient transaction verification by allowing a verifying party (e.g., an issuer) to derive a card's current state from a transaction counter and its initial state by performing one operation per level in the hierarchy, instead of progressing through all update operations performed by the card.Type: GrantFiled: October 24, 2007Date of Patent: April 10, 2018Assignee: CRYPTOGRAPHY RESEARCH, INC.Inventor: Paul C. Kocher