Patents by Inventor Avinash L. Varna
Avinash L. Varna has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20240061942Abstract: An apparatus is described including cryptography circuitry to generate authentication tags to provide integrity protection for plaintext and ciphertext.Type: ApplicationFiled: October 27, 2023Publication date: February 22, 2024Applicant: Intel CorporationInventors: Reuven Elbaum, Gyora Benedek, Avinash L. Varna, David Novick
-
Patent number: 11816229Abstract: An apparatus is described including cryptography circuitry to generate authentication tags to provide integrity protection for plaintext and ciphertext.Type: GrantFiled: August 13, 2021Date of Patent: November 14, 2023Assignee: Intel CorporationInventors: Reuven Elbaum, Gyora Benedek, Avinash L. Varna, David Novick
-
Publication number: 20230185905Abstract: Protection of authentication tag computation against power and electromagnetic side-channel attacks is described. An example of one or more storage mediums includes instructions for performing a process for calculation of an authentication tag for a data encryption operation, including generating one or more random values; receiving multiple data blocks for calculation, and performing calculation utilizing the received data blocks and the one or more random values to generate intermediate values; performing a data accumulation operation to accumulate random values in calculation of the data blocks; and calculating the authentication tag based at least in part on the generated intermediate values and the accumulated random values.Type: ApplicationFiled: December 15, 2022Publication date: June 15, 2023Applicant: Intel CorporationInventors: Santosh Ghosh, Avinash L. Varna, Reuven Elbaum, Manoj Sastry
-
Publication number: 20220416998Abstract: In one example an apparatus comprises an input state register, and a first round secure hash algorithm (SHA) datapath circuit communicatively coupled to the input state register and a second round secure hash algorithm (SHA) datapath circuit communicatively coupled to the first round secure hash datapath circuit, the first round secure has algorithm (SHA) datapath circuit and the second round secure hash algorithm (SHA) datapath circuit each comprising a first section to perform a ? step of a SHA calculation, a second section to perform a ? step calculation, a third section to perform a ? step of the SHA calculation, a fourth section to perform a ? step of the SHA calculation, and a fifth section to perform a ? step of the SHA calculation.Type: ApplicationFiled: June 23, 2021Publication date: December 29, 2022Applicant: Intel CorporationInventors: Santosh Ghosh, Dumitru-Daniel Dinu, Joseph Friel, Avinash L. Varna, Manoj Sastry
-
Publication number: 20220150046Abstract: A security processor includes a scheduler to read input data blocks from an input buffer, send the input data blocks to one or more cryptographic circuits in a first random order; and send data blocks having random values in a second random order to one or more of the cryptographic circuits that did not receive the input data blocks.Type: ApplicationFiled: September 16, 2021Publication date: May 12, 2022Applicant: Intel CorporationInventors: Dumitru-Daniel Dinu, Emre Karabulut, Aditya Katragada, Geoffrey Strongin, Avinash L. Varna
-
Publication number: 20220083651Abstract: Protection of authentication tag computation against power and electromagnetic side-channel attacks is described. An example of one or more storage mediums includes instructions for performing a process for calculation of an authentication tag for a data encryption operation, including generating one or more random values; receiving multiple data blocks for calculation, and performing calculation utilizing the received data blocks and the one or more random values to generate intermediate values; performing a data accumulation operation to accumulate random values in calculation of the data blocks; and calculating the authentication tag based at least in part on the generated intermediate values and the accumulated random values.Type: ApplicationFiled: September 17, 2020Publication date: March 17, 2022Applicant: Intel CorporationInventors: Santosh Ghosh, Avinash L. Varna, Reuven Elbaum, Manoj Sastry
-
Publication number: 20220006630Abstract: An apparatus comprises an input register comprising an input polynomial, a processing datapath communicatively coupled to the input register comprising a plurality of compute nodes to perform a number theoretic transform (NTT) algorithm on the input polynomial to generate an output polynomial in NTT format. The plurality of compute nodes comprises at least a first butterfly circuit to perform a series of butterfly calculations on input data and a randomizing circuitry to randomize an order of the series of butterfly calculations.Type: ApplicationFiled: September 21, 2021Publication date: January 6, 2022Applicant: Intel CorporationInventors: Santosh Ghosh, Andrea Basso, Dumitru-Daniel Dinu, Avinash L. Varna, Manoj Sastry
-
Publication number: 20220006611Abstract: An apparatus comprises an input register comprising an input polynomial, a processing datapath communicatively coupled to the input register comprising a plurality of compute nodes to perform an incomplete number theoretic transform (NTT) algorithm on the input polynomial to generate an output polynomial in NTT format, the plurality of compute nodes comprising at least a first NTT circuit comprising a single butterfly circuit to perform a series of butterfly calculations on input data; and a randomizing circuitry to randomize an order of the series of butterfly calculations.Type: ApplicationFiled: September 21, 2021Publication date: January 6, 2022Applicant: Intel CorporationInventors: Santosh Ghosh, Andrea Basso, Dumitru-Daniel Dinu, Avinash L. Varna, Manoj Sastry
-
Patent number: 11216594Abstract: Embodiments are directed to countermeasures against hardware side-channel attacks on cryptographic operations. An embodiment of an apparatus includes multiple crypto cores; and a current source including multiple current source blocks, the current source blocks including a respective current source block associated with each of the crypto cores, and wherein the current sources blocks are switchable to switch on a current source block associated with each active core of the multiple crypto cores and to switch off a current source associated with each inactive core of the multiple cryptographic cores.Type: GrantFiled: June 28, 2019Date of Patent: January 4, 2022Assignee: INTEL CORPORATIONInventors: Santosh Ghosh, Debayan Das, Carlos Tokunaga, Avinash L. Varna, Joseph Friel
-
Publication number: 20210374256Abstract: An apparatus is described including cryptography circuitry to generate authentication tags to provide integrity protection for plaintext and ciphertext.Type: ApplicationFiled: August 13, 2021Publication date: December 2, 2021Applicant: Intel CorporationInventors: Reuven Elbaum, Gyora Benedek, Avinash L. Varna, David Novick
-
Publication number: 20190318130Abstract: Embodiments are directed to countermeasures against hardware side-channel attacks on cryptographic operations. An embodiment of an apparatus includes multiple crypto cores; and a current source including multiple current source blocks, the current source blocks including a respective current source block associated with each of the crypto cores, and wherein the current sources blocks are switchable to switch on a current source block associated with each active core of the multiple crypto cores and to switch off a current source associated with each inactive core of the multiple cryptographic cores.Type: ApplicationFiled: June 28, 2019Publication date: October 17, 2019Applicant: Intel CorporationInventors: Santosh Ghosh, Debayan Das, Carlos Tokunaga, Avinash L. Varna, Joseph Friel
-
Patent number: 10256973Abstract: Described is an apparatus comprising an S-box circuitry operable to convert a value on an input into a value on an output in accordance with an Advanced Encryption Standard (AES) Rijndael S-box matrix. The apparatus also comprises a pseudo-random number generation (PRG) circuitry operable to provide a sequence of pseudo-random numbers on a first output and a registered copy of the sequence on a second output. The apparatus further comprises a mask circuitry operable to provide an XOR of a value on the output of the S box circuitry and a value on the first output of the PRG circuitry. The apparatus additionally comprises a mask removal circuitry operable to provide an XOR of a value on an output of the data register circuitry, a value coupled to an output of a key register circuitry, and a value on the second output of the PRG circuitry.Type: GrantFiled: September 30, 2016Date of Patent: April 9, 2019Assignee: Intel CorporationInventors: Raghavan Kumar, Sanu K. Mathew, Avinash L. Varna, Vikram B. Suresh, Sudhir K. Satpathy
-
Publication number: 20180097618Abstract: Described is an apparatus comprising an S-box circuitry operable to convert a value on an input into a value on an output in accordance with an Advanced Encryption Standard (AES) Rijndael S-box matrix. The apparatus also comprises a pseudo-random number generation (PRG) circuitry operable to provide a sequence of pseudo-random numbers on a first output and a registered copy of the sequence on a second output. The apparatus further comprises a mask circuitry operable to provide an XOR of a value on the output of the S box circuitry and a value on the first output of the PRG circuitry. The apparatus additionally comprises a mask removal circuitry operable to provide an XOR of a value on an output of the data register circuitry, a value coupled to an output of a key register circuitry, and a value on the second output of the PRG circuitry.Type: ApplicationFiled: September 30, 2016Publication date: April 5, 2018Inventors: Raghavan Kumar, Sanu K. Mathew, Avinash L. Varna, Vikram B. Suresh, Sudhir K. Satpathy
-
Patent number: 9363467Abstract: Various systems and methods may benefit from determination of environmental signatures in recordings. For example, such signatures may aid forensic analysis and alignment of media recordings, such as alignment of audio or video recordings. A method can include reading data representative of sensed light in a visual track of a video recording. The method can also include extracting an electric network frequency signal from the data representative of sensed light.Type: GrantFiled: November 29, 2013Date of Patent: June 7, 2016Assignee: University of Maryland, College ParkInventors: Ravi Garg, Avinash L. Varna, Adi Hajj-Ahmad, Min Wu
-
Publication number: 20140147097Abstract: Various systems and methods may benefit from determination of environmental signatures in recordings. For example, such signatures may aid forensic analysis and alignment of media recordings, such as alignment of audio or video recordings. A method can include reading data representative of sensed light in a visual track of a video recording. The method can also include extracting an electric network frequency signal from the data representative of sensed light.Type: ApplicationFiled: November 29, 2013Publication date: May 29, 2014Applicant: University of Maryland, Office of Technology CommercializationInventors: Ravi GARG, Avinash L. VARNA, Adi HAJJ-AHMAD, Min WU
-
Publication number: 20100146299Abstract: A confidentiality preserving system and method for performing a rank-ordered search and retrieval of contents of a data collection. The system includes at least one computer system including a search and retrieval algorithm using term frequency and/or similar features for rank-ordering selective contents of the data collection, and enabling secure retrieval of the selective contents based on the rank-order. The search and retrieval algorithm includes a baseline algorithm, a partially server oriented algorithm, and/or a fully server oriented algorithm. The partially and/or fully server oriented algorithms use homomorphic and/or order preserving encryption for enabling search capability from a user other than an owner of the contents of the data collection. The confidentiality preserving method includes using term frequency for rank-ordering selective contents of the data collection, and retrieving the selective contents based on the rank-order.Type: ApplicationFiled: October 29, 2009Publication date: June 10, 2010Inventors: Ashwin SWAMINATHAN, Yinian Mao, Guan-Ming Su, Hongmei Gou, Avinash L. Varna, Shan He, Min Wu, Douglas W. Oard