Patents by Inventor Vikram Suresh
Vikram Suresh has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20190319799Abstract: In one example an apparatus comprises a computer readable memory, a signature logic to generate a signature to be transmitted in association with a message, the signature logic to apply a hash-based signature scheme to the message using a private key to generate the signature comprising a public key, or a verification logic to verify a signature received in association with the message, the verification logic to apply the hash-based signature scheme to verify the signature using the public key, and an accelerator logic to apply a structured order to at least one set of inputs to the hash-based signature scheme. Other examples may be described.Type: ApplicationFiled: June 28, 2019Publication date: October 17, 2019Applicant: Intel CorporationInventors: Vikram Suresh, Sanu Mathew, Manoj Sastry, Santosh Ghosh, Raghavan Kumar, Rafael Misoczki
-
Publication number: 20190319797Abstract: In one example an apparatus comprises a computer readable memory, hash logic to generate a message hash value based on an input message, signature logic to generate a signature to be transmitted in association with the message, the signature logic to apply a hash-based signature scheme to a private key to generate the signature comprising a public key, and accelerator logic to pre-compute at least one set of inputs to the signature logic. Other examples may be described.Type: ApplicationFiled: June 28, 2019Publication date: October 17, 2019Applicant: Intel CorporationInventors: VIKRAM SURESH, SANU MATHEW, MANOJ SASTRY, SANTOSH GHOSH, RAGHAVAN KUMAR, RAFAEL MISOCZKI
-
Publication number: 20190319804Abstract: A mechanism is described for facilitating unified accelerator for classical and post-quantum digital signature schemes in computing environments, according to one embodiment. A method of embodiments, as described herein, includes unifying classical cryptography and post-quantum cryptography through a unified hardware accelerator hosted by a trusted platform of the computing device. The method may further include facilitating unification of a first finite state machine associated with the classical cryptography and a second finite state machine associated with the post-quantum cryptography though one or more of a single the hash engine, a set of register file banks, and a modular exponentiation engine.Type: ApplicationFiled: June 28, 2019Publication date: October 17, 2019Applicant: Intel CorporationInventors: SANU MATHEW, MANOJ SASTRY, SANTOSH GHOSH, VIKRAM SURESH, ANDREW H. REINDERS, RAGHAVAN KUMAR, RAFAEL MISOCZKI
-
Publication number: 20190319796Abstract: In one example an apparatus comprises a computer readable memory, an XMSS verification manager logic to manage XMSS verification functions, a one-time signature and public key generator logic, a chain function logic to implement chain function algorithms, a low latency SHA3 hardware engine, and a register bank communicatively coupled to the XMSS verification manager logic. Other examples may be described.Type: ApplicationFiled: June 28, 2019Publication date: October 17, 2019Applicant: Intel CorporationInventors: SANTOSH GHOSH, Vikram Suresh, Sanu Mathew, Manoj Sastry, Andrew H. Reinders, Raghavan Kumar, Rafael Misoczki
-
Publication number: 20190305970Abstract: An apparatus is provided which comprises: an entropy source to produce a first random sequence of bits, wherein the entropy source comprises an array of bi-stable cross-coupled inverter cells; a first circuitry coupled to the entropy source, wherein the first circuitry to generate an entropy source selection set; and a second circuitry coupled to the entropy source and the first circuitry, wherein the second circuitry is to receive the first random sequence and the entropy source selection set, and wherein the second circuitry is to generate a second random sequence.Type: ApplicationFiled: March 30, 2018Publication date: October 3, 2019Applicant: Intel CorporationInventors: Sudhir Satpathy, Vikram Suresh, Sanu Mathew
-
Patent number: 10346343Abstract: Encryption of a BIOS using a programmable logic device (PLD) is described. A PLD may include a static random-access memory area including programmable logic in a Lookup Table to receive a request to authenticate a basic input/output system (BIOS) executing on a processor coupled to the PLD. The PLD may calculate a hash value of a message associated with the BIOS using a Secure Hash Algorithm (SHA). The PLD may also include a random-access memory area including a first embedded random access memory block (EBR) to store a first portion of a 256-bit message digest associated with the message, a fifth portion of the 256-bit message digest, and second, third, fourth, sixth, seventh, and eighth EBRs to store second, third, fourth, sixth, seventh, and eighth portions of the 256-bit message digest, respectively.Type: GrantFiled: June 24, 2016Date of Patent: July 9, 2019Assignee: Intel CorporationInventors: Vikram Suresh, Sudhir Satpathy, Sanu Mathew, Neeraj Upasani
-
Publication number: 20190199517Abstract: An integrated circuit features technology for generating a keystream. The integrated circuit comprises a cipher block with a linear feedback shift register (LFSR) and a finite state machine (FSM). The LFSR and the FSM are configured to generate a stream of keys, based on an initialization value and an initialization key. The FSM comprises an Sbox that is configured to use a multiplicative mask to mask data that is processed by the Sbox when the LFSR and the FSM are generating the stream of keys. Other embodiments are described and claimed.Type: ApplicationFiled: February 28, 2019Publication date: June 27, 2019Inventors: Sudhir Satpathy, Vikram Suresh, Sanu Mathew
-
Patent number: 10326596Abstract: Various embodiments are generally directed to techniques for secure message authentication and digital signatures, such as with a cipher-based hash function, for instance. Some embodiments are particularly directed to a secure authentication system that implements various aspects of the cipher-based hash function in dedicated hardware or circuitry. In various embodiments, the secure authentication system may implement one or more elements of the Whirlpool hash function in dedicated hardware. For instance, the compute-intensive substitute byte and mix rows blocks of the block cipher in the Whirlpool hash function may be implemented in dedicated hardware or circuitry using a combination of Galois Field arithmetic and fused scale/reduce circuits. In some embodiments, the microarchitecture of the secure authentication system may be implemented with delayed add key to limit the memory requirement to three sequential registers.Type: GrantFiled: October 1, 2016Date of Patent: June 18, 2019Assignee: INTEL CORPORATIONInventors: Vikram Suresh, Sudhir Satpathy, Sanu Mathew
-
Patent number: 10218497Abstract: A hybrid AES-SMS4 hardware accelerator is described. A System on Chip implementing a hybrid AES-SMS4 hardware accelerator may include a processor core and a single hardware accelerator coupled to the processor core, the single hardware accelerator to encrypt or decrypt data. The single hardware accelerator may include a first block cipher to encrypt or decrypt the data according to a first encryption algorithm and a second block cipher to encrypt or decrypt the data according to a second encryption algorithm. The accelerator may further include a combined substitution box (Sbox) coupled to the first block cipher and the second block cipher, the combined Sbox comprising logic to perform Galois Field (GF) multiplications and inverse computations, wherein the inverse computations are common to the first block cipher and the second block cipher.Type: GrantFiled: August 31, 2016Date of Patent: February 26, 2019Assignee: Intel CorporationInventors: Vikram Suresh, Sudhir Satpathy, Sanu Mathew
-
Publication number: 20190044699Abstract: Methods and apparatus for a reconfigurable Galois Field (GF) Sbox unit for Camellia, AES, and SM4 hardware accelerator are described. In one embodiment, a modified Substitute box (Sbox) leverages a common field of GF to incorporate a multi-cipher mode of operation. The hybrid Sbox design can reduce area and/or energy consumption. Other embodiments are also described and claimed.Type: ApplicationFiled: June 28, 2018Publication date: February 7, 2019Applicant: Intel CorporationInventors: Sudhir Satpathy, Sanu Mathew, Vikram Suresh
-
Publication number: 20190044739Abstract: An embodiment of a semiconductor package apparatus may include technology to generate a first output from a physically unclonable function (PUF) based on a challenge, modify the challenge based on the first output, and generate a response based on the modified challenge. Some embodiments may additionally or alternatively include technology to change a read sequence of the PUF based on an output of the PUF. Some embodiments may additionally or alternatively include technology to vary a latency of a linear feedback shift register based on an output from the PUF. Other embodiments are disclosed and claimed.Type: ApplicationFiled: March 30, 2018Publication date: February 7, 2019Applicant: Intel CorporationInventors: Manoj Sachdev, Vikram Suresh, Sanu Mathew, Sudhir Satpathy
-
Publication number: 20190042249Abstract: Methods and apparatuses relating to high-performance authenticated encryption are described.Type: ApplicationFiled: April 2, 2018Publication date: February 7, 2019Inventors: VIKRAM SURESH, SANU MATHEW, SUDHIR SATPATHY, VINODH GOPAL
-
Publication number: 20180097630Abstract: Various embodiments are generally directed to techniques for secure message authentication and digital signatures, such as with a cipher-based hash function, for instance. Some embodiments are particularly directed to a secure authentication system that implements various aspects of the cipher-based hash function in dedicated hardware or circuitry. In various embodiments, the secure authentication system may implement one or more elements of the Whirlpool hash function in dedicated hardware. For instance, the compute-intensive substitute byte and mix rows blocks of the block cipher in the Whirlpool hash function may be implemented in dedicated hardware or circuitry using a combination of Galois Field arithmetic and fused scale/reduce circuits. In some embodiments, the microarchitecture of the secure authentication system may be implemented with delayed add key to limit the memory requirement to three sequential registers.Type: ApplicationFiled: October 1, 2016Publication date: April 5, 2018Applicant: INTEL CORPORATIONInventors: VIKRAM SURESH, SUDHIR SATPATHY, SANU MATHEW
-
Publication number: 20180089642Abstract: A Bitcoin mining hardware accelerator is described. A System on Chip implementing a Bitcoin mining hardware accelerator may include a processor core and a hardware accelerator coupled to the processor core, the hardware accelerator to mine digital currency. The hardware accelerator may include a first computational block, including a message digest datapath, wherein the first computational block is to: precompute a first summation of a 32-bit message (Wi), a 32-bit round constant (Ki), and a content of a first shifted state register (Gi?1), and store a result of the first summation in a state register (Hi). The Bitcoin mining hardware accelerator may further include a second computational block comprising a message scheduler datapath.Type: ApplicationFiled: September 23, 2016Publication date: March 29, 2018Inventors: Vikram SURESH, Sudhir SATPATHY, Sanu MATHEW
-
Publication number: 20180062829Abstract: A hybrid AES-SMS4 hardware accelerator is described. A System on Chip implementing a hybrid AES-SMS4 hardware accelerator may include a processor core and a single hardware accelerator coupled to the processor core, the single hardware accelerator to encrypt or decrypt data. The single hardware accelerator may include a first block cipher to encrypt or decrypt the data according to a first encryption algorithm and a second block cipher to encrypt or decrypt the data according to a second encryption algorithm. The accelerator may further include a combined substitution box (Sbox) coupled to the first block cipher and the second block cipher, the combined Sbox comprising logic to perform Galois Field (GF) multiplications and inverse computations, wherein the inverse computations are common to the first block cipher and the second block cipher.Type: ApplicationFiled: August 31, 2016Publication date: March 1, 2018Inventors: Vikram SURESH, Sudhir SATPATHY, Sanu MATHEW
-
Publication number: 20170373839Abstract: Encryption of a BIOS using a programmable logic device (PLD) is described. A PLD may include a static random-access memory area including programmable logic in a Lookup Table to receive a request to authenticate a basic input/output system (BIOS) executing on a processor coupled to the PLD. The PLD may calculate a hash value of a message associated with the BIOS using a Secure Hash Algorithm (SHA). The PLD may also include a random-access memory area including a first embedded random access memory block (EBR) to store a first portion of a 256-bit message digest associated with the message, a fifth portion of the 256-bit message digest, and second, third, fourth, sixth, seventh, and eighth EBRs to store second, third, fourth, sixth, seventh, and eighth portions of the 256-bit message digest, respectively.Type: ApplicationFiled: June 24, 2016Publication date: December 28, 2017Inventors: Vikram SURESH, Sudhir SATPATHY, Sanu MATHEW, Neeraj UPASANI
-
Patent number: 9843441Abstract: Embodiments of an invention for a compact, low power Advanced Encryption Standard circuit are disclosed. In one embodiment, an apparatus includes an encryption unit having a substitution box and an accumulator. The substitution box is to perform a substitution operation on one byte per clock cycle. The accumulator is to accumulate four bytes and perform a mix-column operation in four clock cycles. The encryption unit is implemented using optimum Galois Field polynomial arithmetic for minimum area.Type: GrantFiled: September 24, 2013Date of Patent: December 12, 2017Assignee: Intel CorporationInventors: Sanu Mathew, Vikram Suresh, Sudhir Satpathy, Mark Anders, Himanshu Kaul, Ram Krishnamurthy
-
Patent number: 9013949Abstract: The present disclosure relates to a method and system for controlling memory access. In particular, a method for controlling memory access includes, in response to receiving a write request operative to write data to at least one memory cell of a plurality of memory cells, increasing a word line voltage above a nominal level after a predetermined delay following the receipt of the write request. A disclosed system includes a word line driver operative to increase a word line voltage above a nominal level during a write access after a predetermined delay in response to a write request.Type: GrantFiled: December 19, 2011Date of Patent: April 21, 2015Assignee: Advanced Micro Devices, Inc.Inventors: Russell Schreiber, Vikram Suresh
-
Publication number: 20150086007Abstract: Embodiments of an invention for a compact, low power Advanced Encryption Standard circuit are disclosed. In one embodiment, an apparatus includes an encryption unit having a substitution box and an accumulator. The substitution box is to perform a substitution operation on one byte per clock cycle. The accumulator is to accumulate four bytes and perform a mix-column operation in four clock cycles. The encryption unit is implemented using optimum Galois Field polynomial arithmetic for minimum area.Type: ApplicationFiled: September 24, 2013Publication date: March 26, 2015Inventors: Sanu MATHEW, Vikram Suresh, Sudhir Satpathy, Mark Anders, Himanshu Kaul, Ram Krishnamurthy
-
Publication number: 20130155793Abstract: The present disclosure relates to a method and system for controlling memory access. In particular, a method for controlling memory access includes, in response to receiving a write request operative to write data to at least one memory cell of a plurality of memory cells, increasing a word line voltage above a nominal level after a predetermined delay following the receipt of the write request. A disclosed system includes a word line driver operative to increase a word line voltage above a nominal level during a write access after a predetermined delay in response to a write request.Type: ApplicationFiled: December 19, 2011Publication date: June 20, 2013Applicant: ATI Technologies ULCInventors: Russell Schreiber, Vikram Suresh