Abstract: An apparatus is described including cryptography circuitry to generate authentication tags to provide integrity protection for plaintext and ciphertext.
Type:
Application
Filed:
October 27, 2023
Publication date:
February 22, 2024
Applicant:
Intel Corporation
Inventors:
Reuven Elbaum, Gyora Benedek, Avinash L. Varna, David Novick
Abstract: Systems and methods for sharing data between a first node and second node are disclosed. The methods may include sharing a first initialization vector between a first node and a second node using a multi-stage cryptography protocol. A first bit stream of first information may be passed from the first node to the second node using a single-stage cryptography protocol that encodes a message with the first initialization vector.
Abstract: Systems and methods for sharing data between a first node and second node are disclosed. The methods may include sharing a first initialization vector between a first node and a second node using a multi-stage cryptography protocol. A first bit stream of first information may be passed from the first node to the second node using a single-stage cryptography protocol that encodes a message with the first initialization vector.
Type:
Grant
Filed:
July 11, 2014
Date of Patent:
August 15, 2017
Assignee:
The Board of Regents of the University of Oklahoma
Abstract: The present invention provides an efficient secure end-to-end messaging system utilizing encrypted ephemeral messages. The method comprises the steps of using a combination of HTTPS for transport security, using symmetric key cryptography with rotating temporary keys for individual message security, and using elliptic curve cryptography for key derivation and message authentication. The key rotation scheme used provides forward secrecy between messages and sessions.
Abstract: An encoded human readable datum (EHRD) can be generated wherein the creator of the EHRD maintains control over the metadata associated with the EHRD. This metadata can be used to inform service providers how to send and receive communications with the owner of the EHRD. The metadata data associated with this EHRD can be updated. Controlling who can update the metadata associated with the EHRD is secured using cryptography, blockchain technology, or cryptography and blockchain technology.
Abstract: Disclosed is a computerized apparatus and method for version control and management. The apparatus includes a cryptography boot loader, a control module on key usage, and one or more agents. After the user's device is powered on, the cryptography boot loader stores a user key, and checks an operating system (OS) certificate for an OS and an application certificate for an application to determine whether these certificates are valid. Then, a right object is obtained with a user certificate through an agent. The control module on key usage compares the OS version and the application version with the version required by the right object. The permission access to the user key is determined by the comparison result. This invention associates the cryptography component with the boot loader to develop a security mechanism performed by OS and application for using a secret key.
Type:
Grant
Filed:
July 23, 2007
Date of Patent:
September 28, 2010
Assignee:
Industrial Technology Research Institute
Abstract: The present disclosure generally relates to securing access to resource and access rights using cryptography and the blockchain. Certain embodiments of the present disclosure generally relate to systems and methods that enhance the security of resource access using hierarchical deterministic (HD) cryptography and the blockchain. Certain embodiments of the present disclosure relate to systems and methods that securely and anonymously represent the identity of a user and the user's access code data on a distributed ledger represented across the blockchain.
Abstract: An example authentication server system comprising: a processor; and a memory resource storing machine readable instructions executable by the processor to: receive an input from a device indicating a request to log into the system; verify the input from the device using an asymmetric cryptography key pair; deny access to the device in response to the input failing to correspond to the asymmetric cryptography key pair; and inactivate an account of the device based on a number of attempt failures exceeding a failure threshold.
Abstract: The present disclosure generally relates to securing access to resource and access rights using cryptography and the blockchain. Certain embodiments of the present disclosure generally relate to systems and methods that enhance the security of resource access using hierarchical deterministic (HD) cryptography and the blockchain. Certain embodiments of the present disclosure relate to systems and methods that securely and anonymously represent the identity of a user and the user's access code data on a distributed ledger represented across the blockchain.
Abstract: An apparatus is described including cryptography circuitry to generate authentication tags to provide integrity protection for plaintext and ciphertext.
Type:
Grant
Filed:
August 13, 2021
Date of Patent:
November 14, 2023
Assignee:
Intel Corporation
Inventors:
Reuven Elbaum, Gyora Benedek, Avinash L. Varna, David Novick
Abstract: An apparatus is described including cryptography circuitry to generate authentication tags to provide integrity protection for plaintext and ciphertext.
Type:
Grant
Filed:
October 27, 2023
Date of Patent:
May 13, 2025
Assignee:
Intel Corporation
Inventors:
Reuven Elbaum, Gyora Benedek, Avinash L. Varna, David Novick
Abstract: Systems, methods, and computer-executable instructions for protecting data that includes receiving a request for a first data value. A data store is queried for a first stored data value. The first stored data value is received which contains a security prefix and encrypted data. From the security prefix, a cryptography algorithm and a key are determined. The encrypted data is decrypted using the cryptography algorithm and the key. The decrypted data is returned.
Abstract: The present disclosure generally relates to securing access to resource and access rights using cryptography and the blockchain. Certain embodiments of the present disclosure generally relate to systems and methods that enhance the security of resource access using hierarchical deterministic (HD) cryptography and the blockchain. Certain embodiments of the present disclosure relate to systems and methods that securely and anonymously represent the identity of a user and the user's access code data on a distributed ledger represented across the blockchain.
Abstract: Solutions and methods are disclosed herein for generating a key from outputs of a Physically Unclonable Function (PUF) and using the key for a cryptographic algorithm. In one embodiment, a device generates the key, which comprises (i) receiving a request to generate a key comprising a defined number of bits for a particular cryptography algorithm and (ii) responsive to receiving the request, generating a valid key for the particular cryptography algorithm. The step of generating the valid key further comprises (a) generating one or more first challenges for a PUF, which is one or more of a plurality of challenges in a challenge space of the PUF, (b) generating a first potential key based on one or more first responses by the PUF responsive to the one or more first challenges, and (c) determining whether the first potential key satisfies one or more predefined criteria for the particular cryptography algorithm.
Abstract: A method for performing cryptography operations on data blocks within a volume of data is disclosed. The method involves generating a volume master key, generating a user key, generating a volume initialization vector, generating an intermediate key, generating a user volume key, and performing cryptography operations on data blocks within an individual volume of data using the volume master key, the user key, the volume initialization vector, the intermediate key, and the user volume key.
Abstract: A method for performing cryptography operations on data blocks within a volume of data is disclosed. The method involves generating a volume master key, generating a user key, generating a volume initialization vector, generating an intermediate key, generating a user volume key, and performing cryptography operations on data blocks within an individual volume of data using the volume master key, the user key, the volume initialization vector, the intermediate key, and the user volume key.
Abstract: A method, system and apparatus are described for ensuring a uniform random distribution of keys generated for cryptography. These generated keys, are depicted utilizing a trusted third party, or Certification Authority (CA) in the generation of a reliable seed to be used in the generation of prime numbers used in public key cryptography. The inclusion of the trusted third party allows for an independent third party to police against first party attacks on the security of the system without increasing the overhead of the system significantly.
Type:
Grant
Filed:
February 24, 1999
Date of Patent:
April 14, 2009
Assignee:
International Business Machines Corporation
Inventors:
Stephen Michael Matyas, Jr., Allen Roginsky
Abstract: Methods and apparatus are provided for handling data at a cryptography accelerator output interface. A shared resource such as a shared output buffer is provided at the cryptography accelerator output interface having multiple output ports. The output interface shared resource can be allocated amongst the various output ports based on characteristics and requirements of the various input ports. References to data in the shared resource allow processing and ordering of data following processing by cryptographic processing cores.
Abstract: A distributed computing environment utilizes a cryptography service. The cryptography service manages keys securely on behalf of one or more entities. The service may utilize multiple security modules. A coordinator may coordinate the security modules to ensure that the security modules operate with consistent operational parameters. A security module may propose a set of parameters for acceptance by the coordinator. If accepted, the coordinator may update the security modules in accordance with the proposal.
Type:
Grant
Filed:
June 13, 2013
Date of Patent:
March 29, 2016
Assignee:
Amazon Technologies, Inc.
Inventors:
Gregory Branchek Roth, Matthew James Wren, Eric Jason Brandwine, Brian Irl Pratt