G06F7/582

PUBLIC RANDOM NUMBER GENERATION METHOD AND DEVICE BASED ON BLOCKCHAIN
20230163961 · 2023-05-25 ·

Disclosed is a public random number generation method based on a blockchain, including: selecting a node group G containing N trusted nodes; determining a first time point t.sub.m and a second time point t.sub.n respectively for generating an m-th/n-th block, wherein the former is earlier, and the m-th block is fixed and cannot be tampered at t.sub.n; at the first time point t.sub.m, enabling each of the N trusted nodes to separately generate a sub-random number r.sub.j as a component forming a random number X, wherein j=1, 2, . . . , N, on which delayed encryption is performed, with corresponding results placed in the m-th block; and at the second time point t.sub.n, decrypting the delayed encryption results to obtain decrypted data of them all that are all of sub-random number r.sub.j, on which operation is performed to obtain the random number X as a final available public random number.

APPARATUS FOR GENERATING RANDOM DATA AND A METHOD THEREOF

The present disclosure pertains to a circuitry for generating random data. The random data can be numbers. The circuitry includes a ring oscillator, a metastable oscillator, a first circuitry, and an analogue circuitry. The ring oscillator has a ring oscillator output frequency selectable through a selectable input of the ring oscillator. The metastable oscillator has a metastable oscillator output frequency selectable through a selectable input of the metastable oscillator. The first circuitry has a ring oscillator chain size selection logic circuit. The analogue circuitry has a capacitor and a switch used for varying frequency of the ring oscillator. The switch is configured to be controlled by the selection logic circuit of the first circuitry.

Secure compression
11468009 · 2022-10-11 · ·

In embodiments, secure compression algorithms are provided that may be employed as a single operation on raw data to produce compressed and encrypted data. In embodiments, the algorithms described herein may be performed using any type of dictionary based encryption. In one embodiment, upon adding a new prefix to a dictionary table, the dictionary table may be permuted to randomize the entries into the table. The randomization may be based upon a permutation value generated by a deterministic pseudo-random generator and/or pseudo-random function. Other embodiments of randomization may be employed to provide secure compression. For example, instead of permuting the entire table upon adding a prefix, the prefix may be randomly added to the table.

RANDOM NUMBER GENERATOR
20230115029 · 2023-04-13 ·

An apparatus includes a carry chain circuit and a detector circuit. The carry chain circuit includes a plurality of stages. Each stage of the plurality of stages includes a plurality of lookup table elements coupled in sequence. The carry chain circuit propagates a clock signal through the plurality of lookup table elements of the plurality of stages. The detector circuit determines, based on a value of the clock signal stored by a final lookup table element of each stage of the plurality of stages, which stage of the plurality stages contains an edge of the clock signal. The detector circuit then outputs a zero if the determined stage is assigned to a first group of the plurality of stages and a one if the determined stage is assigned to a second group of the plurality of stages.

Numerical splitting device, transmission information generating device, secure computation device, method, program recording medium, and secure computation system
11468796 · 2022-10-11 · ·

This numerical splitting device: acquires a numerical value w and a parameter p; generates a first random number r1 and a second random number r2; computes a third random number r3 based on the numerical value w, parameter p, first random number r1, and second random number r2 according to an expression, r3=w−r1-r2 mod p; computes first to third segments s1, s2, s3 based on the first to third random numbers r1, r2, r3 and the parameter p according to expressions, s1=r1+r2 mod p, s2=r2+r3 mod p, and s3=r3+r1 mod p; and transmits a pair of the first segment s1 and the second random number r2, a pair of the second segment s2 and the third random number r3, and a pair of the third segment s3 and the first random number r1 to first to third secure computation devices, respectively.

Techniques for accessing on-premise data sources from public cloud for designing data processing pipelines
11604801 · 2023-03-14 · ·

A system for simulating a dataset based on sample statistics, and generating pipeline instructions for a database using the simulated dataset, is disclosed. The system may be a cloud-based platform. The system can provide improved performance and security while designing and deploying Extract-Transform-Load (ETL) database pipelines to manage on-premises data. The system receives, from a remote client, sample statistics characterizing a distribution of data corresponding to a column of a database table. The system can generate, based on the received sample statistics, a simulated dataset representing the column of the database table. The simulated dataset may be generated using pseudo-random data values from a distribution with statistics matching the sample statistics. The system can build a simulated database relation based at least in part on the simulated dataset. The system can generate and deploy pipeline instructions using the simulated database relation.

AUTHENTICATION DEVICE, NETWORK DEVICE, COMMUNICATION SYSTEM, AUTHENTICATION METHOD, AND NON-TRANSITORY COMPUTER READABLE MEDIUM

Provided is an authentication device capable of generating a master key suited to a UE in a 5GS. The authentication device (10) includes a communication unit (11) configured to, in registration processing of user equipment (UE), acquire UE key derivation function (KDF) capabilities indicating a pseudo random function supported by the UE, a selection unit (12) configured to select a pseudo random function used for generation of a master key related to the UE by use of the UE KDF capabilities, and a key generation unit (13) configured to generate a master key related to the UE by use of the selected pseudo random function.

Electronic Gaming Machine with Symbols Streaming Adjacent an Active Reel Matrix with Reel Expansion and Symbol Absorption Processes
20230104938 · 2023-04-06 ·

An electronic gaming device that satisfies a return-to-player value when different features are initiated. The electronic gaming device includes a display device and a controller. The controller animates in the active reel matrix a plurality of game symbols, and a plurality of configurable symbols selected moving from a space moving into the active reel matrix. When the plurality of game symbols selected include a first trigger symbol, the controller also expands the active reel matrix to include more symbols. When the active reel matrix includes a second trigger symbol, the controller absorbs values of the plurality of configurable symbols into the second trigger symbol.

Systems and methods implementing countermeasures to phase tracking attacks on ring oscillator based entropy sources
11646867 · 2023-05-09 · ·

Systems and methods for increasing security in a computer system are provided. The system includes one or more logic circuits. The one or more logic circuits receive a plurality of independent first entropy values from a hardware source, apply at least some of the plurality of independent first entropy values to a function to generate a second entropy value, and seed a pseudorandom number generator with the second entropy value. The one or more logic circuits also generate a random number using the pseudorandom number generator seeded with the second entropy value and may produce a block of ciphertext or message authentication code using the random number, or otherwise use the generated numbers as secure random numbers in applications such as cryptographic protocols.

Methods and apparatus for power efficient design of forward error correction for optical communication systems

Consistent with a further aspect of the present disclosure, previously encoded data is stored in a memory, and an encoder accesses both input data and previously encoded data to generate new encoded data or a new codeword. Each codeword is stored in a row of the memory, and with each newly generated codeword, each previously stored code word is shifted to an adjacent row of the memory. In one example, the memory is delineated as a plurality of blocks including rows and columns of bits. When generating a new code word, randomly selected columns of bits in the memory are read from randomly selected blocks of the memory and supplied to the encoder. In this manner the number of times the memory is access is reduced and power consumption is reduced.