G06F7/588

AUTHENTICATION OF COMPUTER DEVICES WITHOUT PASSWORD STORAGE
20230012084 · 2023-01-12 ·

An apparatus and method for performing authenticated communications that includes receiving, by a gateway device, a password associated with an application. The gateway device is in communication with a plurality of access control devices associated with the application. Access to each device in a cluster formed by the gateway device and the plurality of access control devices requires a user authentication associated with the password. The gateway device generates a plurality of different matching pairs of salt values and hash values and deletes the password. In addition, the gateway device transmits different sets of mismatched pairs of the salt values and the hash values to at least two devices of the cluster for storage. The user authentication is based on a salt value and a hash value from the plurality of different matching pairs of salt values and hash values stored at two different devices of the cluster.

METHOD FOR QUANTUM GENERATION OF RANDOM NUMBERS ESPECIALLY IN LOTTERIES AND GAMING AND DEVICE FOR QUANTUM GENERATION OF RANDOM NUMBERS
20230214187 · 2023-07-06 ·

The presented invention relates to a method and device for the quantum generation of random numbers. The invention can be implemented in generation of random numbers in lotteries and gaming. The device for a self-testing quantum number generator especially in lotteries and gaming comprising: interferometer, a control unit CU connected to the signal source S, the signal is with interference property, components A that modify the signal's properties, and detectors D for measuring the signal's intensity by electrical wires. Components A are controlled by the control unit CU via electrical wires with parameters x. Detectors D are configured to measure signal intensity and send the measurement results d, via electrical wires to the control unit CU. The control unit CU performs a self-test based on the measurement results d and returns its outcome Hmin. The control unit CU returns random numbers d, and the result of self-test Hmin.

CARRY-LOOKAHEAD ADDER, SECURE ADDER AND METHOD FOR PERFORMING CARRY-LOOKAHEAD ADDITION
20230214183 · 2023-07-06 ·

A carry-lookahead adder is provided. First XOR gate receives a first mask value and a second mask value to provide a variable. First mask unit performs a first mask operation on first input data with the variable to obtain first masked data. A half adder receives the first masked data and second input data to generate a propagation value and an intermediate generation value. Second mask unit performs a second mask operation on the propagation value with a third mask value to obtain second masked data. A logic circuit provides a generation value according to the propagation value, the intermediate generation value and the second mask value. A carry-lookahead generator provides a carry output and a carry value according to a carry input, the generation value and the propagation value. Second XOR gate receives the second masked data and the carry value to provide a sum output.

Mode controller and integrated circuit chip including the same

An integrated circuit chip includes a plurality of function blocks; a mode controller configured to convert an input signal, received from an external device through an input/output pin, into an input pattern and test mode setting data which include a plurality of bits, and to output the test mode setting data and a mode switching enable signal when a secure pattern generated therein is the same as the input pattern; and a mode setting module configured to control the plurality of function blocks to operate in a test mode according to the mode setting data, in response to the test mode switching enable signal.

Controller and operating method thereof
11693729 · 2023-07-04 · ·

There are provided a controller, an electronic system including the same, and an operating method of the controller and the memory system. The controller includes: a randomizing circuit configured to generate random data having a set number of bits; a masking circuit configured to output select random data by extracting some data according to a number of bits on which a partial encoding operation is to be performed, among the random data; an operating circuit configured to output encoded data and a portion of original data, by performing an operation sequentially on the original data and the select random data; and a cyclic redundancy check circuit configured to generate a cyclic redundancy check value by performing a cyclic redundancy check on the encoded data and the portion of original data, and output partially encoded data including the cyclic redundancy check value, the portion of original data, and the encoded data.

Methods and apparatus for multi-path mesh network encryption and key generation

The present application relates to networking technologies, communication cube technologies, and, more particularly, to methods, apparatus, techniques, and means for communication security, encryption, and privacy in network communications.

SYSTEMS AND METHODS FOR SECURE RANDOM NUMBER GENERATION

In some implementations, a device may receive, at an operating system, a request for a random number from an application. The device may provide a command to generate an entropy input, based on the request for the random number and through a driver that is isolated from the operating system, to a quantum random number generator that is isolated from one or more processors hosting the operating system. Accordingly, the device may receive the entropy input, from the quantum random number generator, using the driver, and may generate the random number based at least in part on the entropy input. The device may provide the random number to the application.

Secure password generation and management using NFC and contactless smart cards
11544368 · 2023-01-03 · ·

Various embodiments are directed to securely generating and managing passwords using a near-field communication (NFC) enabled contactless smart card. For example, a secure password may be generated by generating a random number via a random number generator of the contactless smart card and converting the random number to one or more human-readable characters. In another example, a secure cryptographic hash function of the contactless smart card may generate a hash output value, which may be converted to one or more human-readable characters. The human-readable characters may be used as the secure password or it may be transformed to add more layers of security and complexity.

Random number generator

A random number generator according to one embodiment includes a write circuit, a read circuit, and a signal output circuit. The write circuit inverts magnetization of a magnetic layer of a magnetic tunnel junction element stochastically by supplying current to the magnetic layer. The read circuit reads the magnetization. The signal output circuit generates a random number on the basis of the magnetization read by the read circuit. The random number generator includes a sequence control circuit that controls the write circuit and the read circuit. The sequence control circuit regulates the write circuit to supply the current to the write circuit in a first period, and causes the read circuit to read the magnetization after the first period is finished and then a second period longer than the first period is elapsed.

SECURE RANDOM NUMBER GENERATION SYSTEM, SECURE COMPUTATION APPARATUS, SECURE RANDOM NUMBER GENERATION METHOD, AND PROGRAM

A secure computation apparatus (1.sub.i) generates a concealed value [r] of a random number r following a discrete Laplace distribution with parameter α. A bit stream generating unit (11) generates a concealed value stream [b.sub.0], [b.sub.1], . . . , [b.sub.N] that is constituted by a concealed value [b.sub.0] of a random number bit bo following a Bernoulli distribution with probability (1−α)/(1+α) and concealed values [b.sub.1], . . . , [b.sub.N] of random number bits b.sub.1, . . . , b.sub.N each following a Bernoulli distribution with probability (1−α). An absolute value determining unit (12) obtains a concealed value [L] of a position L at which 1 is first set from the head of the random number bits b.sub.0, b.sub.1, . . . , b.sub.N. A sign determining unit (13) obtains a result [L.Math.s] obtained by multiplying the concealed value [L] by a concealed value [s] of a random sign s, as a concealed value [r] of the random number r.