Patent classifications
H04L2209/08
Method for creating a derived entity of an original data carrier
There is provided a method for creating an authentication entity derived from an original data carrier, wherein the original data carrier has a key pair that is individual to the original data carrier and comprises a public key and a secret key of the original data carrier, and a certificate for the public key of the original data carrier. The method comprises the following steps: deriving a secret key for the derived authentication entity from the secret key of the original data carrier by the original data carrier; forming derivation data for the derived authentication entity; transferring authentication data to the derived authentication entity, wherein the authentication data have the derivation data, the certificate of the public key of the original data carrier as well as a derived key pair which comprises the derived secret key and the public key of the original data carrier.
Obfuscating data at-transit
A method for obfuscating data at-transit can include receiving a request for communicating data, determining a sequence of data at-transit for a window of time; and providing the sequence of the data at transit for performing communications across interconnect to another component. The described method can be carried out by an obfuscation engine implemented in an electronic system such as within a secure element. A secure element can include a processor and a memory. The obfuscation engine can be part of the processor, part of the memory, or a stand-alone component.
METHODS AND APPARATUS TO PERFORM SIGNATURE MATCHING USING NOISE CANCELLATION MODELS TO ACHIEVE CONSENSUS
Examples are disclosed to perform signature matching using noise cancellation models to achieve consensus. Example apparatus disclosed herein include a signature matcher to compare a first stream of monitored media signatures to streams of reference signatures representative of corresponding reference media to determine a first signature match, and compare a second stream of monitored media signatures to the streams of reference signatures to determine a second signature match; a match selector to use at least one the first signature match or the second signature match to identify a first one of the reference media corresponding to the monitored media data; and a creditor interface to output identification data for the first one of the reference media identified with the at least one the first signature match or the second signature match, the identification data to be used to credit a media exposure corresponding to the monitored media.
Cyber Passport
This invention establishes means and protocols to secure data, and practice online authentication, using large undisclosed amounts of randomness, replacing the algorithmic complexity paradigm. Computation is limited to basic primitives like transposition, and bit-flipping. Security is credibly appraised through combinatorics calculus, and this transfers the security responsibility to the user who determines how much randomness to use.
Method for Testing and Hardening Software Applications
Methods are provided for testing and hardening software applications for the carrying out digital transactions which comprise a white-box implementation of a cryptographic algorithm. The method comprises the following steps: (a) feeding one plaintext of a plurality of plaintexts to the white-box implementation; (b) reading out and storing the contents of the at least one register of the processor stepwise while processing the machine commands of the white-box implementation stepwise; (c) repeating the steps (a) and (b) with a further plaintext of the plurality of plaintexts N-times; and (d) statistically evaluating the contents of the registers and the plaintexts, the intermediate results and/or the ciphertexts generated from the plaintexts by searching for correlations between the contents of the registers and the plaintexts, the intermediate results and/or the ciphertexts generated from the plaintexts to establish the secret key.
RANDOM NUMBER GENERATOR
According to one embodiment, a random number generator includes a first circuit which outputs a second oscillation signal having a predetermined duty ratio on the basis of a first oscillation signal, a second circuit which latches values on the basis of the second oscillation signal and a clock having a frequency lower than a frequency of the second oscillation signal, a third circuit which outputs a control signal on the basis of the values, and a fourth circuit which controls the first circuit on the basis of the control signal.
Resistance to cache timing attacks on block cipher encryption
Technology is generally described for improving resistance to cache timing attacks made on block cipher encryption implementations. In some examples, the technology can include identifying one or more tunable parameters of the block cipher encryption algorithm; creating multiple encryption algorithm implementations by varying one or more of the parameter values; causing a computing system to encrypt data using the implementations; measuring average execution times at the computing system for the implementations subjecting the implementations to a cache timing attack; measuring average execution times at the computing system for the implementations subjected to a cache timing attack; computing a time difference between the average execution times for the implementations when not subjected and when subjected to a cache timing attack; selecting an implementation having a lower time difference; and using the selected implementation for a subsequent encryption operation.
PROTECTION FROM SIDE-CHANNEL ATTACKS BY VARYING CLOCK DELAYS
A system, comprising a logic circuit and delay circuitry, is described. The logic circuit is configured to perform a plurality of instances of a particular computation that is based on a plurality of inputs. The delay circuitry is configured to vary a power-consumption profile of the logic circuit over the plurality of instances, by applying, to the inputs, respective delays that vary over the instances, at least some of the delays varying independently from each other. Other embodiments are also described.
CRYPTOGRAPHIC KEY GENERATION AND DISTRIBUTION
Methods, apparatuses, systems, and program products are disclosed for cryptographic key generation and distribution. A method includes generating a cryptographic key that may be divided into a plurality of key segments such that the key is re-constructed by combining each of the plurality of key segments. A method includes assigning each of a plurality of users to one or more groups. A method includes mapping each of a plurality of key segments of a key to one or more of a plurality of users as a function of a number of users within each group. A method includes encoding each of a plurality of key segments in a predefined format based on a mapping. A method includes distributing each of a plurality of encoded key segments to each of one or more users that is mapped to each encoded key segment.
DATA MANAGEMENT DEVICE, DATA MANAGEMENT SYSTEM, DATA MANAGEMENT METHOD, AND PROGRAM
A data management device (10) includes an insertion position determiner (121) to determine an insertion position of dummy data to be inserted into transmission target data, a dummy data inserter (122) to insert the dummy data in the insertion position of the transmission target data to create dummy-inserted data, an insertion position encryptor (123) to encrypt data indicating the insertion position with a public key (PUBa) to create insertion-position-encrypted data; and a deliverer (110) to deliver the dummy-inserted data and the insertion-position-encrypted data.