Patent classifications
H04L2209/08
Electronic authentication systems
Methods and devices are provided for use in carrying out a transaction between a transaction device and a point of interaction. In connection therewith, a device for interacting with a point of interaction to carry out a transaction by a consumer includes a processor comprising a payment application and a system environment module, where the system environment module is configured to determine whether the payment application is eligible for a transaction. The device also includes an input in communication with the processor and configured to receive transaction data from a point of interaction in connection with the transaction, and an output in communication with the processor and configured to transmit transaction data to the point of interaction in connection with the transaction when the system environment module determines that the payment application is eligible for the transaction.
Method of protecting a circuit against a side-channel analysis
In a general aspect, a method for executing a target operation combining a first input data with a second input data, and providing an output data can include generating at least two pairs of input words each comprising a first input word and a second input word and applying to each pair of input words a same derived operation providing an output word including a part of the output data resulting from the application of the target operation to first and second input data parts present in the pair of input words, and a binary one's complement of the output data part.
PURE BINARY SCRAMBLING
The present invention relates to methods and systems for binary scrambling, and applications for cybersecurity technology aimed at preventing cyber-attacks.
Secret calculation device, method, recording medium, and secret calculation system
To calculate of an exclusive OR of elements of bits while the bits remain distributed to a plurality of secret calculation devices without communication among the secret calculation devices, and to calculate of an AND of bits with small amounts of communication and calculation while the bits remain distributed, provided is a secret calculation device including a local AND device and an AND redistribution device. The local AND device receives at least two one-bit input elements to produce a first local AND element. The AND redistribution device receives a one-bit mask and a second local AND element acquired by calculating an exclusive OR of the first local AND element and P bits (P is an integer equal to or more than 0), calculates a first OR, and communicates to/from an AND redistribution device of another secret calculation device to produce at least one one-bit output element.
Protection method and device against a side-channel analysis
A method for executing, by a circuit, an operation combining first and second input data and providing an output data of the same size, may include generating from the first input data a first input set including all possible data in relation to a size of the first data, generating from the second input data a second input set including all possible data in relation to a size of the second data, and applying the operation to each pair of data including a data of the first input set and a data of the second input set, an output set of the operation including data resulting from the application of the operation to each of the pairs of data.
COMPUTATIONAL OPTICAL PHYSICAL UNCLONABLE FUNCTION
A system or method for encryption of data includes a light source, a random optical element and a light detection element. The light source is arranged to transmit an input data signal to the random optical element. The light source is incident on the random optical element such that the input data signal is randomly scattered by the random optical element to generate an image at on the detector disposed at an output of the random optical element. The image received by the detector is applied to a compressive sensing algorithm to generate a transfer function. The transfer function defines a relationship between the input data signal and the image to enable estimation and reconstruction of the input data signal.
DYNAMIC ANONYMOUS PASSWORD-AUTHENTICATED KEY EXCHANGE (APAKE)
A method for anonymous authentication and key establishment based on passwords (APAKE), includes instantiating, by the server, an OPRF scheme and a symmetric encryption scheme; engaging in, by the client and the server, an OPRFEvaluate protocol so that the client learns a decryption key associated with its password while the server learns nothing; securely transferring, by the server, a nonce and a symmetric encryption key to the client if the client holds a valid password; sending, by the client, its nonce encrypted under the symmetric encryption key; using, by the server, the symmetric encryption key to decipher ciphertext received by virtue of the sending, by the client, its nonce encrypted under the symmetric encryption key and to recover the client's nonce; and computing, by the server and the client, a compute key based on the client's nonce and the server's nonce.
Device and method for multiplication for impeding side-channel attacks
A device for multiplying two bit sequences has a controller that selects and activates exactly one multiplier unit from a plurality of parallel multiplier units, according to a random signal. A partial multiplier unit shared by all the multiplier units receives and multiplies operands formed by the respectively activated multiplier unit. Each multiplier unit implements a different multiplication method with a respective selector unit that selects segments of the bit sequences to be multiplied, in accordance with a selection plan adapted to the respective multiplication method, to form operands from one or more segments and outputs the operands. The respective accumulation unit receives step by step partial products from the partial multiplier unit, accumulates the partial products in accordance with an accumulation plan adapted to the implemented multiplication method and matching the selection plan, and outputs the calculated product of after accumulation has been completed.
Fragmented encryption of a secret
Methods, apparatuses, systems, and program products are disclosed for secret fragmentation and distribution. A method includes generating a secret that may be divided into a plurality of segments such that the secret is re-constructed by combining each of the plurality of segments. A method includes assigning each of a plurality of users to one or more groups or groups of groups. A method includes mapping each of a plurality of segments of a secret to one or more of a plurality of users as a function of a number of users within each group. A method includes encoding each of a plurality of segments in a predefined format based on a mapping. A method includes distributing each of a plurality of encoded segments to each of one or more users that is mapped to each encoded segment.
METHOD AND SYSTEM FOR ENCRYPTING DATA WITH AN ALL-OR-NOTHING ENCRYPTION SCHEME HAVING ADDITIONAL RANDOMNESS
A method for encrypting data for storage on one or more servers includes dividing the data, which includes a first number m of plaintext blocks, into a second number N of equal sized chunks, wherein the second number is based on a number of the servers on which the encrypted data is to be stored, and wherein each chunk includes m/N plaintext blocks. Each of the chunks is encrypted using an all-or-nothing encryption (AONE) scheme so as to output a plurality of ciphertext blocks for each chunk, wherein an additional randomness is embedded into the AONE scheme by an initialization vector derived from the randomness being used as an initial seed for an AONE initialization vector of the AONE scheme. The randomness is encrypted using an XOR-combination of XOR operations performed on the ciphertext blocks for each chunk. The encrypted randomness is stored on each of the servers.