H04L2209/08

Using a secure enclave to satisfy retention and expungement requirements with respect to private data

A secure enclave may be used to satisfy privacy requirements and audit requirements. Code may be loaded into the secure enclave. The code may generate a predefined report based on data and added noise. The pre-defined report may be subject to audit requirements. The data may be subject to the privacy requirements. The secure enclave may generate an encryption key and a decryption key based on the code. Only the secure enclave may have access to the decryption key. And the secure enclave may allow only a verified copy of the code to access the decryption key. With the added noise, the report may satisfy a pre-defined differential privacy guarantee. Encrypting the code and ensuring that the report satisfies the differential privacy guarantee may satisfy the privacy requirements. Retaining the report, the code, the secure enclave, and the encrypted data may satisfy the audit requirements.

Large-word approximate homomorphic encryption

Systems and methods for cryptography based on 128 bit integers include: receiving a complex input, the input including a 128-bit number; encrypting by: setting an imaginary part of the input to a predetermined value; encrypting the input using a Fourier transform and a scaling factor; adding a first noise and a second noise to the encrypted input, wherein the second noise obfuscates the first noise; and decrypting by: receiving the encrypted input with added first noise and second noise; estimating a standard deviation of the first noise based on an imaginary part of the received encrypted complex input; computing a standard deviation of the second noise based on the standard deviation of the first noise and a predetermined parameter; and decrypting the encrypted message using an inverse Fourier transform, the first noise, and the second noise.

HARDWARE BASED CRYPTOGRAPHIC SIDE-CHANNEL ATTACK PREVENTION

A method of controlling transistors includes receiving a control signal, and controlling the top and bottom gate biases of the transistors according to the control signal to normalize or randomize power drawn as observed outside of a core. A device for controlling transistors includes a core performing computational instructions, and a bias circuit receiving a control signal, the bias circuit controlling the top and bottom gate biases of the transistors according to the control signal to normalize or randomize power drawn as observed outside of the core.

TECHNIQUES FOR PREVENTING TAMPERING WITH PROM SETTINGS
20180075888 · 2018-03-15 ·

Techniques for preventing tampering with programmable read-only memory of an integrated circuit are provided. A method according to these techniques includes performing a randomized read of data stored in the programmable read-only memory based on an input from an entropy source, writing the data to one or more registers of the integrated circuit, and initializing one or more components of the integrated circuit using the data stored in the one or more registers.

RANDOMIZATION OF DATA USING A PLURALITY OF TYPES OF PSEUDORANDOM NUMBER GENERATORS
20180074791 · 2018-03-15 ·

A randomizer includes a first pseudorandom number generator, a second pseudorandom number generator, and a first logic circuit configured to output a pseudorandom sequence by carrying out an operation on a pseudorandom sequence generated by the first pseudorandom number generator and a pseudorandom sequence generated by the second pseudorandom number generator, and a second logic circuit configured to randomize a data string input to the randomizer based on the pseudorandom sequence output by the first logic circuit.

CRYPTOGRAPHIC SIDE CHANNEL RESISTANCE USING PERMUTATION NETWORKS

A method (and structure) includes receiving a challenge for an authentication, in a chip having stored in a memory device therein a secret to be used in an authentication attempt of the chip by an external agent. The chip includes a hardware processing circuit to sequentially perform a processing related to the secret. The secret is retrieved from the memory device and processed in the hardware processing circuit in accordance with information included in the received challenge. The result of the processing in the hardware processing circuit is transmitted as a response to the challenge. The hardware processing circuit executes in a parallel manner, thereby reducing a signal that can be detected by an adversary attempting a side channel attack to secure the secret.

SYSTEMS AND METHODS FOR DETECTING SENSITIVE INFORMATION LEAKAGE WHILE PRESERVING PRIVACY
20180068124 · 2018-03-08 ·

Systems and methods for privacy-preserving data loss detection include performing a sweep of online information for a candidate data leakage to generate an online data set; performing an analysis of the online data set to determine that the online information is a candidate data leakage; the host encrypting the data communication and providing the host-encrypted data communication to a software agent at the enterprise; in response to receiving the host-encrypted data communication, the software agent encrypting a database of enterprise information and re-encrypting the host-encrypted data communication, and providing the same to the host; the host decrypting a host-encrypted aspect of the re-encrypted data communication to generate a software agent-encrypted data communication; determining whether a match exists between the encrypted database of information and the software agent-encrypted data communication; and based on whether the match exists, the software agent taking a first action or the host taking a second action.

SYSTEMS AND METHODS FOR AUTHENTICATING FIRMWARE STORED ON AN INTEGRATED CIRCUIT
20180060561 · 2018-03-01 ·

The invention discloses a method of authenticating data stored in an integrated circuit. The method includes storing randomized data in the integrated circuit such that the randomized data occupies each address space of the memory circuit that is not occupied by the stored data. The method also includes generating a first digital signature using the integrated circuit in response to authenticating a concatenation of the stored data and the first copy of randomized data. The method further includes generating a second digital signature in response to authenticating concatenation of a manufacturer-provided copy of the stored data and the second copy of randomized data using a computer-implemented authentication application and authenticating the data stored in the integrated circuit according to whether the first signature matches the second signature.

METHOD AND DEVICE FOR DATA ENCRYPTION

Aspects of the disclosure provide a method for encrypting data. The method includes generating a sequence of states of a pseudo-random number generator (PRNG), generating a key stream including a sequence of key sections based on the sequence of states, and encrypting or decrypting data with the key stream. An initial state of the PRNG is generated based on a seed and a key, and each of other states in the sequence of states of the PRNG is generated based on a previous state of the PRNG and the key. The method eliminates the vulnerability to known-plaintext attack, and improves the security of communications between computer systems. Also, the method showed a performance improvement when compared to the Advanced Encryption Standard (AES) in cipher block chaining (CBC) mode. Moreover, the size of the encrypted data is almost the same as that of the original data.

Key Generator, Computer System, and Encryption Statistical Processing Method
20180048467 · 2018-02-15 · ·

When data analysis is made in a server to which data is entrusted according to the technique disclosed in JP 5679018, individual cipher text is required to be decrypted in the server. That is, when basic statistics are computed in the server, a problem occurs that plain text of individual data is disclosed to the server side. The key generator according to the present invention transmits the sum of random numbers which is a key used when individual plaintext data is encrypted to the server as a key for decrypting the sum of ciphertext data, and the server decrypts the sum of ciphertext data using the key.