Patent classifications
H04L2209/08
DEVICE AND METHOD FOR RESONANT CRYPTOGRAPHY
A system for secure communications using resonate cryptography includes a resonator that has a random number generator (RNG). The RNG can be at least one of a true random number generator, pseudo-random number generator, and any non-repeating sequence of numbers having a characteristic of a random number stream, and generating a first stream of random numbers. A transmitter, electrically coupled to the random number generator, is also included to transmit the generated first stream of random numbers.
Preventing Pattern Recognition in Electronic Code Book Encryption
In general, in one aspect, noise is injected into a bitmap associated with content to be presented on a display to create a noisy bitmap. The noisy bitmap is encrypted using electronic code book (ECB) encryption. The resulting ciphertext does not include recognizable patterns from the content as is typical with ECB encryption. The injection of noise may include modifying pixel values for at least a subset of pixels in the bitmap. The pixel values may be modified by using a counter, a known modification pattern, or a random number generator. The bitmap may be analyzed to determine how the bitmap can be modified to maximize the randomness of the bitmap while ensuring that the noisy bitmap is visually perceptually similar when presented. The noise may be injected into a block of pixels prior to the block being encrypted.
System, Method, and Computer Program Product for Energy Efficient Generation of Artificial Noise to Prevent Side-Channel Attacks
Methods, systems, and computer program products are provided for energy efficient generation of artificial noise to prevent side-channel attacks. An example method includes storing at least one secret value including secret value bits. At least one cryptographic operation is executed based on the at least one secret value. An artificial sequence generator stores at least one state indication based on a plurality of previous cryptographic operations executed on the device. A plurality of samples of artificial noise are generated, and a number of the plurality of samples is based on at least one power constraint parameter. Each sample of artificial noise of the plurality of samples of artificial noise is overlaid over a respective portion of a side channel signal based on the at least one state indication to mask leakage information associated with the at least one secret value on the side channel signal.
3D DATA GENERATION DEVICE, ANALYSIS SERVER, AND 3D PRINTING METHOD EMPLOYING HOMOMORPHIC ENCRYPTION
Provided are a three-dimensional (3D) data generation device, an analysis server, and a 3D printing method employing a homomorphic encryption scheme. The 3D data generation device includes a memory, a scan module, and a processor connected to the memory and the scan module. The processor generates 3D data of an object scanned through the scan module and encrypts the 3D data in accordance with a homomorphic encryption scheme.
Physically unclonable function device
A physically unclonable function (PUF) device comprises a plurality of conductors, at least some of which are arranged so that they interact electrically and/or magnetically with one another. A media surrounds at least a portion of each of the conductors, and circuitry applys an electrical challenge signal to at least one of the conductors and for receiving an electrical output from at least one of the other conductors to generate an identifying response to the challenge signal that is unique to the device.
Data invalidation for memory
Methods, systems, and devices for memory operations are described. First scrambling sequences may be generated for first addresses of a memory device after an occurrence of a first event, where the first addresses may be associated with commands received at the memory device. Portions of the memory array corresponding to the first address may be accessed based on the first scrambling sequences. After an occurrence of a subsequent event, second scrambling sequences may be generated for the first addresses, where the second scrambling sequences may be different than the first set of scrambling sequences. After the occurrence of the subsequent event, the portions of the memory array may be accessed based on the second scrambling sequences.
Order-preserving encryption system, encryption device, decryption device, encryption method, decryption method, and programs thereof
An encryption device comprises: a storage module for pre-storing an encryption key which is necessary for encryption processing; a pre-processing function unit which applies a pre-processing function to plaintext which converts an input value which in general may possibly not have a uniform distribution to an output value which has a uniform distribution; and an encryption unit which outputs encrypted text which is obtained by encrypting by order-preserving encryption, using the encryption key, the plaintext to which the pre-processing function is applied, and in which an order is maintained. This pre-processing function adds an arbitrarily selected random number to a value which is obtained by inputting an input value into a cumulative probability distribution function of an integer set with which the input value is associated, and treating same as an output value.
Secure bitstream authentication
Methods and systems are provided for securely authenticating data of an integrated circuit. By authenticating data having keystream blocks inserted between ciphertext portions, it becomes more difficult to mount successful authentication-based attacks.
ENCRYPTING DEVICE, ENCRYPTING METHOD, AND RECORDING MEDIUM
From the least significant bit of the current secret key, k bits are retrieved, obtaining a binary window sequence. A binary bit string of concatenation of the random number to the more significant bits of the window sequence is obtained if the most significant bit of the window sequence is 0, subtracting a bit string from the current secret key to obtain a new secret key, or the bit string of a complement of the base number for the window sequence in binary system is calculated if the most significant bit of the window sequence is 1, obtaining a bit string by adding a minus sign to a bit string obtained by concatenating the random number to the more significant bits of the bit string, subtracting the bit string from the current secret key to obtain a new secret key.
METHOD AND SYSTEM FOR GENERATING/DECRYPTING CIPHERTEXT, AND METHOD AND SYSTEM FOR SEARCHING CIPHERTEXTS IN A DATABASE
There is provided a method of generating a ciphertext. The method includes encrypting an input data to produce an encrypted data, and randomizing the encrypted data to produce the ciphertext. In particular, the randomizing process includes performing an exclusive-or (xor) operation on the encrypted data with a cipher pad, whereby the cipher pad is generated based on an xor-homomorphic function of a first key using a second key generated based on the encrypted data. There is also provided a corresponding system for generating a ciphertext, a corresponding method and system for decrypting a ciphertext, and a corresponding method and system for searching ciphertexts in a database, such as at an untrusted server.