Patent classifications
H04L2209/12
Semiconductor Apparatus and Identification Method of a Semiconductor Chip
A semiconductor apparatus including a semiconductor chip is disclosed. The semiconductor chip includes a modular region and a test circuit. The modular region includes a plurality of modular areas each including a memory cell array with redundant bit lines and a peripheral memory area storing at least redundant addresses. The test circuit retrieves the redundant addresses intrinsic to the semiconductor chip. The distribution of the redundant addresses are randomly formed related to a part or a whole of the modular area of the modular region. The test circuit outputs a random number generated from physical properties intrinsic to the semiconductor chip according to a specification code received from a physical-chip-identification measuring device.
Chip Device and Method for a Randomized Logic Encryption
A chip device with a logic circuitry (105) protected by a randomized logic encryption based on a key (K) for preventing a designated usage of the logic circuitry (105) by an unauthorized user comprises: a physically unclonable function, PUF, (110), a storage (120), and a chip enabler (130) with one or more registers (132). The physically unclonable function, PUF, (110) is configured to generate a device-individual response (Re) based on a challenge (Ch). The storage (120) has stored the challenge (Ch) and a data element (C), the data element (C) being an encryption of the key (K) with the response (Re) of the PUF (110) as encryption key. The enabler (130) is configured to enable the logic circuitry (105) for the designated usage only, when the key (K) is transferred to the register(s) (132), the key (K) being a decryption of the data element (C) with the response (Re) as the encryption key.
DETECTION OF A NETLIST VERSION IN A SECURITY CHIP
A pattern detector circuit is provided in a security chip, wherein the pattern detector circuit monitors accesses of a plurality of configuration registers, each of the plurality of configuration registers having a corresponding address. In response to receiving from a host a predefined sequence of accesses of the plurality of configuration registers for one or more operations to the plurality of configuration registers, a processor in the pattern detector circuit determines a value indicative of a current version of a netlist for the security chip. The determined value is made available to be obtained by a read operation by the host at a specific configuration register address.
Techniques for cipher system conversion
Various embodiments are generally directed to techniques for converting between different cipher systems, such as, for instance, between a cipher system used for a first encryption environment and a different cipher system used for a second encryption environment, for instance. Some embodiments are particularly directed to an encryption engine that supports memory operations between two or more encryption environments. Each encryption environment can use different cipher systems while the encryption engine can translate ciphertext between the different cipher systems. In various embodiments, for instance, the first encryption environment may include a main memory that uses a position dependent cipher system and the second encrypted environment may include a secondary memory that uses a position independent cipher system.
Apparatus and method for processing authentication information
Provided is an information processing apparatus including a physical unclonable function (PUF) to generate a unique key using a process variation in a semiconductor manufacturing process, and an encryption unit to encrypt a password and/or bio-information received from a user using the unique key.
Increasing security in inter-chip communication
An apparatus for increasing security in inter-chip communication includes a sending control module, a communication bus, and a receiving control module. The communication bus is coupled between the sending control module and the receiving control module. The sending control module operates to send data on the communication bus, disable the communication bus when threats are detected, or both.
ENCODING-LOCKED METHOD FOR AUDIO PROCESSING AND AUDIO RECEIVING DEVICE
An encoding-locked method for audio processing for audio receiving device includes the following steps: inserting a first encryption key into a first digital signal stream so as to obtain a second digital signal stream, checking whether there is the first encryption key in a received digital signal stream so as to determine whether the received digital signal stream is the second digital signal stream, and when the received digital signal stream is not the second digital signal stream, no processing the received digital signal stream.
Dendritic structures and tags
The disclosure features methods for generating a unique identifier, the methods including providing a dendritic structure, reading the dendritic structure to provide a signal, and generating a unique identifier from the signal.
METHODS FOR RECOVERING SECRET DATA OF A CRYPTOGRAPHIC DEVICE AND FOR EVALUATING THE SECURITY OF SUCH A DEVICE
A method for recovering secret data of a cryptographic device comprises: a) determining stochastic models of leakages relating respective measurable quantities to internal states or operations of the cryptographic device, the number of greater than the number of masks used by the cryptographic device to conceal the secret data; b) sending command sequences to the device, where each command sequence causes the device to perform a cryptographic operation on at least one respective plaintext using the secret data and the masks; c) during processing of each cryptographic operation, recording a series of measurements of measurable quantities; and d) computing an estimator of secret data by maximizing the conditional joint probability of the recorded measurements given the corresponding plaintexts, averaged over all possible values of the masks. A method for evaluating the security of a cryptographic device is provided.
ENCRYPTED TEXT VERIFICATION SYSTEM, METHOD, AND RECORDING MEDIUM
In a data registration phase, encrypted data is calculated by encrypting input data to be concealed by using a secret key, registration data is generated based on the encrypted data and a verification key, and the registration data is stored as a registration template in a storage unit together with an identifier for uniquely identifying the registration data. In an encrypted text verification phase, a data verifying request is generated in which input data to be verified has been encrypted by using a random number, the registration template stored in the storage unit and the data verifying request are verified to produce a determined result, a verified result including a part or all of the registration template corresponding to the determined result is produced, and data is restored based on the verified result to produce a restored result.