H04L2209/34

SECRET KEY SHARING SYSTEM AND SECRET KEY SHARING METHOD

A secret key sharing system includes a transceiver in a first layer, a plurality of transceivers in a second layer, and a plurality of transceivers in a third layer. The transceivers in the second layer receive a first random number from the transceiver in the first layer via a directional carrier wave. The transceivers in the third layer receive a second random number from one of the transceivers in the second layer via the carrier wave. The transceiver in the first layer and the transceivers in the second layer share a first secret key based on the first random number, and the one of the transceivers in the second layer and the plurality of transceivers in the third layer share a second secret key based on the second random number.

CRYPTOGRAPHIC COMPUTING IN MULTITENANT ENVIRONMENTS

A processor, a system, a machine readable medium, and a method. The processor comprises first circuitry to: encrypt a first code image using a first code key; load the encrypted first code image into a memory area allocated in memory for the first code image by an operating system miming on the processor; and send to the operating system a substitute key that corresponds to the first code key, wherein the first code key is concealed from the operating system; and an instruction cache including control circuitry; and second circuitry coupled to the instruction cache, the second circuitry to: receive the substitute key from the operating system; in response to a first request from the operating system to execute the first code image to instantiate a first process, perform a first cryptographic function using a hardware key to generate the first code key from the substitute key; and program the control circuitry of the instruction cache with the first code key to enable the first code image to be decrypted using the first code key.

ENCRYPTION AND DECRYPTION TECHNIQUES USING SHUFFLE FUNCTION

Encryption and decryption techniques based on one or more transposition vectors. A secret key is used to generate vectors that describe permutation (or repositioning) of characters within a segment length equal to a length of the transposition vector. The transposition vector is then inherited by the encryption process, which shifts characters and encrypts those characters using a variety of encryption processes, all completely reversible. In one embodiment, one or more auxiliary keys, transmitted as clear text header values, are used as initial values to vary the transposition vectors generated from the secret key, e.g., from encryption-to-encryption. Any number of rounds of encryption can be applied, each having associated headers used to “detokenize” encryption data and perform rounds to decryption to recover the original data (or parent token information). Format preserving encryption (FPE) techniques are also provided with application to, e.g., payment processing.

INDICATION OF DIGITAL MEDIAL INTEGRITY
20230020655 · 2023-01-19 ·

A method of digital media processing includes performing a conversion between a media segment and a bitstream of the media segment. The conversion conforming to a format rule and an encryption rule. The format rule specifying that verification information, which includes an indication of an integrity of a portion of the media segment, is signaled in the bitstream.

Authentication method, authentication device, electronic device and storage medium
11700127 · 2023-07-11 · ·

The present disclosure provides an authentication method, an authentication device, an electronic device and a storage medium. The authentication method includes: receiving target voice data; obtaining a first voiceprint feature parameter corresponding to the target voice data from a device voiceprint model library; performing a first encryption process on the first voiceprint feature parameter with a locally stored private key to generate to-be-verified data; transmitting the to-be-verified data to a server, so that the server uses a public key which matches the private key to decrypt the to-be-verified data to obtain the first voiceprint feature parameter, and performs authentication on the first voiceprint feature parameter to obtain an authentication result; receiving the authentication result returned by the server.

Pairing apparatus using secret key based on power line noise, method thereof

A pairing apparatus according to an exemplary embodiment of the present invention includes: a noise filtering part for filtering a noise on a power line; and a processor for pairing with a pairing target device and performing an authentication by generating a secret key using the filtered noise and by using the generated secret key.

INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING METHOD, AND STORAGE SYSTEM
20230012102 · 2023-01-12 ·

According to one embodiment, an information processing apparatus comprises a calculator configured to calculate an encryption key and k key symbols, an encryption module configured to encrypt k information symbols to output k encrypted symbols, a selector configured to output the k encrypted symbols or the k key symbols as k message symbols, and to output a flag indicating which one of the k encrypted symbols and the k key symbols are output, an encoder configured to encode the k message symbols with a maximum distance separable code to output n code symbols, and an output module configured to output n code blocks from the n code symbols and the flag. k is a positive integer of one or more, and n is a positive integer larger than k.

Using error detection bits for cryptographic integrity and authentication

In some examples, a method includes receiving a plaintext message including plaintext data and error detection bits. The method also includes encrypting the plaintext message based on a feedback algorithm to generate an encrypted message including a set of encrypted bits for error detection, cryptographic integrity, and cryptographic authentication. The set of encrypted bits for error detection, cryptographic integrity, and cryptographic authentication can replace the error detection bits in whole or in part. A receiver can confirm the cryptographic integrity and the cryptographic authentication of the encrypted message by decrypting the set of encrypted bits.

RECYCLING METHODS AND SYSTEMS, AND RELATED PLASTIC CONTAINERS

A plastic item, such as a beverage bottle, conveys two distinct digital watermarks, encoded using two distinct signaling protocols. A first, printed label watermark conveys a retailing payload, including a Global Trade Item Number (GTIN) used by a point-of-sale scanner in a retail store to identify and price the item when presented for checkout. A second, plastic texture watermark conveys a recycling payload, including data identifying the composition of the plastic. The use of two different signaling protocols assures that a point-of-sale scanner will not spend its limited time and computational resources working to decode the recycling watermark, which lacks the data needed for retail checkout. In some embodiments, a recycling apparatus makes advantageous use of both types of watermarks to identify the plastic composition of the item (e.g., relating GTIN to plastic type using an associated database), thereby increasing the fraction of items that are correctly identified for sorting and recycling. A great number of other features and arrangements are also detailed.

Secure hardware signature and related methods and applications

This disclosure provides techniques for recovering a root key from measurement of a circuit function. In some embodiments, a checkpointing feature is used to periodically mark measurements of this function and thereby track drift in the value of the root key over the life of a digital device; the checkpointing feature permits rollback of any measurement of the function in a manner that negates incremental drift and permits recovery of the root key for the life of a device (e.g., an IC circuit or product in which the IC is embedded). This disclosure also provides novel PUF designs and applications.