H04L2209/046

Processor with private pipeline

An example private processing pipeline may include: a masked decryption unit to perform a masked decryption operation transforming input data into masked decrypted data; a masked functional unit to produce a masked result by performing a masked operation on the masked decrypted data; and a masked encryption unit to perform a masked encryption operation transforming the masked result into an encrypted result.

Masked decoding of polynomials

Various embodiments relate to a method for masked decoding of a polynomial a using an arithmetic sharing a to perform a cryptographic operation in a data processing system using a modulus q, the method for use in a processor of the data processing system, including: subtracting an offset δ from each coefficient of the polynomial a; applying an arithmetic to Boolean (A2B) function on the arithmetic shares of each coefficient a.sub.i of the polynomial a to produce Boolean shares â.sub.i that encode the same secret value a.sub.i; and performing in parallel for all coefficients a shared binary search to determine which of coefficients a.sub.i are greater than a threshold t to produce a Boolean sharing value {circumflex over (b)} of the bitstring b where each bit of b decodes a coefficient of the polynomial a.

Apparatus and method for converting input bit sequences
11495144 · 2022-11-08 · ·

A cryptographical apparatus for converting input bit sequences, whose overflow-free arithmetic addition results in a secret, into output bit sequences whose logic XORing results in the secret. The apparatus comprises a data interface for providing a first input bit sequence and a second input bit sequence and a processing circuit configured to a) gate the first input bit sequence and the second input bit sequence to obtain a logic result indicating overflow bit positions at which both the first input bit sequence and the second input bit sequence have a value of one; and to b) change the first and/or second input bit sequence at at least one overflow bit position. The processing circuit is configured to repeatedly perform steps a) and b) by using the respectively changed input bit sequences, until the logic result indicates no further overflow bit position and the output bit sequences are obtained.

Dynamically Masking Event Processing Requests Using a Machine Learning Model
20230035319 · 2023-02-02 ·

Aspects of the disclosure relate to a dynamic information masking computing platform. The dynamic information masking computing platform may receive an event processing request from a device corresponding to a first user via a merchant device. The dynamic information masking computing platform may generate masking decision data using a machine learning masking model. The dynamic information masking computing platform may receive a request for account information corresponding to the first user from a device corresponding to a second user. The dynamic information masking computing platform may mask the account information based on the masking decision data. The dynamic information masking computing platform may send the masked account information and commands directing the device corresponding to the second user to display an account interface that includes the masked record.

PROTECTION OF CRYPTOGRAPHIC SUBSTITUTION-PERMUTATION NETWORKS FROM FAULT INJECTION ATTACKS

Aspects of the present disclosure involve a method and a system to perform the method to obtain a cryptographic output of a plurality of rounds of a cipher, by performing a plurality of modified rounds of the cipher, each of the modified rounds computing an unmasking transform, an operation of a respective round of the cipher, and a masking transform, the unmasking transform being an inverse of the masking transform of a previous round of the cipher.

Confidential information processing system and confidential information processing method
11475121 · 2022-10-18 · ·

In the confidential information processing server, when the processing query execution unit receives a processing request, the TEE trusted part processing unit generates a confidential extraction query for extracting data that matches with a condition of a processing target in the processing request by confidential extraction based on the processing request and an encryption key that can be used only in a TEE trusted part, the confidential extraction processing unit instructs execution of the confidential extraction query so as to extract encrypted data of the processing target while the data is kept encrypted from the encryption DB unit, the TEE trusted part processing unit decrypts the encrypted data of the processing target extracted by the confidential extraction processing unit with an encryption key, and executes data processing requested by the processing request, and the processing query execution unit returns an execution result of the data processing to a transmission source of the processing request.

Information processing apparatus and method
11477009 · 2022-10-18 · ·

An information processing apparatus includes a processor that acquires an operation result on an input data by referring to a look-up table that stores an operation result of an operation process, including an obfuscating operation that includes ordering of bits, an exclusive-OR operation on a random number, and a multiplication on a Galois field, performed on data.

Electromagnetic and power noise injection for hardware operation concealment

A method of operation concealment for a cryptographic system includes randomly selecting which one of at least two cryptographic operation blocks receives a key to apply a valid operation to data and outputs a result that is used for subsequent operations. Noise can be added by operating the other of the at least two cryptographic operation blocks using a modified key. The modified key can be generated by mixing the key with a block-unique-identifier, a device secret, a slowly adjusting output of a counter, or a combination thereof. In some cases, noise can be added to a cryptographic system by transforming input data of the other cryptographic operation block(s) by mixing the input data with the block-unique-identifier, device secret, counter output, or a combination thereof. A cryptographic system with operation concealment can further include a distributed (across a chip) or interweaved arrangement of subblocks of the cryptographic operation blocks.

MULTIPLE DATA SOURCE SECURE DATA PROCESSING
20230121425 · 2023-04-20 ·

Multiple systems may determine neural-network output data and neural-network parameter data and may transmit the data therebetween to train and run the neural-network model to predict an event given input data. A data-provider system may perform a dot-product operation using encrypted data, and a secure-processing component may decrypt and process that data using an activation function to predict an event. Multiple secure-processing components may be used to perform a multiplication operation using homomorphic encrypted data.

DATA ENCRYPTION AND DECRYPTION USING OBJECT-BASED SCREENS AND LOGIC BLOCKS
20230123207 · 2023-04-20 ·

A plurality of data blocks are encrypted in accordance with an encryption scheme that transforms a data block into an encrypted data block by: performing a bit modification operation on the data block using one or more logic blocks generated for the data block to thereby generate a first intermediate state data block; performing a bit remapping operation on the first intermediate state data block using at least one encryption screen to thereby generate a second intermediate state data block; and performing a bit modification operation on the second intermediate state data block using one or more logic blocks generated for the data block to thereby generate the encrypted data block. The encrypted data blocks may then be decrypted in accordance with a decryption scheme that applies at least one decryption screen and the same logic blocks that were used in the encryption scheme.