Message authentication code pre-computation with applications to secure memory

A message authentication code and message authentication technology are applied in the application field of pre-computed authentication codes in secure memory, and can solve the problem of not providing pre-computation and the like

Inactive Publication Date: 2014-11-26
PROVENANCE ASSET GRP LLC
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

While most common MAC schemes include a simple evaluation of pseudorandom permutation (PRP) on messages concatenated with redundant data (e.g., a string of 32 zeros), such schemes do not provide themselves with precomputation

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Message authentication code pre-computation with applications to secure memory
  • Message authentication code pre-computation with applications to secure memory
  • Message authentication code pre-computation with applications to secure memory

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0016] As discussed, the vulnerable area of ​​computer security is off-chip memory. An adversary can alter or replay information contained in off-chip memory to compromise a computer system. One way to limit adversaries is to sign and encrypt off-chip memory. Computing the signature on memory may require generating a message authentication code (MAC). A MAC algorithm can be run with a secret key and a block of data or memory as input. The MAC algorithm can output a signature or a MAC. MAC can be a numeric value. MAC can be 16 bits or 32 bits. However, MAC can be larger or smaller. The first MAC is calculated using data written to the off-chip memory. The first MAC is stored along with the data. When data is read from the off-chip memory, a second MAC is generated from the read data. If the first MAC does not match the second MAC, the system can reset and / or discard the data.

[0017] turn to figure 1 , figure 1 is an example block diagram of a system 100 in which ap...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A method comprising the steps of creating a random permutation of data from a data input by executing at least one of a Pseudo-Random Permutation (PRP) and a Pseudo-Random Function (PRF), creating a first data block by combining the random permutation of data with a received second data block and executing an epsilon-differentially uniform function on the result of the combination, XORing the result of the epsilon-DU function evaluation with a secret key, and reducing the first data block to a first message authentication code.

Description

technical field [0001] The present invention relates to a method and a device for applying a precalculated authentication code in a secure memory. Background technique [0002] Consumer products, commercial products, and even military equipment are increasingly becoming dependent on computer systems. When a product is combined with a computing device, people can try to exploit the product's weaknesses to use the product for free or to break it. In the computing world, hackers, pirates, or adversaries attempt to take advantage of products that use computing devices by tampering with the device's memory. Typically, there are two main security domains when it comes to protecting computational integrity: software-based and hardware-based. Software-based security deals with the integrity of software. Hardware-based security assumes that a hacker has full access to the computing system and may use an oscilloscope and logic analyzer to observe the computing system. [0003] The...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32H04L9/06
CPCH04L9/0631H04L9/0643H04L9/3242G06F21/71H04L9/06H04L9/0656H04L9/32
Inventor J·A·加雷V·柯勒斯尼科夫H·R·麦克莱伦
Owner PROVENANCE ASSET GRP LLC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products