Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Clock period randomization for defense against cryptographic attacks

A clock cycle, randomizer technology, applied in countermeasures against encryption mechanisms, computer security devices, protection of internal/peripheral computer components, etc., can solve problems such as jeopardizing device security

Active Publication Date: 2018-02-23
GOOGLE LLC
View PDF12 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] If a cryptographic attack is able to extract the secret key from the device, it can compromise the security of the device

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Clock period randomization for defense against cryptographic attacks
  • Clock period randomization for defense against cryptographic attacks
  • Clock period randomization for defense against cryptographic attacks

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0053] Various examples and embodiments of the methods and systems of the present disclosure will now be described. The following description provides specific details for a thorough understanding and implementation of these examples. However, one skilled in the relevant art will understand that one or more embodiments described herein may be practiced without many of these details. Likewise, those skilled in the relevant art will also understand that one or more embodiments of the present disclosure may include other features not described in detail herein. Also, some well-known structures or functions may not be shown or described in detail below to avoid unnecessarily obscuring the related description.

[0054] As mentioned above, modern computing systems use cryptography to provide secure communication between different entities, and the encryption techniques implemented may rely on secret keys. The reliance on these secret keys has prompted the development of various me...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Methods, systems, and apparatuses for defending against cryptographic attacks using clock period randomization. The methods, systems, and apparatuses are designed to make side channel attacks and fault injection attacks more difficult by using a clock with a variable period during a cryptographic operation. In an example embodiment, a clock period randomizer includes a fixed delay generator and avariable delay generator, wherein a variable delay generated by the variable delay generator is based on a random or pseudorandom value that is changed occasionally or periodically. The methods, systems, and apparatuses are useful in hardware security applications where fault injection and / or side channel attacks are of concern.

Description

[0001] Cross References to Related Applications [0002] This application claims priority to US Provisional Patent Application No. 62 / 298,842, filed February 23, 2016, the entire disclosure of which is incorporated herein by reference. Background technique [0003] Many computing systems use cryptography to enable secure communications between entities. Modern encryption systems often rely on keys, some of which must be kept secret from the outside world in order to maintain security. Numerous methods have been proposed and implemented to extract these keys surreptitiously. [0004] Two categories of encryption attacks are side channel attacks and fault injection attacks. In a side-channel attack, the attacker monitors the device executing the encryption algorithm. For example, during execution, a device's power consumption, electromagnetic radiation, and / or acoustic emissions may provide an attacker with information about the data processed and instructions executed, as th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/00
CPCH04L9/002H04L9/003H04L2209/08H04L2209/12G06F21/72G06F21/755G06F7/582G06F7/588H04L9/004
Inventor 唐纳德·斯塔克
Owner GOOGLE LLC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products