Check patentability & draft patents in minutes with Patsnap Eureka AI!

Secure cryptoprocessor

A processor and cipher technology, applied in the field of secure cipher processing, can solve problems such as endangering communication endpoints

Pending Publication Date: 2021-06-04
NOKIA NETWORKS OY
View PDF1 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

While modern cryptographic algorithms themselves are considered well-developed and resistant to cryptanalysis, it is usually relatively easy for an attacker to compromise one or both of the communication endpoints

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Secure cryptoprocessor
  • Secure cryptoprocessor
  • Secure cryptoprocessor

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0017] Cryptographic processor design can be simplified by using physically unclonable functions (PUFs) to perform at least some of the functions implemented in early cryptographic processors (and In some embodiments all) functions. Hardware reduction in a cryptographic processor can be achieved by utilizing the PUF built into the cryptographic processor to perform tasks including key generation and establishment in conjunction with the application and the processor's security protocol. Such cryptographic processors with a reduced hardware footprint could find applications, for example, in Internet of Things (IoT) devices.

[0018] figure 1 An example cryptographic processor is shown in accordance with at least some embodiments. For example, cryptographic processor 100 may comprise a secure cryptographic processor, such as a tamper-resistant cryptographic processor. For example, a cryptographic processor may correspond to a Trusted Platform Module according to ISO / IEC11889....

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

According to an example aspect of the present invention, there is provided a cryptoprocessor comprising physical unclonable function circuitry comprising at least one physical unclonable function, and at least one processing core configured to process a challenge received from outside the cryptoprocessor by at least deriving a response to the challenge by providing the challenge as input to the physical unclonable function circuitry, using the response as an encryption key to encrypt a second encryption key, and by causing the encrypted second encryption key to be provided to a party which issued the challenge.

Description

technical field [0001] The present invention relates to secure cryptographic processing in data processing hardware. Background technique [0002] Cryptographic methods are used to authenticate communicating parties and to secure communications between these communicating parties. While modern cryptographic algorithms themselves are considered well-developed and resistant to cryptanalysis, it is usually relatively easy for an attacker to compromise one or both of the communication endpoints. A communication endpoint refers to a device used by a communicating party to participate in a communication. Such endpoint devices may include, for example, computers, smartphones, or cellular phones. Therefore, improving the security of such devices is a matter of concern. Contents of the invention [0003] According to some aspects, the subject-matter of the independent claims is provided. Some embodiments are defined in the dependent claims. [0004] According to a first aspect...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/60G06F21/73H04L9/32
CPCH04L9/3278G06F21/602G06F21/606G06F21/73H04L9/3242H04L9/0822H04L9/321H04L2209/76G09C1/00H04L9/085
Inventor D·赤欧霓阿克斯I·J·奥利弗
Owner NOKIA NETWORKS OY
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More