18554124. Secure Cryptographic Coprocessor simplified abstract (Google LLC)

From WikiPatents
Jump to navigation Jump to search

Secure Cryptographic Coprocessor

Organization Name

Google LLC

Inventor(s)

Philipp Wagner of Cambridge (GB)

Gregory Andrew Chadwick of Cambridge (GB)

Timothy Jay Chen of Pleasanton CA (US)

Michael Stefano Fritz Schaffner of Campbell CA (US)

Christopher Gori of San Francisco CA (US)

Rupert James Swarbrick of Cambridge (GB)

Secure Cryptographic Coprocessor - A simplified explanation of the abstract

This abstract first appeared for US patent application 18554124 titled 'Secure Cryptographic Coprocessor

Simplified Explanation

An apparatus with an integrated circuit chip is designed to protect a cryptographic coprocessor from attacks by storing information in encrypted form and changing encryption keys.

  • The apparatus includes encrypted storage for data, instruction code, and intermediate values.
  • It can quickly change encryption keys to erase stored information securely.
  • Two registers store randomized bits with different levels of randomness for cryptographic operations.
  • The coprocessor verifies the contents and usage of instruction code for security.

Key Features and Innovation

  • Protection against attacks on a cryptographic coprocessor.
  • Encrypted storage of information.
  • Quick key changes for secure erasure.
  • Randomized bits with varying levels of randomness.
  • Verification of instruction code for security.

Potential Applications

This technology can be used in secure communication systems, digital signatures, secure transactions, and data encryption applications.

Problems Solved

This technology addresses the vulnerability of cryptographic coprocessors to attacks that compromise sensitive information and encryption keys.

Benefits

  • Enhanced security for cryptographic coprocessors.
  • Protection against unauthorized access to sensitive information.
  • Secure storage and quick erasure of encrypted data.
  • Improved verification of instruction code for secure cryptographic operations.

Commercial Applications

  • Secure communication systems for government and military applications.
  • Secure online transactions and digital signatures for financial institutions.
  • Data encryption solutions for secure storage and transmission of sensitive information.

Prior Art

Readers can explore prior research on cryptographic coprocessor security, encryption key management, and secure storage technologies.

Frequently Updated Research

Stay informed about advancements in cryptographic coprocessor security, encryption key management, and secure data storage technologies.

Questions about Cryptographic Coprocessor Security

How does the apparatus protect against attacks on a cryptographic coprocessor?

The apparatus uses encrypted storage and key changes to secure sensitive information and prevent unauthorized access.

What are the potential applications of this technology beyond cryptographic coprocessor security?

This technology can be applied in various industries for secure communication, data encryption, and digital signature applications.


Original Abstract Submitted

An apparatus with an integrated circuit (IC) chip can provide protection against attacks on a cryptographic coprocessor. An attacker can compromise a cryptographic coprocessor by, for instance, obtaining a private encryption key or instruction code. To combat these attacks, example implementations store information in encrypted form. The information may correspond to data, instruction code, or intermediate values located in state registers. To securely and quickly “erase” such stored information, the cryptographic coprocessor can change the encryption key. In other example implementations, random numbers are provided with two different levels of “randomness quality” that is appropriate for different types of procedures. A cryptographic coprocessor can include two registers that store randomized bits in accordance with the two different quality levels for rapid access during cryptographic operations. To further thwart would-be attacks, a cryptographic coprocessor can verify the contents or usage of instruction code that is executed to perform cryptographic operations.