发明名称 Secrets renewability
摘要 A method, system and apparatus for deriving a secondary secret from a root secret are described, the method, system and apparatus including reserving a memory buffer included in an integrated circuit, the memory buffer being large enough to contain all of the bits which will include the secondary secret, receiving a plurality of bits from a root secret, the root secret being stored in a secure memory of the integrated circuit, inputting the plurality of bits from the root secret and at least one control bit into a permutation network, and thereby producing a multiplicity of output bits, the at least one control bit including one of one bit of a value g, and one bit an output of a function which receives g as an input, receiving the multiplicity of output bits from the permutation network, inputting the multiplicity of output bits from the permutation network into a plurality of logic gates, thereby combining the multiplicity of output bits, wherein a fixed number of bits is output from the logic gates, inputting the fixed number of bits output by the logic gates into an error correcting code module, the fixed number of bits output by the logic gates including a first group of intermediate output bits and a second group of intermediate output bits and receiving output bits from the error correcting code module, the output bits of the error correcting code module including the first group of intermediate output bits as changed by the error correcting code module, where the change depends on the second group of intermediate output bits, filling non-filled registers in the reserved memory buffer with the first group of intermediate output bits as changed by the error correcting code module, and repeating the steps of “receiving a plurality of bits from a root secret” through “filling non-filled registers in the reserved memory buffer” until the entire secondary secret is derived, wherein the steps of “receiving a plurality of bits from a root secret” through “filling non-filled registers in the reserved memory buffer” are performed in a single clock cycle of the integrated circuit. Related apparatus, methods and systems are also described.
申请公布号 US9407434(B2) 申请公布日期 2016.08.02
申请号 US201314759417 申请日期 2013.07.10
申请人 Cisco Technology, Inc. 发明人 Kara-Ivanov Michael;Kipnis Aviad;Reinman Tzachy;Mangell Efraim;Waisbard Erez;Belenky Yaacov
分类号 H04L9/08 主分类号 H04L9/08
代理机构 代理人 Katz Samuel M.
主权项 1. A method for deriving a secondary secret from a root secret, the method comprising: a. reserving a memory buffer comprised in an integrated circuit, the memory buffer being large enough to contain all of the bits which will comprise the secondary secret; b. receiving a plurality of bits from the root secret, the root secret being stored in a secure memory of the integrated circuit; c. inputting the plurality of bits from the root secret and at least one control bit into a permutation network, and thereby producing a multiplicity of output bits, the at least one control bit comprising one of: one bit of a value g; and one bit an output of a function which receives g as an input; d. receiving the multiplicity of output bits from the permutation network; e. inputting the multiplicity of output bits from the permutation network into a plurality of logic gates, thereby combining the multiplicity of output bits, wherein a fixed number of bits is output from the logic gates; f. inputting the fixed number of bits output by the logic gates into an error correcting code module, the fixed number of bits output by the logic gates comprising a first group of intermediate output bits and a second group of intermediate output bits and receiving output bits from the error correcting code module, the output bits of the error correcting code module comprising the first group of intermediate output bits as changed by the error correcting code module, where the change depends on the second group of intermediate output bits; g. filling non-filled registers in the reserved memory buffer with the first group of intermediate output bits as changed by the error correcting code module; and h. repeating steps b-g until the entire secondary secret is derived, wherein steps b-g are performed in a single clock cycle of the integrated circuit.
地址 San Jose CA US