Specialized circuitry for cryptographic authentication and other purposes
First Claim
1. A circuit configured to cryptographically authenticate itself, comprising:
- (a) a plurality of logic cells selected from a set of supported logic cells;
(b) a plurality of conductive elements interconnecting said logic cells with each other and with other circuit elements, where said interconnections are selected using a random number source, and where said interconnection selection is configured to comply with (i) wiring limitations, and (ii) circuit area constraints;
(c) logic configured to receive inputs to said circuit, use said interconnected logic cells to cryptographically transform said inputs into result values usable by an external device to authenticate said circuit, and output said result values.
0 Assignments
0 Petitions
Accused Products
Abstract
To prevent piracy, audiovisual content is encrypted prior to transmission to consumers. A low-cost, high-security cryptographic rights module (such as a smartcard) enables devices such as players/displays to decode such content. Security-critical functions may be performed by the cryptographic module in a manner that allows security compromises to be addressed by upgrading or replacing cryptographic modules, thereby avoiding the need to replace or modify other (typically much higher-cost) components. The security module contains cryptographic keys, which it uses to process rights enablement messages (REMs) and key derivation messages (KDMs). From a REM and KDM, the security module derives key data corresponding to content, uses public key and/or symmetric cryptography to re-encrypt the derived key data for another device, and provides the re-encrypted key data to the decoding device. The decoding device then uses cryptographic values derived from the re-encrypted key data to decrypt the content.
-
Citations
15 Claims
-
1. A circuit configured to cryptographically authenticate itself, comprising:
-
(a) a plurality of logic cells selected from a set of supported logic cells;
(b) a plurality of conductive elements interconnecting said logic cells with each other and with other circuit elements, where said interconnections are selected using a random number source, and where said interconnection selection is configured to comply with (i) wiring limitations, and (ii) circuit area constraints;
(c) logic configured to receive inputs to said circuit, use said interconnected logic cells to cryptographically transform said inputs into result values usable by an external device to authenticate said circuit, and output said result values. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A method for generating a cryptographic circuit, comprising:
-
(a) selecting a plurality of logic cells from a set of logic cells;
(b) using a random number source to define conductive elements interconnecting said logic cells with each other and with other circuit elements, where said interconnections are selected using a random number source, and where said interconnection selection is configured to comply with (i) wiring limitations, and (ii) circuit area constraints;
(c) combining said interconnected logic cells with logic configured to receive inputs to said circuit, use said interconnected logic cells in cryptographically transforming said inputs into result values, and output said result values. - View Dependent Claims (13, 14, 15)
-
Specification