Search

Benjamin C Jun

age ~50

from Hillsborough, CA

Also known as:
  • Benjamin Che Jun
  • Benjamin K Jun
  • Benjamin Cheming Jun
  • Benjamin Che Ming Jun
  • Elaine Wong Jun
  • Benjamin Che Junming
  • Elaine W Jun
  • Ben Zun
  • Jun Benjamin
Phone and address:
1425 Benito Ave, Burlingame, CA 94010

Benjamin Jun Phones & Addresses

  • 1425 Benito Ave, Burlingame, CA 94010
  • Hillsborough, CA
  • 5332 Boyd Ave, Oakland, CA 94618
  • San Francisco, CA
  • Foster City, CA
  • Menlo Park, CA
  • Palo Alto, CA

Work

  • Company:
    Cryptography research, inc. a division of rambus
    Jun 2011
  • Address:
    San Francisco Bay Area
  • Position:
    Vp and cto

Education

  • Degree:
    MS
  • School / High School:
    Stanford University
    1996 to 1998
  • Specialities:
    Electrical Engineering

Skills

Cryptography • Computer Security • Information Security • Security • System Architecture • Embedded Systems • ASIC • Encryption • Protocol Design • Anti-Tamper

Industries

Computer & Network Security
Name / Title
Company / Classification
Phones & Addresses
Benjamin Jun
Vice President - Technology
Cryptography Research
Computer & Network Security · Computer Related Services · Research Service · Marketing Research & Public Open Polling
425 Market Street, 11, San Francisco, CA 94105
425 Market St, San Francisco, CA 94105
575 Market St, San Francisco, CA 94105
(415)3970123, (415)3970127, (415)3970323

Resumes

Benjamin Jun Photo 1

Vp And Cto At Cryptography Research

view source
Position:
VP and CTO at Cryptography Research, Inc. a Division of Rambus
Location:
San Francisco Bay Area
Industry:
Computer & Network Security
Work:
Cryptography Research, Inc. a Division of Rambus - San Francisco Bay Area since Jun 2011
VP and CTO

Cryptography Research, Inc. - San Francisco Bay Area Apr 1998 - Jun 2011
Vice President of Technology

IDEO Product Development / Audible Inc (now an Amazon company) - Palo Alto, CA Apr 1996 - Apr 1998
Engineer / Mobile Device Design Consultant

Bain & Company 1995 - 1995
Associate Consultant Intern

Center for Computing Sciences, Institute for Defense Analyses - Bowie, MD 1992 - 1994
Intern
Education:
Stanford University 1996 - 1998
MS, Electrical Engineering
Stanford University 1992 - 1996
BS, Electrical Engineering
MBHS
Skills:
Cryptography
Computer Security
Information Security
Security
System Architecture
Embedded Systems
ASIC
Encryption
Protocol Design
Anti-Tamper

Us Patents

  • Balanced Cryptographic Computational Method And Apparatus For Leak Minimizational In Smartcards And Other Cryptosystems

    view source
  • US Patent:
    6510518, Jan 21, 2003
  • Filed:
    Jun 3, 1999
  • Appl. No.:
    09/325611
  • Inventors:
    Joshua M. Jaffe - San Francisco CA
    Paul C. Kocher - San Francisco CA
    Benjamin C. Jun - Palo Alto CA
  • Assignee:
    Cryptography Research, Inc. - San Francisco CA
  • International Classification:
    G06F 124
  • US Classification:
    713168, 713171, 713200, 713201
  • Abstract:
    Cryptographic devices that leak information about their secrets through externally monitorable characteristics (such as electromagnetic radiation and power consumption) may be vulnerable to attack, and previously-known methods that could address such leaking are inappropriate for smartcards and many other cryptographic applications. Methods and apparatuses are disclosed for performing computations in which the representation of data, the number of system state transitions at each computational step, and the Hamming weights of all operands are independent of computation inputs, intermediate values, or results. Exemplary embodiments implemented using conventional (leaky) hardware elements (such as electronic components, logic gates, etc. ) as well as software executing on conventional (leaky) microprocessors are described. Smartcards and other tamper-resistant devices of the invention provide greatly improved resistance to cryptographic attacks involving external monitoring.
  • Digital Content Protection Method And Apparatus

    view source
  • US Patent:
    6640305, Oct 28, 2003
  • Filed:
    Sep 6, 2001
  • Appl. No.:
    09/948473
  • Inventors:
    Paul C. Kocher - San Francisco CA
    Joshua M. Jaffe - San Francisco CA
    Benjamin C. Jun - Palo Alto CA
  • Assignee:
    Cryptography Research, Inc. - San Francisco CA
  • International Classification:
    H04L 910
  • US Classification:
    713194, 713162, 713172, 380228, 380286
  • Abstract:
    Before use, a population of tamper-resistant cryptographic enforcement devices is partitioned into groups and issued one or more group keys. Each tamper-resistant device contains multiple computational units to control access to digital content. One of the computational units within each tamper-resistant device communicates with another of the computational units acting as an interface control processor, and serves to protect the contents of a nonvolatile memory from unauthorized access or modification by other portions of the tamper-resistant device, while performing cryptographic computations using the memory contents. Content providers enforce viewing privileges by transmitting encrypted rights keys to a large number of recipient devices. These recipient devices process received messages using the protected processing environment and memory space of the secure unit. The processing result depends on whether the recipient device was specified by the content provider as authorized to view some encrypted digital content.
  • Hardware-Level Mitigation And Dpa Countermeasures For Cryptographic Devices

    view source
  • US Patent:
    6654884, Nov 25, 2003
  • Filed:
    Jan 17, 2003
  • Appl. No.:
    10/346848
  • Inventors:
    Joshua M. Jaffe - San Francisco CA
    Paul C. Kocher - San Francisco CA
    Benjamin C. Jun - Palo Alto CA
  • Assignee:
    Cryptography Research, Inc. - San Francisco CA
  • International Classification:
    G06F 124
  • US Classification:
    713168, 713171, 713200, 713201
  • Abstract:
    Differential power analysis is a powerful cryptanalytic method that can be used to extract secret keys from cryptographic hardware during operation. To reduce the risk of compromise, cryptographic hardware can employ countermeasures to reduce the amount of secret information that can be deduced by power consumption measurements during processing. Such countermeasures can include balancing circuitry inside a cryptographic hardware device to reduce the amount of variation in power consumption that is correlated to data parameters being manipulated. This can be facilitated by using a constant-Hamming-weight representation when representing and manipulating secret parameters. Low-level operation modules, such as Boolean logic gates, can be built to process input parameters in a manner that balances the number of ON transistors while simultaneously maintaining a data-independent number of transistor transitions during computation. Leakage reduction may be used with other countermeasures, including introducing noise, unrelated to data being processed, into the power measurements.
  • Using Smartcards Or Other Cryptographic Modules For Enabling Connected Devices To Access Encrypted Audio And Visual Content

    view source
  • US Patent:
    7039816, May 2, 2006
  • Filed:
    Oct 27, 2003
  • Appl. No.:
    10/695256
  • Inventors:
    Paul C. Kocher - San Francisco CA, US
    Joshua M. Jaffe - San Francisco CA, US
    Benjamin C. Jun - Palo Alto CA, US
  • Assignee:
    Cryptography Research, Inc. - San Francisco CA
  • International Classification:
    H04N 7/167
    H04L 9/30
  • US Classification:
    713194, 713193, 380240, 380284
  • Abstract:
    To prevent piracy, audiovisual content is encrypted prior to transmission to consumers. A low-cost, high-security cryptographic rights module (such as a smartcard) enables devices such as players/displays to decode such content. Security-critical functions may be performed by the cryptographic module in a manner that allows security compromises to be addressed by upgrading or replacing cryptographic modules, thereby avoiding the need to replace or modify other (typically much higher-cost) components. The security module contains cryptographic keys, which it uses to process rights enablement messages (REMs) and key derivation messages (KDMs). From a REM and KDM, the security module derives key data corresponding to content, uses public key and/or symmetric cryptography to re-encrypt the derived key data for another device, and provides the re-encrypted key data to the decoding device. The decoding device then uses cryptographic values derived from the re-encrypted key data to decrypt the content.
  • Differential Power Analysis Method And Apparatus

    view source
  • US Patent:
    7587044, Sep 8, 2009
  • Filed:
    Dec 3, 2001
  • Appl. No.:
    10/005105
  • Inventors:
    Paul C. Kocher - San Francisco CA, US
    Joshua M. Jaffe - San Francisco CA, US
    Benjamin C. Jun - Foster City CA, US
  • Assignee:
    Cryptography Research, Inc. - San Francisco CA
  • International Classification:
    H04L 9/00
    G06F 21/00
  • US Classification:
    380 1, 380 37, 713194
  • Abstract:
    Information leaked from smart cards and other tamper resistant cryptographic devices can be statistically analyzed to determine keys or other secret data. A data collection and analysis system is configured with an analog-to-digital converter connected to measure the device's consumption of electrical power, or some other property of the target device, that varies during the device's processing. As the target device performs cryptographic operations, data from the A/D converter are recorded for each cryptographic operation. The stored data are then processed using statistical analysis, yielding the entire key, or partial information about the key that can be used to accelerate a brute force search or other attack.
  • Differential Power Analysis

    view source
  • US Patent:
    7599488, Oct 6, 2009
  • Filed:
    Oct 29, 2007
  • Appl. No.:
    11/978364
  • Inventors:
    Paul C. Kocher - San Francisco CA, US
    Joshua M. Jaffe - San Francisco CA, US
    Benjamin C. Jun - Oakland CA, US
  • Assignee:
    Cryptography Research, Inc. - San Francisco CA
  • International Classification:
    H04K 3/00
    H04L 9/00
    G06F 11/30
  • US Classification:
    380 1, 380 37, 713194, 713340
  • Abstract:
    Information leaked from smart cards and other tamper resistant cryptographic devices can be statistically analyzed to determine keys or other secret data. A data collection and analysis system is configured with an analog-to-digital converter connected to measure the device's consumption of electrical power, or some other property of the target device, that varies during the device's processing. As the target device performs cryptographic operations, data from the A/D converter are recorded for each cryptographic operation. The stored data are then processed using statistical analysis, yielding the entire key, or partial information about the key that can be used to accelerate a brute force search or other attack.
  • Differential Power Analysis

    view source
  • US Patent:
    7634083, Dec 15, 2009
  • Filed:
    Dec 21, 2006
  • Appl. No.:
    11/643349
  • Inventors:
    Paul C. Kocher - San Francisco CA, US
    Joshua M. Jaffe - San Francisco CA, US
    Benjamin C. Jun - Oakland CA, US
  • Assignee:
    Cryptography Research, Inc. - San Francisco CA
  • International Classification:
    H04L 9/00
    G06F 21/00
  • US Classification:
    380 1, 380 37, 713194
  • Abstract:
    Information leaked from smart cards and other tamper resistant cryptographic devices can be statistically analyzed to determine keys or other secret data. A data collection and analysis system is configured with an analog-to-digital converter connected to measure the device's consumption of electrical power, or some other property of the target device, that varies during the device's processing. As the target device performs cryptographic operations, data from the A/D converter are recorded for each cryptographic operation. The stored data are then processed using statistical analysis, yielding the entire key, or partial information about the key that can be used to accelerate a brute force search or other attack.
  • Cryptographic Computation Using Masking To Prevent Differential Power Analysis And Other Attacks

    view source
  • US Patent:
    7668310, Feb 23, 2010
  • Filed:
    Aug 15, 2001
  • Appl. No.:
    09/930836
  • Inventors:
    Paul C. Kocher - San Francisco CA, US
    Joshua M. Jaffe - San Francisco CA, US
    Benjamin C. Jun - Palo Alto CA, US
  • Assignee:
    Cryptography Research, Inc. - San Francisco CA
  • International Classification:
    H04L 9/22
  • US Classification:
    380 37, 380 28
  • Abstract:
    Methods and apparatuses are disclosed for improving DES and other cryptographic protocols against external monitoring attacks by reducing the amount (and signal-to-noise ratio) of useful information leaked during processing. An improved DES implementation of the invention instead uses two 56-bit keys (K and K) and two 64-bit plaintext messages (M and M), each associated with a permutation (i. e. , KP, KP and MP, MP) such that KP{K} XOR KP {K} equals the “standard” DES key K, and MP{M} XOR MP{M} equals the “standard” message. During operation of the device, the tables are preferably periodically updated, by introducing fresh entropy into the tables faster than information leaks out, so that attackers will not be able to obtain the table contents by analysis of measurements. The technique is implementable in cryptographic smartcards, tamper resistant chips, and secure processing systems of all kinds.

Flickr

Youtube

BENJAMIN "JUN" KINTANAR

fritzmark.epicsp...

  • Category:
    Education
  • Uploaded:
    05 Mar, 2009
  • Duration:
    7m 12s

Breaking Benjamin - So Cold lyrics

Thanks For The Views! Hope you enjoyed! ______DISCLAIMER... I do not ...

  • Category:
    Music
  • Uploaded:
    10 Jun, 2008
  • Duration:
    4m 45s

Breaking Benjamin- Dance with the Devil +lyrics

11000 vieuws!,, thx a lot people :D :D An other song by Breaking Benja...

  • Category:
    Music
  • Uploaded:
    30 Jun, 2008
  • Duration:
    3m 36s

Benjamin Orr - Stay The Night

  • Category:
    People & Blogs
  • Uploaded:
    06 Jun, 2009
  • Duration:
    4m 22s

Benjamin Zander: Classical music with shining...

www.ted.com Benjamin Zander has two infectious passions classical musi...

  • Category:
    Music
  • Uploaded:
    27 Jun, 2008
  • Duration:
    20m 44s

--Rain--Breaking...

read the title! . comment!

  • Category:
    Music
  • Uploaded:
    03 Jun, 2008
  • Duration:
    3m 28s

Breaking Benjamin Live

Breaking Benjamin performing So Cold on fuse

  • Category:
    People & Blogs
  • Uploaded:
    26 Jun, 2006
  • Duration:
    4m 34s

Breaking Benjamin-Had Enough

Had Enough

  • Category:
    Music
  • Uploaded:
    16 Jun, 2007
  • Duration:
    3m 49s

Myspace

Benjamin Jun Photo 10

Benjamin Jun Abraham

view source
Gender:
Male
Birthday:
1939

Facebook

Benjamin Jun Photo 11

Benjamin Jun Bautista

view source
Benjamin Jun Photo 12

Benjamin Jun Pastor

view source
Benjamin Jun Photo 13

BenJamin Jun Han

view source
Benjamin Jun Photo 14

Benjamin Jun Canilang

view source
Benjamin Jun Photo 15

Benjamin Jun Alforja

view source
Benjamin Jun Photo 16

Benjamin Jun

view source
Benjamin Jun Photo 17

Benjamin Jun Jie

view source
Benjamin Jun Photo 18

Benjamin Jun

view source

Get Report for Benjamin C Jun from Hillsborough, CA, age ~50
Control profile