DES hardware throughput for short operations
    41.
    发明授权
    DES hardware throughput for short operations 失效
    DES硬件吞吐量短的操作

    公开(公告)号:US08374343B2

    公开(公告)日:2013-02-12

    申请号:US12106013

    申请日:2008-04-18

    IPC分类号: H04L9/28

    摘要: A system for executing a symmetric key cryptographic method includes a processor selecting data paths, a key, an initialization vector, a memory storing batched operation parameters, a bus connected to the processor and the memory, a cryptographic processor connected to the bus and controlled by the processor for performing a plurality of operations according to the operations parameter, wherein data for each operation is received individually and separately from the batched operation parameters, wherein an output for each operation is transmitted separately, and a pair of first-in-first-out (FIFO) state machines controlled by the processor and selectably connected to one of the cryptographic processor and the bus, bypassing the cryptographic processor.

    摘要翻译: 用于执行对称密钥加密方法的系统包括处理器选择数据路径,密钥,初始化向量,存储批量操作参数的存储器,连接到处理器和存储器的总线,连接到总线的加密处理器,并由 所述处理器用于根据所述操作参数执行多个操作,其中每个操作的数据被单独地和分批的操作参数分开接收,其中每个操作的输出被单独发送,并且一对先进先出 (FIFO)状态机,并且可选地连接到密码处理器和总线之一,绕过加密处理器。

    Execution unit for performing the data encryption standard
    42.
    发明授权
    Execution unit for performing the data encryption standard 有权
    用于执行数据加密标准的执行单元

    公开(公告)号:US08358780B2

    公开(公告)日:2013-01-22

    申请号:US13291026

    申请日:2011-11-07

    IPC分类号: H04L9/00

    CPC分类号: H04L9/0625 H04L2209/12

    摘要: Described is an execution unit for performing at least part of the Data Encryption Standard that includes a Left Half input; a Key input; and a Table input, as well as a first group of transistors configured to receive the Table input, perform a table look-up, and output data. The execution unit further includes a first exclusive-or operator having two inputs and an output that is configured to receive the Left Half input and the Key input. The execution unit also includes a second exclusive-or operator having two inputs and an output that is configured to receive the data output by the first group of transistors and to receive the output of the first exclusive-or operator. The execution unit also includes a third exclusive-or operator having two inputs and an output that is configured to receive the Left Half input and the data output by the first group of transistors.

    摘要翻译: 描述了用于执行包括左半输入的数据加密标准的至少一部分的执行单元; 一键输入 和Table输入,以及被配置为接收Table输入的第一组晶体管,执行表查找和输出数据。 执行单元还包括具有两个输入的第一异或运算符和被配置为接收左半输入和键输入的输出。 执行单元还包括具有两个输入的第二异或运算符和被配置为接收由第一组晶体管输出的数据并且接收第一个异或运算符的输出的输出。 执行单元还包括具有两个输入的第三异或运算符和被配置为接收左半输入和由第一组晶体管输出的数据的输出。

    Encryption device, encryption method and storage medium storing its program
    43.
    发明授权
    Encryption device, encryption method and storage medium storing its program 有权
    加密设备,加密方法和存储其程序的存储介质

    公开(公告)号:US08335313B2

    公开(公告)日:2012-12-18

    申请号:US12834252

    申请日:2010-07-12

    IPC分类号: H04L9/06

    摘要: When processing a data conversion function of a MISTY structure, such as the FO function of MISTY1, the logical calculation result t3 of the exclusive OR 614 of the process result of the FI function 602 of the MISTY structure in the second stage and a logical calculation result t1 of an exclusive OR 612 of the MISTY structure in the first stage is not stored in a register. The logical calculation result t3 and the logical calculation result of respective exclusive OR 642 and 643 are subject to a direct exclusive OR with the respective exclusive OR 642 and 643.

    摘要翻译: 当处理诸如MISTY1的FO功能的MISTY结构的数据转换功能时,第二级的MISTY结构的FI功能602的处理结果的异或614的逻辑计算结果t3和逻辑计算 第一级的MISTY结构的异或612的结果t1不存储在寄存器中。 逻辑运算结果t3和各异或642和643的逻辑计算结果与各自的异或642和643进行直接异或运算。

    Message transmission method, preferably for an energy distribution network
    44.
    发明授权
    Message transmission method, preferably for an energy distribution network 失效
    消息传输方法,优选用于能量分配网络

    公开(公告)号:US08331565B2

    公开(公告)日:2012-12-11

    申请号:US12578029

    申请日:2009-10-13

    IPC分类号: H04K1/00

    摘要: A process for transmitting a message between a first electronic device and a second electronic device of an energy distribution network is described. The process includes generating, by the first electronic device, a first data encryption key identifying the second electronic device on the basis of a main data encryption key and an identification code of the second electronic device. The process further includes generating, by the first electronic device and the second electronic device, a communication key on the basis of said first data encryption key and a reference datum.

    摘要翻译: 描述了在能量分配网络的第一电子设备和第二电子设备之间发送消息的过程。 该处理包括由第一电子设备基于第二电子设备的主数据加密密钥和识别码生成识别第二电子设备的第一数据加密密钥。 该处理还包括基于所述第一数据加密密钥和参考数据,由第一电子设备和第二电子设备生成通信密钥。

    BLOCK ENCRYPTION DEVICE AND METHOD AND COMPUTER PROGRAM
    45.
    发明申请
    BLOCK ENCRYPTION DEVICE AND METHOD AND COMPUTER PROGRAM 有权
    块加密设备和方法与计算机程序

    公开(公告)号:US20120269342A1

    公开(公告)日:2012-10-25

    申请号:US13504389

    申请日:2010-10-26

    IPC分类号: G06F21/24

    CPC分类号: H04L9/0625

    摘要: In block cipher based on generalized Feistel network, pseudorandomness and strong-pseudorandomness may be fulfilled efficiently. In encrypting a plaintext of kn-bit blocks, Feistel permutation is applied in terms of 2n bits as a unit, and then block-based permutation based on a binary de Bruijn graph with symmetrical type 2 branch coloring is applied. The Feistel permutation and the block-based permutation are grouped together to form a round. The round is repeatedly performed a preset number of times to output a ciphertext.

    摘要翻译: 在基于广义Feistel网络的块密码中,可以有效地实现伪随机性和强伪随机性。 在加密kn位模块的明文中,以1比特为单位应用Feistel排列,然后应用基于具有对称型2分支着色的二进制de Bruijn图形的基于块的置换。 Feistel排列和基于块的置换组合在一起形成一个圆。 轮次重复执行预设次数以输出密文。

    Encryption processing apparatus, encryption processing method, and computer program
    46.
    发明授权
    Encryption processing apparatus, encryption processing method, and computer program 失效
    加密处理装置,加密处理方法和计算机程序

    公开(公告)号:US08290148B2

    公开(公告)日:2012-10-16

    申请号:US11846853

    申请日:2007-08-29

    IPC分类号: G06F21/00

    摘要: An encryption processing apparatus for performing common-key blockcipher processing, the encryption processing apparatus includes an encryption processing part that performs data transformation in which a round function is iterated for a plurality of rounds; and a key scheduling part that generates round keys used to execute the round function. The key scheduling part is configured to repeatedly apply an xs times multiplication over an extension field GF(2m), generated by an m-th order irreducible polynomial f(x) defined over GF(2), to an m-bit intermediate key generated by transformation of a secret key to generate a plurality of different round intermediate keys serving as data for generating a plurality of different round keys.

    摘要翻译: 一种用于执行公共密钥块密码处理的加密处理装置,所述加密处理装置包括对多个轮次进行循环函数重复的数据变换的加密处理部; 以及生成用于执行回合函数的循环密钥的密钥调度部分。 密钥调度部分被配置为在由GF(2)上定义的m阶不可约多项式f(x)生成的扩展字段GF(2m)上重复地应用xs乘法乘法到生成的m位中间密钥 通过转换秘密密钥来生成用作用于生成多个不同循环密钥的数据的多个不同的中间中间密钥。

    CRYPTOGRAPHY CIRCUIT PROTECTED AGAINST OBSERVATION ATTACKS, IN PARTICULAR OF A HIGH ORDER
    47.
    发明申请
    CRYPTOGRAPHY CIRCUIT PROTECTED AGAINST OBSERVATION ATTACKS, IN PARTICULAR OF A HIGH ORDER 有权
    防止观察攻击的纹理电路,特别是高阶

    公开(公告)号:US20120250854A1

    公开(公告)日:2012-10-04

    申请号:US13145177

    申请日:2010-01-18

    IPC分类号: H04L9/28

    摘要: A cryptography circuit protected against observation attacks comprises at least one register R providing a variable x masked by the mask m, the masked variable being encrypted by a first substitution box S in a cyclic manner. The circuit also comprises a mask register M delivering at each cycle a mask mt, the transformation of m, the mask m being extracted from mt before being encrypted by a second substitution box S′, the new mask m′ obtained on output from this box S′ is transformed into a mask m′t before being stored in the mask register M. The transformation consists of a bijection or a composition law making it possible to reduce or indeed to cancel any high-order attack in accordance with a model of activity of the registers R and M. Cryptography circuits are protected against high-order observation attacks on installations based on masking.

    摘要翻译: 防止观察攻击的加密电路包括至少一个寄存器R,其提供由掩码m屏蔽的变量x,该掩蔽变量由循环方式由第一替换盒S加密。 电路还包括一个屏蔽寄存器M,每个周期都传送一个掩码mt,m的变换,m个被提取的掩码m在被第二个替代框S'加密之前,从这个框输出得到的新的掩码m' S'在被存储在掩模寄存器M中之前被转换成掩模。该转换由双射或组合法组成,使得可以根据活动模型减少或确实取消任何高阶攻击 的寄存器R和M.加密电路被保护免受基于掩蔽的安装的高阶观察攻击。

    Cryptographic method and apparatus for enhancing computation performance of a central processing unit
    48.
    发明授权
    Cryptographic method and apparatus for enhancing computation performance of a central processing unit 有权
    用于增强中央处理单元的计算性能的加密方法和装置

    公开(公告)号:US08204219B2

    公开(公告)日:2012-06-19

    申请号:US12376339

    申请日:2007-10-26

    申请人: Chun-Wei Fang

    发明人: Chun-Wei Fang

    IPC分类号: G06F21/00

    摘要: A cryptographic method for enhancing computation performance of a central processing unit involves the execution of a conversion function of the cryptographic method by the central processing unit. The conversion function computation requires the use of a plurality of substitution boxes. The method comprises the steps of: (A) detecting a processing bit length of the central processing unit; (B) generating at least one new substitution box from original substitution boxes according to the processing bit length and a bit permutation sequence, each of the at least one new substitution box containing a plurality of new substitution values whose bit length is equal to the processing bit length; and (C) using a bit expansion operation, a bitwise exclusive OR operation, the selection operations that use the at least one new substitution box generated in step (B), a plurality of bitwise AND operations, and at least one bitwise OR operation to conduct the conversion function computation. The at least one new substitution box is designed according to different bit processing capabilities (e.g., 8 bits, 16 bits, 32 bits), such that the processing capability of a central processing unit can be fully utilized.

    摘要翻译: 用于增强中央处理单元的计算性能的加密方法涉及由中央处理单元执行密码方法的转换功能。 转换函数计算需要使用多个取代框。 该方法包括以下步骤:(A)检测中央处理单元的处理位长度; (B)根据处理比特长度和比特置换序列从原始替换盒中生成至少一个新的替换盒,所述至少一个新的替换盒中的每一个包含多个新的替代值,其中该比特长度等于处理 位长度 以及(C)使用比特扩展操作,按位异或运算,使用在步骤(B)中生成的至少一个新替换框的选择操作,多个按位AND运算和至少一个按位OR运算, 进行转换函数计算。 根据不同的位处理能力(例如,8位,16位,32位)来设计至少一个新的替代框,使得可以充分利用中央处理单元的处理能力。

    High-efficient encryption and decryption processing method for implementing SMS4 algorithm
    49.
    发明授权
    High-efficient encryption and decryption processing method for implementing SMS4 algorithm 有权
    实现SMS4算法的高效加密和解密处理方法

    公开(公告)号:US08204218B2

    公开(公告)日:2012-06-19

    申请号:US12375095

    申请日:2007-07-19

    IPC分类号: H04K1/00

    CPC分类号: H04L9/0625 H04L2209/80

    摘要: An encrypting/decrypting processing method for implementing SMS4 algorithm in high efficiency is provided. After preparing constant array, input external data into register section, firstly make primary data conversion and then make secondary data conversion, finally repeat data conversion course until complete all specified data conversion courses and obtain processing result of circulating data encryption/decryption. And it solves the technical problems of data conversion in the background technique that number of circulating times is large and encrypting efficiency is low, simplifying the chip design, largely optimizing integrity of chip signal and being able to improve interference immunity of system and reduce system cost.

    摘要翻译: 提供了一种以高效率实现SMS4算法的加密/解密处理方法。 准备常数阵列后,将外部数据输入到寄存器部分,首先进行主数据转换,然后进行二次数据转换,最后重复数据转换过程,直到完成所有指定的数据转换课程,并获得循环数据加密/解密的处理结果。 解决了循环次数大,加密效率低的背景技术数据转换技术问题,简化了芯片设计,大大提高了芯片信号的完整性,提高了系统的抗干扰能力,降低了系统成本 。

    CRYPTOGRAPHIC TOKEN WITH LEAK-RESISTANT KEY DERIVATION
    50.
    发明申请
    CRYPTOGRAPHIC TOKEN WITH LEAK-RESISTANT KEY DERIVATION 审中-公开
    CRYPTOGRAPHIC TOKEN WITH LEAK-RESISTANT KEY DORIVATION

    公开(公告)号:US20120017089A1

    公开(公告)日:2012-01-19

    申请号:US13245054

    申请日:2011-09-26

    申请人: PAUL C. KOCHER

    发明人: PAUL C. KOCHER

    IPC分类号: H04L9/32

    摘要: Methods and apparatuses for increasing the leak-resistance of cryptographic systems are disclosed. A cryptographic token maintains secret key data based on a top-level key. The token can produce updated secret key data using an update process that makes partial information that might have previously leaked to attackers about the secret key data no longer usefully describe the new updated secret key data. By repeatedly applying the update process, information leaking during cryptographic operations that is collected by attackers rapidly becomes obsolete. Thus, such a system can remain secure against attacks involving analysis of measurements of the device's power consumption, electromagnetic characteristics, or other information leaked during transactions. Transactions with a server can be secured with the token.

    摘要翻译: 公开了增加密码系统的防漏性的方法和装置。 加密令牌基于顶级密钥来维护密钥数据。 令牌可以使用更新过程产生更新的秘密密钥数据,该更新过程使先前泄漏给攻击者的部分信息对于秘密密钥数据不再有用地描述新的更新的秘密密钥数据。 通过重复应用更新过程,攻击者收集的密码操作过程中信息泄露迅速变得过时。 因此,这种系统可以保持安全性,防止涉及分析设备的功耗,电磁特性或事务中泄露的其他信息的测量的攻击。 可以使用令牌来保护与服务器的事务。