-
公开(公告)号:US20170147340A1
公开(公告)日:2017-05-25
申请号:US15396568
申请日:2016-12-31
Applicant: Intel Corporation
Inventor: Kirk S. YAP , Gilbert M. WOLRICH , James D. GUILFORD , Vinodh GOPAL , Erdinc OZTURK , Sean M. GULLEY , Wajdi K. FEGHALI , Martin G. DIXON
IPC: G06F9/30 , G06F9/38 , H04L9/06 , G06F12/0875 , G06F12/1027 , G06F15/80 , G06F12/0897
CPC classification number: G06F9/3016 , G06F9/30007 , G06F9/30036 , G06F9/30058 , G06F9/30098 , G06F9/30145 , G06F9/3802 , G06F9/384 , G06F12/0875 , G06F12/0897 , G06F12/1027 , G06F15/8007 , G06F21/602 , G06F2212/452 , G06F2212/68 , H04L9/0643 , H04L9/3239 , H04L2209/125
Abstract: A processor includes an instruction decoder to receive a first instruction to process a secure hash algorithm 2 (SHA-2) hash algorithm, the first instruction having a first operand associated with a first storage location to store a SHA-2 state and a second operand associated with a second storage location to store a plurality of messages and round constants. The processor further includes an execution unit coupled to the instruction decoder to perform one or more iterations of the SHA-2 hash algorithm on the SHA-2 state specified by the first operand and the plurality of messages and round constants specified by the second operand, in response to the first instruction.
-
公开(公告)号:US20230401037A1
公开(公告)日:2023-12-14
申请号:US18237859
申请日:2023-08-24
Applicant: Intel Corporation
Inventor: Erdinc OZTURK , Kirk S. YAP , Tomasz KANTECKI
IPC: G06F7/72
Abstract: Methods and apparatus for optimization techniques for modular multiplication algorithms. The optimization techniques may be applied to variants of modular multiplication algorithms, including variants of Montgomery multiplication algorithms and Barrett multiplication algorithms. The optimization techniques reduce the number of serial steps in Montgomery reduction and Barrett reduction. Modular multiplication operations involving products of integer inputs A and B may be performed in parallel to obtain a value C that is reduced to a residual RES. Modular multiplication and modular reduction operations may be performed in parallel. The number of serial steps in the modular reductions are reduced to L, where L serial steps, where w is a digit size in bits, and L is a number of digits of operands=[k/w].
-
公开(公告)号:US20210336767A1
公开(公告)日:2021-10-28
申请号:US17359152
申请日:2021-06-25
Applicant: Intel Corporation
Inventor: Raghunandan MAKARAM , Kirk S. YAP , Rajat AGARWAL , George VERGIS , Bill NALE , Jacob DOWECK
Abstract: A memory subsystem includes link encryption for the system memory data bus. The memory controller can provide encryption for data at rest and link protection. The memory controller can optionally provide link encryption. Thus, the system can provide link protection for the data in transit. The memory module can include a link decryption engine that can decrypt link encryption if it is used, and performs a link integrity check with a link integrity tag associated with the link protection. The memory devices can then store the encrypted protected data and ECC data from the link decryption engine after link protection verification.
-
公开(公告)号:US20210149704A1
公开(公告)日:2021-05-20
申请号:US17127729
申请日:2020-12-18
Applicant: Intel Corporation
Inventor: Wajdi FEGHALI , Vinodh GOPAL , Kirk S. YAP , Sean GULLEY , Raghunandan MAKARAM
Abstract: Systems, methods, and circuitries are disclosed for a per-process memory encryption system. At least one translation lookaside buffer (TLB) is configured to encode key identifiers for keys in one or more bits of either the virtual memory address or the physical address. The process state memory configured to store a first process key table for a first process that maps key identifiers to unique keys and a second process key table that maps the key identifiers to different unique keys. The active process key table memory configured to store an active key table. In response to a request for data corresponding to a virtual memory address, the at least one TLB is configured to provide a key identifier for the data to the active process key table to cause the active process key table to return the unique key mapped to the key identifier.
-
公开(公告)号:US20200280432A1
公开(公告)日:2020-09-03
申请号:US16807021
申请日:2020-03-02
Applicant: Intel Corporation
Inventor: Gilbert M. WOLRICH , Kirk S. YAP , Vinodh GOPAL , James D. GUILFORD
Abstract: A method of an aspect includes receiving an instruction. The instruction indicates a first source of a first packed data including state data elements ai, bi, ei, and fi for a current round (i) of a secure hash algorithm 2 (SHA2) hash algorithm. The instruction indicates a second source of a second packed data. The first packed data has a width in bits that is less than a combined width in bits of eight state data elements ai, bi, ci, di, ei, fi, gi, hi of the SHA2 hash algorithm. The method also includes storing a result in a destination indicated by the instruction in response to the instruction. The result includes updated state data elements ai+, bi+, ei+, and fi+ that have been updated from the corresponding state data elements ai, bi, ei, and fi by at least one round of the SHA2 hash algorithm.
-
公开(公告)号:US20170147343A1
公开(公告)日:2017-05-25
申请号:US15396578
申请日:2016-12-31
Applicant: Intel Corporation
Inventor: Kirk S. YAP , Gilbert M. WOLRICH , James D. GUILFORD , Vinodh GOPAL , Erdinc OZTURK , Sean M. GULLEY , Wajdi K. FEGHALI , Martin G. DIXON
IPC: G06F9/30 , G06F9/38 , G06F12/0897 , H04L9/06 , G06F12/1027 , G06F13/40 , G06F13/42 , G06F15/80 , G06F12/0875
CPC classification number: G06F21/602 , G06F9/30007 , G06F9/30036 , G06F9/30098 , G06F9/30156 , G06F9/3016 , G06F9/384 , G06F9/3855 , G06F12/0875 , G06F12/0897 , G06F12/1027 , G06F13/28 , G06F13/4068 , G06F13/4282 , G06F15/8007 , G06F2212/452 , G06F2212/68 , G06F2213/0026 , G09C1/00 , H04L9/0643 , H04L9/3239 , H04L2209/122
Abstract: A processor includes an instruction decoder to receive a first instruction to process a secure hash algorithm 2 (SHA-2) hash algorithm, the first instruction having a first operand associated with a first storage location to store a SHA-2 state and a second operand associated with a second storage location to store a plurality of messages and round constants. The processor further includes an execution unit coupled to the instruction decoder to perform one or more iterations of the SHA-2 hash algorithm on the SHA-2 state specified by the first operand and the plurality of messages and round constants specified by the second operand, in response to the first instruction.
-
7.
公开(公告)号:US20250117285A1
公开(公告)日:2025-04-10
申请号:US18974396
申请日:2024-12-09
Applicant: Intel Corporation
Inventor: Raghunandan MAKARAM , Kirk S. YAP
Abstract: In one embodiment, an apparatus includes: an integrity circuit to receive data and generate a protection code based at least in part on the data; a cryptographic circuit coupled to the integrity circuit to encrypt the data into encrypted data and encrypt the protection code into an encrypted protection code; a message authentication code (MAC) circuit coupled to the cryptographic circuit to compute a MAC comprising a tag using header information, the encrypted data, and the encrypted protection code; and an output circuit to send the header information, the encrypted data, and the tag to a receiver via a link. Other embodiments are described and claimed.
-
公开(公告)号:US20170147342A1
公开(公告)日:2017-05-25
申请号:US15396576
申请日:2016-12-31
Applicant: Intel Corporation
Inventor: Kirk S. YAP , Gilbert M. WOLRICH , James D. GUILFORD , Vinodh GOPAL , Erdinc OZTURK , Sean M. GULLEY , Wajdi K. FEGHALI , Martin G. DIXON
IPC: G06F9/30 , G06F9/38 , H04L9/06 , G06F12/0897 , G06F12/0875 , G06F12/1027 , G06F15/80 , G06F13/28
CPC classification number: G06F9/3016 , G06F9/30007 , G06F9/30036 , G06F9/30058 , G06F9/30098 , G06F9/30156 , G06F9/3802 , G06F9/384 , G06F9/3855 , G06F12/0875 , G06F12/0897 , G06F12/1027 , G06F13/28 , G06F13/4068 , G06F13/4282 , G06F15/8007 , G06F21/602 , G06F2212/452 , G06F2212/68 , G06F2213/0026 , G09C1/00 , H04L9/0643 , H04L9/3239 , H04L2209/122
Abstract: A processor includes an instruction decoder to receive a first instruction to process a secure hash algorithm 2 (SHA-2) hash algorithm, the first instruction having a first operand associated with a first storage location to store a SHA-2 state and a second operand associated with a second storage location to store a plurality of messages and round constants. The processor further includes an execution unit coupled to the instruction decoder to perform one or more iterations of the SHA-2 hash algorithm on the SHA-2 state specified by the first operand and the plurality of messages and round constants specified by the second operand, in response to the first instruction.
-
公开(公告)号:US20170147341A1
公开(公告)日:2017-05-25
申请号:US15396574
申请日:2016-12-31
Applicant: Intel Corporation
Inventor: Kirk S. YAP , Gilbert M. WOLRICH , James D. GUILFORD , Vinodh GOPAL , Erdinc OZTURK , Sean M. GULLEY , Wajdi K. FEGHALI , Martin G. DIXON
IPC: G06F9/30 , G06F15/80 , H04L9/06 , G06F12/0875 , G06F12/1027 , G06F9/38 , G06F12/0897
CPC classification number: G06F21/602 , G06F9/30007 , G06F9/30036 , G06F9/30156 , G06F9/3016 , G06F9/384 , G06F9/3855 , G06F12/0875 , G06F12/0897 , G06F12/1027 , G06F13/28 , G06F13/4068 , G06F13/4282 , G06F2212/452 , G06F2212/68 , G06F2213/0026 , G09C1/00 , H04L9/3239 , H04L2209/122
Abstract: A processor includes an instruction decoder to receive a first instruction to process a secure hash algorithm 2 (SHA-2) hash algorithm, the first instruction having a first operand associated with a first storage location to store a SHA-2 state and a second operand associated with a second storage location to store a plurality of messages and round constants. The processor further includes an execution unit coupled to the instruction decoder to perform one or more iterations of the SHA-2 hash algorithm on the SHA-2 state specified by the first operand and the plurality of messages and round constants specified by the second operand, in response to the first instruction.
-
公开(公告)号:US20240333472A1
公开(公告)日:2024-10-03
申请号:US18194270
申请日:2023-03-31
Applicant: Intel Corporation
Inventor: Raghavan Kumar , Sanu Mathew , Avinash V. Varna , Kirk S. YAP
IPC: H04L9/06
CPC classification number: H04L9/0631 , H04L9/0637
Abstract: An apparatus of an aspect includes a substitution box (S-box) circuitry. The S-box circuitry includes multiplicative inverse circuitry. The multiplicative inverse circuitry is to receive an 8-bit input in Galois field and is to generate a corresponding 8-bit output in Galois field. The 8-bit output is to be a multiplicative inverse of the 8-bit input as long as there has been no error in the generation of the 8-bit output. The apparatus also includes error detection circuitry to receive the 8-bit input and that is coupled with the S-box circuitry to receive the 8-bit output. The error detection circuitry to detect whether an error has occurred in the generation of the 8-bit output based at least in part on whether the 8-bit output is the multiplicative inverse of the 8-bit input. Other apparatus, methods, and systems are also disclosed.
-
-
-
-
-
-
-
-
-