Unlock instant, AI-driven research and patent intelligence for your innovation.

Cipher-chip key rapid-changing method

A cryptographic chip and replacement method technology, which is applied in the field of rapid replacement of group cryptographic chip keys, can solve problems such as errors in encryption and decryption results, slow key replacement speed, etc., and achieve the effect of faster replacement speed

Inactive Publication Date: 2008-10-22
NO 30 INST OF CHINA ELECTRONIC TECH GRP CORP
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The main disadvantages of this key replacement method are: ①The key replacement speed is slow: because the key replacement must wait for the previous set of data to complete the encryption and decryption operations before proceeding; ②It is not suitable for pipeline encryption and decryption operations: For decryption work, several groups of data are encrypted and decrypted at the same time. When the previous group of data has not completed the encryption and decryption operation, the subsequent data has begun to be encrypted and decrypted. If the key is replaced at this time, the encryption and decryption results will inevitably lead to errors.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Cipher-chip key rapid-changing method
  • Cipher-chip key rapid-changing method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0012] A method for quickly replacing keys on a cryptographic chip with four-level cryptographic round function operations, through a pipeline on the cryptographic chip between data input and output of encryption and decryption results, sequentially connected in series by four-level cryptographic round function algorithm modules Realization, wherein: each level of cipher round function algorithm module is connected with its corresponding working key storage of the level, and the working key storage has two read addresses A and B, which are selected and input by the algorithm level control, and according to this address Output the key required for operation to the cryptographic algorithm round function module of this level, and the key replacement of each level can be realized by issuing a key change command to the memory read address B of each level at any time. In this example, the key required for each level of operation should be pre-stored in the corresponding key memory an...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Current method for changing secret key must wait till operation for encrypting and decrypting data of previous group is completed. Thus, speed of changing secret key is slow, and pipelining is not possible to implement. In the invention, changing secret key is realized by pipeline in crypto chip composed of modules of cipher wheel function algorithm in each stage cascaded in sequence. The said module in each stage is connected to corresponding working key storage in each stage. The characters are that there are two read addresses A and B in each stage. Control signal in algorithm level controls and selects the output for controlling working key storage so as to provide needed secret key for operation of cipher wheel function algorithm in the stage. Command for changing secret key is sent to a read address B of storage in each stage so as to realize change of secret key in each stage. The invention possesses advantages of pipeline operation, fast and convenient.

Description

technical field [0001] The invention relates to a cryptographic chip design technology, in particular to a fast replacement method for a group cryptographic chip key. Background technique [0002] In order to facilitate the implementation of software and hardware, the block cipher algorithm is generally designed with a round function. Under the action of the key, the round function iterates N times to complete an encryption operation. The size of N is determined according to the complexity of the round function. For example, the DES algorithm, N is 16; and AES algorithm, N is 12 to 14. In block cipher chip design, in order to reduce the size of the chip, the block cipher algorithm chip generally only implements one or several levels of cryptographic round function operations. Through the control of the control circuit, the round function is iterated N times to complete an encryption operation. [0003] In the existing technology, in order not to affect the encryption and de...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/18H04L9/00
Inventor 吕永其尤坤王辉陆建
Owner NO 30 INST OF CHINA ELECTRONIC TECH GRP CORP