Supercharge Your Innovation With Domain-Expert AI Agents!

Acceleration method and apparatus for GHASH computation in authenticated encryption Galois counter mode

A technology for authenticating encryption and accelerating devices, which is used in user identity/authority verification, electrical components, transmission systems, etc.

Active Publication Date: 2011-04-27
IND TECH RES INST
View PDF1 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This m+n+1 working clock will cause hardware delay (latency of hardware)

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Acceleration method and apparatus for GHASH computation in authenticated encryption Galois counter mode
  • Acceleration method and apparatus for GHASH computation in authenticated encryption Galois counter mode
  • Acceleration method and apparatus for GHASH computation in authenticated encryption Galois counter mode

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0031] The GHASH function has three inputs, the three inputs are the additional authentication data A and ciphertext C defined in the GCM specification, and the HASH key value H. Without loss of generality, in the example described below, a block cipher is a 128-bit block, the length len(A) of the additional authentication data A is m, and the length len(C) of the ciphertext C is n. In other words, the GCM uses a 128-bit block cipher to provide both authentication and encryption, and the additional authentication material A and ciphertext C are divided into m and n 128-bit blocks, respectively.

[0032] If the operation of GHASH in GCM is performed by using the equation (2) of the known technology, it takes m+n+1 working clocks to obtain the operation result of the GHASH function.

[0033] According to the present invention, the acceleration method of GHASH operation in the GCM of authentication encryption, its flow example is image 3 shown. First, the final output of the G...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an acceleration method and a device of a GHASH calculation in a certified encrypted Galois Counting Mode (GCM). The method of the invention comprises the following steps: first of all, according to the additional certification information and ciphertext as well as key GHASH value which are defined in the GCM specification, the final output results of a GHASH function are expanded into the composition of three medium values which are then calculated parallel, and finally the output results of the GHASH function is calculated. If the additional certification information and the ciphertext respectively have m and n blocks, only max (m, n) plus 1 work clocks are needed in the GHASH calculation implementation of the GCM. According to the acceleration method and the device, the input sequences of the certification information and the ciphertext are independent; the input sequences of the certification information and the ciphertext blocks can be also out of order, so the GCM has more flexibility in the application thereof.

Description

technical field [0001] The present invention relates to a method and device for accelerating GHASH operation in authenticated encryption Galois Counter Mode (GCM). Background technique [0002] GCM is an operation mode of a block cipher system that provides authenticated encryption. Its main feature is that it can provide confidentiality and integrity at the same time at high processing speed. Among them, the GCM-Advanced Encryption Standard (GCM-Advanced Encryption Standard, GCM-AES) is the most common, and is mainly used in a high-speed transmission environment. [0003] The data encryption of GCM is achieved by counting mode (CTR mode), and the authentication is achieved by using a Hertzian function based on Galois Field (GF). This authentication encryption has four inputs, which are secret key (secret key) K, initialization vector (initialization vector) IV, plain text (plaintext) P, and additional authentication data (additional authenticated data, AAD) A . P is div...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L9/32
Inventor 颜志旭
Owner IND TECH RES INST
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More