Apparatus for implementing 128 bit cipher key length AES algorithm by VLSI
A technology of key length and algorithm, applied in the field of information encryption, it can solve the problems of infrequent key changes and not suitable for power-sensitive applications, so as to solve the speed bottleneck, high flexibility and portability, and reduce the number of chips. area effect
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0071] Embodiment 1: (hardware embodiment)
[0072] Embodiment 1 of the present invention such as figure 1 As shown, it includes a microprocessor interface module 3, a key expansion module 1, an encryption operation module 5, a decryption operation module 4, a key round number selector 2, a data output selector 7 and a state output selector 6, and is characterized in that The microprocessor interface module 3 is connected with the microprocessor, and receives commands and data from the microprocessor; the microprocessor interface module 3 is respectively connected with the key expansion module 1, the encryption operation module 5, the decryption operation module 4, and the key wheel Number selector 2, data output selector 7 and state output selector 6 are connected to control the operation of key expansion module 1, encryption operation module 5 and decryption operation module 4, and are responsible for controlling key round number selector 2, The state output selector 6 and ...
Embodiment 2
[0076] Embodiment 2: (method embodiment)
[0077] The operation method of the microprocessor interface module in the above-mentioned device, such as figure 2 As shown, the steps are as follows:
[0078] 8: If a write data command is received, store the data in the internal data register;
[0079] 9: If the key expansion command is received, output the start signal to the key expansion module; output the control signal to the status output selector, and gate the status output of the key expansion module;
[0080] 10: If an encryption operation command is received, output the start signal to the encryption operation module; output the control signal to the key round number selector, and select the key round number output of the encryption operation module; output the control signal to the status output selector, and select Encryption operation module status output;
[0081] 11: If the decryption operation instruction is received, output the start signal to the decryption ope...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 