Key recovery mechanism for cryptographic systems

A cryptographic system and key technology, applied in the field of cryptographic systems, can solve problems such as damage to keys and their scheduling secrecy

Active Publication Date: 2012-01-25
RAMBUS INC
View PDF4 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This can result in additional handling and manipulation of cryptographic keys or key schedules
Th

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Key recovery mechanism for cryptographic systems
  • Key recovery mechanism for cryptographic systems
  • Key recovery mechanism for cryptographic systems

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0018] Implementation of AES Encryption Engine

[0019] figure 1 is a block diagram of an example implementation of an Advanced Encryption Standard (AES) cryptographic engine 100 . Engine 100 may perform AES calculations, which may include AES encryption and decryption operations on blocks of electronic data to generate ciphertext and plaintext, respectively. Engine 100 may be included in a cryptographic system.

[0020] like figure 1 As shown in , the engine 100 includes registers that can provide inputs to the AES block 102 that enable and control the AES encryption and decryption operations performed by the AES block 102 . Registers may provide data (eg, ciphertext or plaintext) for AES operations. The registers may provide cryptographic key data for use in AES encryption and decryption operations. In addition, the registers may provide result and status information related to the AES operations performed by the AES block 102 . A register may provide the resulting dat...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A cryptographic system can include a register containing a key and a processor coupled to the register. The processor can be operable for performing a first encrypting operation, where the encrypting operation includes computing a key schedule using the register as a workspace. At the end of the first encrypting operation, the key is recovered from the register for use in a second encrypting operation.

Description

technical field [0001] In general, the subject matter of this application relates to cryptographic systems. Background technique [0002] The Advanced Encryption Standard (AES) is a National Institute of Standards and Technology technical specification for cryptographic algorithms that protect electronic data used in symmetric-key cryptography. The AES algorithm encrypts (encryptor) and decrypts (decryptor) information in the form of electronic data. Encryption converts electronic data into an incomprehensible form called ciphertext; decrypting the ciphertext converts electronic data back to its original form called plaintext. The AES algorithm is an iterative symmetric key block cipher capable of encrypting and decrypting electronic data in 128-bit blocks using cryptographic keys of 128, 192, and 256 bits. [0003] A public key cryptographic compiler can use a pair of cryptographic keys. However, the AES algorithm uses the same cryptographic key to encrypt and decrypt el...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/06
CPCH04L2209/24H04L2209/122H04L9/0631G09C1/00
Inventor 文森特·杜帕丘斯米歇尔·杜盖
Owner RAMBUS INC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products