Check patentability & draft patents in minutes with Patsnap Eureka AI!

Method and apparatus to encrypt plaintext data

A technology of plaintext data and temporary data, applied in encryption devices with shift registers/memory, digital transmission systems, secure communication devices, etc., can solve problems such as technical inefficiency

Inactive Publication Date: 2016-02-10
QUALCOMM INC
View PDF6 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Unfortunately, current techniques are often inefficient and may require stronger protection levels, higher throughput at the same level of security without a significant increase in power, and area requirements in terms of hardware implementation

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and apparatus to encrypt plaintext data
  • Method and apparatus to encrypt plaintext data
  • Method and apparatus to encrypt plaintext data

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0015] The word "exemplary" or "example" is used herein to mean "serving as an example, instance, or illustration." Any aspect or embodiment described herein as "exemplary" or as an "example" is not necessarily to be construed as preferred or advantageous over other aspects or embodiments.

[0016] Embodiments of the invention relate to techniques to provide enhanced mechanisms for protecting data stored in memory. In particular, methods and procedures for extending the functionality of block ciphers to enhance memory encryption are described. Additionally, these techniques can also improve performance, throughput, and power consumption, as will be described below. These techniques can also be used to improve performance, throughput and power consumption for the purpose of secure data storage transmitted across (wired or wireless) networks.

[0017] In one embodiment, an encryption scheme is employed in which a series of L plaintext data input blocks are encrypted using an e...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Disclosed is an apparatus and method for encrypting plaintext data. The method includes: receiving at least one plaintext data input; applying a Nonce through a function to the at least one plaintext data input to create Nonced plaintext data outputs and / or to intermediate values of a portion of an encryption function applied to the at least one plaintext data input to create intermediate Nonced data outputs; and applying the encryption function to at least one of the Nonced plaintext data outputs and / or the intermediate Nonced data outputs to create encrypted output data. The encrypted output data is then transmitted to memory.

Description

technical field [0001] The invention relates to a method and equipment for encrypting plaintext data and decrypting corresponding ciphertext data. Background technique [0002] The use of memory analyzers presents a greater threat to the integrity and confidentiality of the distribution content. Even when great care is taken to protect the data contained within the code, the contents of memory may still be captured by bus sniffing. For example, this can be used to leak the original content after it has been decrypted for rendering in a secure environment, even if the original content is distributed in encrypted form. This can be achieved by "reading" electrical signals corresponding to writes to the memory. Other more sophisticated attacks could even replay these signals to trick the processor into reading and processing data of the attacker's choice. [0003] Content providers often have specific requirements for the handling of original content. At a minimum, the conte...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/06
CPCH04L9/0618H04L2209/08H04L2209/34
Inventor R·阿万奇
Owner QUALCOMM INC
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More