Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Apparatus and method for providing configurable cryptographic key size

A cipher key and cipher technology, applied in the field of microelectronics, can solve problems such as reducing system reliability and increasing costs

Active Publication Date: 2005-08-17
VIA TECH INC
View PDF0 Cites 25 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the cryptographic co-processor adds cost to the system configuration, requires additional power, and reduces the reliability of the system

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Apparatus and method for providing configurable cryptographic key size
  • Apparatus and method for providing configurable cryptographic key size
  • Apparatus and method for providing configurable cryptographic key size

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0066] The following describes illustrative examples of the invention that can be made or used using known techniques for specific applications and needs herein. However, the various modifications mentioned in the embodiments are used to highlight differences from known technologies, and this general principle can be applied to other embodiments. Therefore, the present invention is not limited to specific examples.

[0067] In view of the above discussion of cryptographic operations and related techniques used by today's computer systems to encrypt / decrypt data, these techniques and their associated limitations will be discussed in figure 2 Continue to discuss, and then the present invention will also be based on Figure 3 to Figure 16 to be discussed. The present invention provides an apparatus and method for performing cryptographic operations in today's computer systems, which exhibit excellent performance characteristics through the main mechanism and more satisfy the a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention provides an apparatus and method for performing cryptographic operations. In one embodiment, an apparatus is provided for performing cryptographic operations. The apparatus includes a cryptographic instruction, keygen logic, and execution logic. The cryptographic instruction is received by a computing device as part of an instruction flow executing on the computing device. The cryptographic instruction prescribes one of the cryptographic operations, and also prescribes that a provided cryptographic key be expanded into a corresponding key schedule for employment during execution of the one of the cryptographic operations. The keygen logic is operatively coupled to the cryptographic instruction. The keygen logic directs the computing device to expand the provided cryptographic key into the corresponding key schedule. The execution logic is coupled to the keygen logic. The execution logic expands the provided cryptographic key into the corresponding key schedule.

Description

technical field [0001] The present invention relates to the field of microelectronics, and in particular to a device and method for performing cryptographic operations in a computing device, wherein the computing device expands a provided cryptographic key into a corresponding key schedule for performing cryptographic operations . Background technique [0002] Early computer systems operated independently of other computer systems, whereby the input data required for applications running on the computer system were either stored in the computer system or provided by the application programmer at the time of execution; The execution result of the application program and the output data generated are generally in the form of printed paper, or files written into tapes, disks, or other types of storage devices of the computer system. The output file can be used as an input file for an application program later executed on the same computer system, or, when the output data was p...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F1/00G06F21/00H04L9/00H04L9/06H04L9/08
CPCH04L9/12H04L9/0637H04L9/0618G06F21/72H04L2209/125H04L9/0631H04L9/06H04L2209/24G06F9/30007
Inventor G·葛兰亨利汤玛斯A·克里斯宾提摩西A·伊里亚德泰瑞帕德斯
Owner VIA TECH INC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products