ATE387773T1 - Verfahren und vorrichtung für eine hadwareimplementierung der schlüsselexpansionsfunktion mit wenig speicher - Google Patents

Verfahren und vorrichtung für eine hadwareimplementierung der schlüsselexpansionsfunktion mit wenig speicher

Info

Publication number
ATE387773T1
ATE387773T1 AT04733860T AT04733860T ATE387773T1 AT E387773 T1 ATE387773 T1 AT E387773T1 AT 04733860 T AT04733860 T AT 04733860T AT 04733860 T AT04733860 T AT 04733860T AT E387773 T1 ATE387773 T1 AT E387773T1
Authority
AT
Austria
Prior art keywords
key
key expansion
expansion function
expansion
memory
Prior art date
Application number
AT04733860T
Other languages
English (en)
Inventor
Bonnie Sexton
Original Assignee
Nxp Bv
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nxp Bv filed Critical Nxp Bv
Application granted granted Critical
Publication of ATE387773T1 publication Critical patent/ATE387773T1/de

Links

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F1/00Details not covered by groups G06F3/00 - G06F13/00 and G06F21/00
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0618Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
    • H04L9/0631Substitution permutation network [SPN], i.e. cipher composed of a number of stages or rounds each involving linear and nonlinear transformations, e.g. AES algorithms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/12Details relating to cryptographic hardware or logic circuitry
    • H04L2209/122Hardware reduction or efficient architectures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/12Details relating to cryptographic hardware or logic circuitry
    • H04L2209/125Parallelization or pipelining, e.g. for accelerating processing of cryptographic operations

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)
  • Communication Control (AREA)
  • Input From Keyboards Or The Like (AREA)
AT04733860T 2003-05-23 2004-05-19 Verfahren und vorrichtung für eine hadwareimplementierung der schlüsselexpansionsfunktion mit wenig speicher ATE387773T1 (de)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
US47320903P 2003-05-23 2003-05-23

Publications (1)

Publication Number Publication Date
ATE387773T1 true ATE387773T1 (de) 2008-03-15

Family

ID=33476990

Family Applications (1)

Application Number Title Priority Date Filing Date
AT04733860T ATE387773T1 (de) 2003-05-23 2004-05-19 Verfahren und vorrichtung für eine hadwareimplementierung der schlüsselexpansionsfunktion mit wenig speicher

Country Status (7)

Country Link
EP (1) EP1629626B1 (de)
JP (1) JP2007500376A (de)
KR (1) KR20060014420A (de)
CN (1) CN1795637B (de)
AT (1) ATE387773T1 (de)
DE (1) DE602004012096T2 (de)
WO (1) WO2004105306A1 (de)

Families Citing this family (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20050087271A (ko) * 2004-02-26 2005-08-31 삼성전자주식회사 가변 키 길이를 가지는 초기 라운드 키에 대응하는 암호라운드 키와 복호 라운드 키를 선택적으로 발생하는 키스케쥴 장치
JP4939305B2 (ja) * 2007-05-25 2012-05-23 ルネサスエレクトロニクス株式会社 暗号/復号装置
KR100949538B1 (ko) 2008-09-09 2010-03-25 한국전자통신연구원 Aes 라인달 알고리즘을 이용하는 암호화 및 복호화 장치와 그 방법
CN101478392B (zh) * 2009-01-19 2010-12-08 山东大学 利用vlsi实现128位密钥长度aes算法的装置
KR101315683B1 (ko) * 2012-03-12 2013-12-13 이니텍(주) 데이터 사이즈 및 형태 변경이 없는 암호화 인코딩 및 복호화 인코딩 방법
US11838402B2 (en) 2019-03-13 2023-12-05 The Research Foundation For The State University Of New York Ultra low power core for lightweight encryption
CN115622745B (zh) * 2022-09-21 2025-09-05 深圳市优必选科技股份有限公司 加密方法、装置、终端设备及计算机可读存储介质
CN120729511B (zh) * 2025-08-25 2025-11-07 上海伊世智能科技有限公司 一种车载安全mcu国密sm4轮密钥预扩展方法

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6947560B1 (en) * 1999-04-26 2005-09-20 Telefonaktiebolaget L M Ericsson (Publ) Method and device for effective key length control
KR100525389B1 (ko) * 2001-01-17 2005-11-02 엘지전자 주식회사 실시간 입력 스트림의 암호화/복호화 장치
EP1246389B1 (de) * 2001-03-27 2005-01-05 Amphion Semiconductor Limited Vorrichtung zur wählbaren Ver- bzw. Entschlüsselung von Daten
GB0121793D0 (en) * 2001-09-08 2001-10-31 Amphion Semiconductor Ltd An apparatus for generating encryption/decryption keys

Also Published As

Publication number Publication date
CN1795637B (zh) 2011-06-01
JP2007500376A (ja) 2007-01-11
DE602004012096D1 (de) 2008-04-10
CN1795637A (zh) 2006-06-28
KR20060014420A (ko) 2006-02-15
EP1629626A1 (de) 2006-03-01
DE602004012096T2 (de) 2009-03-26
EP1629626B1 (de) 2008-02-27
WO2004105306A1 (en) 2004-12-02

Similar Documents

Publication Publication Date Title
US8094816B2 (en) System and method for stream/block cipher with internal random states
CN100379194C (zh) 存储器加密
US5317638A (en) Performance enhancement for ANSI X3.92 data encryption algorithm standard
CN101034978B (zh) 用于执行抵抗密码攻击的密码过程的方法和计算设备、以及数据处理系统
CN101006677B (zh) 用于实施加密运算的方法和装置
CA3007348A1 (en) Fast format-preserving encryption for variable length data
EP1191737A3 (de) Vorrichtung zur Verschlüsselung von Daten
CN1989726A (zh) 用于执行加密计算的方法和装置
US12388623B2 (en) Method for processing encrypted data
EP3437248A1 (de) Schlüsselaktualisierung für maskierte schlüssel
EP3272060B1 (de) Datenstromblockverschlüsselung
ATE387773T1 (de) Verfahren und vorrichtung für eine hadwareimplementierung der schlüsselexpansionsfunktion mit wenig speicher
EP4307155A1 (de) Verfahren und schaltung zum schutz einer elektronischen vorrichtung vor einem seitenkanalangriff
US7720225B2 (en) Table splitting for cryptographic processes
EP3832945B1 (de) System und verfahren zum schutz von speicherverschlüsselung gegen vorlagenangriffe
WO2004102870A3 (en) A hardware implementation of the mixcolumn/ invmixcolumn functions
CN109635599B (zh) 数据加密方法、解密方法、保护装置、片内存储器及芯片
US20040096059A1 (en) Encryption apparatus with parallel Data Encryption Standard (DES) structure
CN117834119A (zh) 加密处理设备及其加密处理方法和存储介质
Al-Qashbari et al. Enhancing performance through dynamic AES round keys and adaptive data shifting techniques
Patel et al. Triple security of information using steganography and cryptography
CN114676452A (zh) 一种数据安全存储方法和装置
KR20030083326A (ko) 암호화 방법
Mukhopadhyay et al. On the effectiveness of TMTO and exhaustive search attacks
CN121690637A (zh) 基于隐码防护的加密方法、装置、电子设备和存储介质

Legal Events

Date Code Title Description
RER Ceased as to paragraph 5 lit. 3 law introducing patent treaties