Cryptographic accelerator

Cryptography – Particular algorithmic function encoding

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C380S029000, C380S037000, C380S259000, C713S189000

Reexamination Certificate

active

06831979

ABSTRACT:

BACKGROUND
1. Field
The present invention relates to the field of cryptography. More particularly, the present invention relates to a cryptographic accelerator.
2. General Background
Over the last decade, computers have become an important product for both commercial and personal use, in part due to their versatility. For example, computers are commonly used as a vehicle to transfer information over a communication link such as private networks or public networks. “Private networks” include any network having restricted access (e.g., a local area network), while “public networks” include any network allowing access to the public at large such as the Internet for example. In many situations, it may be desirable to encrypt digital information prior to transmission over the communication link so that the transmitted information is clear and unambiguous to a targeted recipient, but is incomprehensible to any illegitimate interlopers.
In 1981, the National Institute of Standards and Technology approved a data security process referred to as the “Data Encryption Standard.” The Data Encryption Standard (DES) details the use of a cryptographic function, referred to as a “Data Encryption Algorithm” (DEA), for encrypting and decrypting digital information by a single, unique key. To ensure security of the transmitted information, the nature of the key is held in confidence between the source and the targeted recipient. DES and DEA are described in a Federal Information Processing Standards Publication 46-2 (FIPS PUB 46-2) entitled “Data Encryption Standard (DES)” which was published on or around Dec. 30, 1993.
In general, DEA features three (3) types of cryptographic operations; namely, bit permutations (or sometimes referred to as bit swapping), exclusive-OR (XOR) operations and table lookups. A “bit permutation” is a transposition of bits such that a bit pattern of input information differs from the bit pattern of output information. While XOR operations and table lookups can be adequately performed by software, bit permutations are more difficult to replicate in software.
Concise software code for emulating bit permutations is difficult to produce because there is no mathematical relationship between the input bit pattern and the output bit pattern. Instead, to achieve transposition, sub-programs are coded to test individual bits in the input pattern and then set reset bits in the output pattern, which greatly increases the number of instructions needed for a software implementation of DEA as shown in Table A.
TABLE A
NUMBER OF
PROCESSOR
OPERATIONS PER
INSTRUCTIONS
DES OPERATION
ENCRYPTION
PER OPERATION
Initial Permutation
1
128
Reverse Initial Permutation
1
128
Key Bit Selection PC-1
1
112
Key Rotate
16 
 96
Key Bit Selection PC-2
16 
1792 
XOR
16 
 16
E-Bit Selection
16 
256
S Table Lookup
128 
128
Bit Permutation
16
1024 
Total
3680 
As a result, encryption/decryption software in accordance with DEA is slow and costly due to increased programming costs and increased memory size to accommodate the complex software. Hence, it would be desirable to create a cryptographic accelerator which includes hardware to perform bit permutations and other instruction intensive operations while other operations are performed by software as normal. This would avoid substantial modification of current electronic systems and enhance the speed of the cryptographic accelerator.
SUMMARY
Briefly, one embodiment of the present invention includes a cryptographic accelerator comprising (i) a selector and (ii) a plurality of buses coupled to the selector. Herein, at least one of the plurality of buses includes signal lines routed to perform a bit permutation operation on incoming information. The bit permutation operation is one of a plurality of operations associated with a symmetric key function.


REFERENCES:
patent: 4177355 (1979-12-01), Fleisher et al.
patent: 4275265 (1981-06-01), Davida et al.
patent: 4352952 (1982-10-01), Boone et al.
patent: 4543646 (1985-09-01), Ambrosius, III et al.
patent: 4764959 (1988-08-01), Watanabe et al.
patent: 5473692 (1995-12-01), Davis
patent: 5539828 (1996-07-01), Davis
patent: 5568552 (1996-10-01), Davis
patent: 5633932 (1997-05-01), Davis et al.
patent: 5751809 (1998-05-01), Davis et al.
patent: 5757915 (1998-05-01), Aucsmith et al.
patent: 5796840 (1998-08-01), Davis
patent: 5802176 (1998-09-01), Audebert
patent: 5805706 (1998-09-01), Davis
patent: 5805712 (1998-09-01), Davis
patent: 5828753 (1998-10-01), Davis
patent: 6028939 (2000-02-01), Yin
patent: 6320964 (2001-11-01), Callum

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Cryptographic accelerator does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Cryptographic accelerator, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Cryptographic accelerator will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-3287093

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.