Abstract:
PROBLEM TO BE SOLVED: To provide the Advanced Encryption Standard (AES) that is a symmetric block cipher capable of encrypting and decrypting information. SOLUTION: Encryption (cipher) performs a series of transformations (Shift Rows, Substitute Bytes, Mix Columns) using a secret key (cipher key) to transform intelligible data referred to as "plaintext" into an unintelligible form referred to as "cipher text". The transformations (Inverse Shift Rows, Inverse Substitute Bytes, Inverse Mix Columns) in the inverse cipher (decryption) are the inverse of the transformations in the cipher. Encryption and decryption is performed efficiently through the use of instructions that perform the series of transformations. Combinations of these instructions allow the isolation of the transformations (Shift Rows, Substitute Bytes, Mix Columns, Inverse Shift Rows, Inverse Substitute Bytes, Inverse Mix Columns) to be obtained. COPYRIGHT: (C)2009,JPO&INPIT
Abstract:
PROBLEM TO BE SOLVED: To optimize advanced encryption standard (AES) encryption and decryption in parallel modes of operation. SOLUTION: The throughput of an encryption/decryption operation is increased in a system having a pipelined execution unit. Different independent encryptions (decryptions) of different data blocks may be performed in parallel by despatching an AES round instruction in each cycle. COPYRIGHT: (C)2009,JPO&INPIT
Abstract:
PROBLEM TO BE SOLVED: To provide a method and device for performing a cyclic redundancy check (CRC) operation on a data block by using a plurality of different n-bit polynomials. SOLUTION: A flexible CRC instruction performs a CRC operation by using a programmable n-bit polynomial. The n-bit polynomial is provided to the CRC instruction by storing the n-bit polynomial in one of two operands. COPYRIGHT: (C)2011,JPO&INPIT
Abstract:
PROBLEM TO BE SOLVED: To efficiently solve simultaneous linear equations that may be used to estimate motion between frames in a video file for converting frame rates. SOLUTION: A method includes the steps for: multiplying a matrix which is a representation of large and sparse simultaneous linear equations, which is used to estimate motion between frames of a video file, by a vector which is a first vector estimation of a solution to the simultaneous linear equations and has a plurality of elements arranged in a certain order; generating a second vector estimation which is a solution to the simultaneous linear equations and is a product of the multiplying; and setting the solution to the simultaneous linear equations when the first and second vector estimations differ by less than a predetermined amount, wherein the matrix is multiplied by the respective elements of the vector in an order different from the order in which the elements are arranged in the vector, wherein the plurality of elements in the vector are multiplied in parallel. COPYRIGHT: (C)2010,JPO&INPIT
Abstract:
PROBLEM TO BE SOLVED: To provide an Advanced Encryption Standard (AES) encryption instruction, having two operands, encrypting/decrypting data in at least two modes. SOLUTION: The present invention relates to a machine-readable medium which may have stored thereon an instruction, which, when executed by a machine, causes the machine to perform a method. The method may include combining a first operand of the instruction and a second operand of the instruction to produce a result. The result may be encrypted using a key in accordance with an Advanced Encryption Standard (AES) algorithm to produce an encrypted result. The method may also include placing the encrypted result in a location of the first operand of the instruction. COPYRIGHT: (C)2009,JPO&INPIT
Abstract:
A method and apparatus for protecting against hardware attacks on system memory is provided. A mode of operation for block ciphers enhances the standard XTS-AES mode of operation to perform memory encryption by extending a tweak to include a "time stamp" indicator. An incrementing mechanism using the "time stamp" indicator generates a tweak which separates different contexts over different times such that the effect of "Type 2 replay attacks" is mitigated.
Abstract:
A technique of determining a message residue includes accessing a message and simultaneously determining a set of modular remainders with respect to a polynomial for different respective segments of the message. The technique also includes determining a modular remainder with respect to the polynomial for the message based on the set of modular remainders and a set of constants determined prior to accessing the message. The modular remainder with respect to the polynomial for the message is stored in a memory.
Abstract:
A method and apparatus to compute a Q syndrome for RAID 6 through the use of AES operations is provided. In an embodiment, the result of GF multiplication performed using the AES operations allows RAID-6 support to be provided without the need for a dedicated RAID controller.
Abstract:
Embodiments of an invention for measuring a secure enclave are disclosed. In one embodiment, a processor includes an instruction unit and an execution unit. The instruction unit is to receive a first, a second, and a third instruction. The execution unit is to execute the first, the second, and the third instruction. Execution of the first instruction includes initializing a measurement field in a control structure of a secure enclave with an initial value. Execution of the second instruction includes adding a region to the secure enclave. Execution of the third instruction includes measuring a subregion of the region.