Method and apparatus for performing an authentication after cipher operation in a network processor
First Claim
Patent Images
1. A network processor, comprising:
- an authentication buffer to store authentication data including at least one of ciphered-network-packet data subject to authentication, network packet data subject only to authentication, and network-packet data subject to ciphering and authentication, wherein the authentication buffer includes a circular first-in-first-out (FIFO) arrangement; and
at least one authentication core coupled to the authentication buffer to authenticate the authentication data from the authentication buffer.
1 Assignment
0 Petitions
Accused Products
Abstract
A method and apparatus is described for processing of network data packets by a network processor having cipher processing cores and authentication processing cores which operate on data within the network data packets, in order to provide a one-pass ciphering and authentication processing of the network data packets.
51 Citations
18 Claims
-
1. A network processor, comprising:
-
an authentication buffer to store authentication data including at least one of ciphered-network-packet data subject to authentication, network packet data subject only to authentication, and network-packet data subject to ciphering and authentication, wherein the authentication buffer includes a circular first-in-first-out (FIFO) arrangement; and
at least one authentication core coupled to the authentication buffer to authenticate the authentication data from the authentication buffer. - View Dependent Claims (2, 3, 4)
-
-
5. A network, comprising:
a network processor having;
an authentication buffer to store authentication data including at least one of ciphered-network-packet data subject to authentication, network packet data subject only to authentication, and network packet data subject to ciphering and authentication, wherein the authentication buffer includes a circular first-in-first-out (FIFO) arrangement; and
at least one authentication core coupled to the authentication buffer to authenticate the authentication data from the authentication buffer. - View Dependent Claims (6, 7, 8)
-
9. A method of authenticating network packet data, comprising:
-
moving to an authentication buffer authentication data including at least one of ciphered-network-packet data subject to authentication, network packet data subject only to authentication, and network packet data subject to ciphering and authentication, wherein the authentication buffer includes a circular first-in-first-out (FIFO) arrangement; and
moving to an authentication core a block of data from the authentication buffer. - View Dependent Claims (10, 11, 12, 13)
-
-
14. A computer program medium having computer readable code thereon to authenticate network packet data, the medium comprising:
-
instructions for moving to an authentication buffer authentication data including at least one of ciphered-network-packet data subject to authentication, network packet data subject only to authentication, and network packet data subject to ciphering and authentication, wherein the authentication buffer includes a circular first-in-first-out (FIFO) arrangement; and
instructions for moving to an authentication core a block of data from the authentication buffer. - View Dependent Claims (15, 16, 17, 18)
-
Specification