Method and apparatus for performing secure wireless communication with reduced bus traffic
First Claim
1. A method for performing secure wireless communication with reduced bus traffic in a computer system, comprising the steps of:
- providing a decryption table having a plurality of entries each of which includes a plurality of sections to store at least one check item, at least one characteristic value, a secret key and a cipher type;
responsive to receipt of an encrypted packet, sequentially selecting one entry from the decryption table;
extracting at least one field to be checked from the encrypted packet contingent on the check item in the selected entry; and
upon successful matching of the extracted field of the encrypted packet to the characteristic value in the selected entry, applying the secret key and the cipher type in the selected entry to decrypt the encrypted packet;
wherein the check item indicates which field of the encrypted packet needs to be compared with the characteristic value in the same entry of the decryption table.
2 Assignments
0 Petitions
Accused Products
Abstract
A method and apparatus for performing secure communication in a WLAN environment. According to the invention, a decryption table is provided, which includes several entries each having a number of sections to store at least one check item, at least one characteristic value, a secret key and a cipher type. The check item is employed to indicate which field of the encrypted packet needs to be compared with the characteristic value in the same entry of the decryption table. In response to receipt of an encrypted packet, one entry in sequence is selected from the decryption table. Then at least one field to be checked is extracted from the encrypted packet contingent on the check item in the selected entry. Upon successful matching of the extracted field to the characteristic value in the selected entry, the secret key and the cipher type in this entry are applied to decrypt the encrypted packet.
-
Citations
12 Claims
-
1. A method for performing secure wireless communication with reduced bus traffic in a computer system, comprising the steps of:
-
providing a decryption table having a plurality of entries each of which includes a plurality of sections to store at least one check item, at least one characteristic value, a secret key and a cipher type;
responsive to receipt of an encrypted packet, sequentially selecting one entry from the decryption table;
extracting at least one field to be checked from the encrypted packet contingent on the check item in the selected entry; and
upon successful matching of the extracted field of the encrypted packet to the characteristic value in the selected entry, applying the secret key and the cipher type in the selected entry to decrypt the encrypted packet;
wherein the check item indicates which field of the encrypted packet needs to be compared with the characteristic value in the same entry of the decryption table. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. An apparatus for performing secure wireless communication with reduced bus traffic in a computer system, comprising:
-
a decryption table configured to comprise a plurality of entries each of which includes a plurality of sections to store at least one check item, at least one characteristic value, a secret key and a cipher type; and
a cryptography engine with access to the decryption table, including;
means, responsive to receipt of an encrypted packet, for extracting from the encrypted packet at least one field to be checked contingent on the check item in a currently selected entry sequentially chosen from the decryption table;
means for matching the extracted field of the encrypted packet to the characteristic value in the currently selected entry; and
means, upon successful matching, for applying the secret key and the cipher type in the currently selected entry to decrypt the encrypted packet;
wherein the check item indicates which field of the encrypted packet needs to be compared with the characteristic value in the same entry of the decryption table. - View Dependent Claims (8, 9, 10, 11, 12)
-
Specification