Fast ciphering key search for WLAN receivers
First Claim
1. A WLAN (Wireless Local Area Network) receiver comprising:
- a ciphering key management unit (100) for controlling use of cipher keys for decrypting received data, wherein said ciphering key management unit comprises a memory unit (130) for storing a hash table (110) having a first (200) and a second (205-220, 600) table portion, said first table portion storing transmitter address data, said second table portion storing at least one cipher key, wherein said ciphering key management unit is arranged for determining whether a transmitter address matches transmitter address data in said first table portion, and if so, determining a corresponding cipher key stored in said second table portion for use in decrypting said received data.
6 Assignments
0 Petitions
Accused Products
Abstract
A ciphering key management technique for use in a WLAN receiver is provided where a hash table is stored that has a first and a second table portion. The first table portion stores transmitter address data and the second table portion stores at least one cipher key. It is determined whether a transmitter address matches transmitter address data in the first table portion, and if so, a corresponding cipher key stored in the second table portion is determined for use in decrypting the received data. The hash table technique allows for a fast search for the correct cipher key. Embodiments are described that allow for dynamically adding and removing keys without blocking the search.
30 Citations
64 Claims
-
1. A WLAN (Wireless Local Area Network) receiver comprising:
-
a ciphering key management unit (100) for controlling use of cipher keys for decrypting received data, wherein said ciphering key management unit comprises a memory unit (130) for storing a hash table (110) having a first (200) and a second (205-220, 600) table portion, said first table portion storing transmitter address data, said second table portion storing at least one cipher key, wherein said ciphering key management unit is arranged for determining whether a transmitter address matches transmitter address data in said first table portion, and if so, determining a corresponding cipher key stored in said second table portion for use in decrypting said received data. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31)
-
-
32. A ciphering key management apparatus for controlling use of cipher keys for decrypting data received by a WLAN (Wireless Local Area Network) receiver, said ciphering key management apparatus comprising:
-
a memory unit (130) for storing a hash table (110) having a first (200) and a second (205-220, 600) table portion, said first table portion storing transmitter address data, said second table portion storing at least one cipher key; and
a control unit (140) for determining whether a transmitter address matches transmitter address data in said first table portion, and if so, determining a corresponding cipher key stored in said second table portion for use in decrypting said received data.
-
-
33. An integrated circuit chip for use in a WLAN (Wireless Local Area Network) receiver to perform ciphering key management to control use of cipher keys for decrypting data received by said WLAN receiver, said integrated circuit chip comprising:
-
a memory circuit (130) for storing a hash table (110) having a first (200) and a second (205-220, 600) table portion, said first table portion storing transmitter address data, said second table portion storing at least one cipher key; and
a control unit (140) for determining whether a transmitter address matches transmitter address data in said first table portion, and if so, determining a corresponding cipher key stored in said second table portion for use in decrypting said received data.
-
-
34. A method of controlling use of cipher keys for decrypting received data in a WLAN (Wireless Local Area Network) receiver, said method comprising:
-
accessing (415) a hash table (110) having a first (200) and a second (205-220, 600) table portion, said first table portion storing transmitter address data, said second table portion storing at least one cipher key;
determining (420, 425, 430, 440) whether a transmitter address matches transmitter address data in said first table portion; and
if so, determining (445, 450, 455) a corresponding cipher key stored in said second table portion for use in decrypting said received data. - View Dependent Claims (35, 36, 37, 38, 39, 40, 41, 42, 43, 44, 45, 46, 47, 48, 49, 50, 51, 52, 53, 54, 55, 56, 57, 58, 59, 60, 61, 62, 63, 64)
-
Specification