ASYMMETRIC KEY WRAPPING USING A SYMMETRIC CIPHER
First Claim
Patent Images
1. A method of asymmetric key wrapping in a system, comprising the steps of:
- (A) transferring a shared key from a key storage to a cipher operation, wherein said cipher operation comprises a symmetric-key cipher utilizing a cipher key;
(B) generating an encrypted key by encrypting a decrypted key with said cipher operation using said shared key as said cipher key in a wrap-encrypt mode; and
(C) presenting said encrypted key external to said system in said wrap-encrypt mode.
9 Assignments
0 Petitions
Accused Products
Abstract
A method of asymmetric key wrapping in a system is disclosed. The method generally includes the steps of (A) transferring a shared key from a key storage to a cipher operation, wherein the cipher operation comprises a symmetric-key cipher utilizing a cipher key, (B) generating an encrypted key by encrypting a decrypted key with the cipher operation using the shared key as the cipher key in a wrap-encrypt mode and (C) presenting the encrypted key external to the system in the wrap-encrypt mode.
-
Citations
20 Claims
-
1. A method of asymmetric key wrapping in a system, comprising the steps of:
-
(A) transferring a shared key from a key storage to a cipher operation, wherein said cipher operation comprises a symmetric-key cipher utilizing a cipher key; (B) generating an encrypted key by encrypting a decrypted key with said cipher operation using said shared key as said cipher key in a wrap-encrypt mode; and (C) presenting said encrypted key external to said system in said wrap-encrypt mode. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A method of asymmetric key wrapping in a system, comprising the steps of:
-
(A) transferring a shared key from a key storage to a cipher operation, wherein said cipher operation comprises a symmetric-key cipher utilizing a cipher key; (B) generating a decoded key by decoding an encrypted key with said cipher operation using said shared key as said cipher key in a wrap-decrypt mode; and (C) transferring said decoded key from said cipher operation to a key register in said wrap-decrypt mode, wherein said key register is unreadable from external to said system. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A system comprising:
-
a cipher circuit configured to generate(i) an encrypted key by encrypting a decrypted key in a wrap-encrypt mode and (ii) said decrypted key by decrypting said encrypted key in a wrap-decrypt mode, wherein said cipher circuit performs a symmetric-key cipher utilizing a cipher key; a key storage configured to store a shared key; a key register configured to store said decrypted key, wherein said key register is unreadable from external to said system; and a switching circuit configured to transfer (i) said shared key from said key storage to said cipher circuit as said cipher key, (ii) said encrypted key from said cipher circuit to an external port of said system in said wrap-encrypt mode and (iii) said decrypted key to said key register in said wrap-decrypt mode. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification