CRYPTOGRAPHIC PROCESSOR, METHOD FOR IMPLEMENTING A CRYPTOGRAPHIC PROCESSOR AND KEY GENERATION CIRCUIT
First Claim
1. A cryptographic processor comprising:
- a processing circuit configured to perform a round function of an iterated cryptographic algorithm;
a controller configured to control the processing circuit to apply a plurality of iterations of the round function on a message to process the message in accordance with the iterated cryptographic algorithm;
a transformation circuit configured to transform the input of a second iteration of the round function following a first iteration of the round function of the plurality of iterations and to supply the transformed input as input to the second iteration;
wherein the transformation circuit is implemented using a circuit camouflage technique.
1 Assignment
0 Petitions
Accused Products
Abstract
A cryptographic processor is described comprising a processing circuit configured to perform a round function of an iterated cryptographic algorithm, a controller configured to control the processing circuit to apply a plurality of iterations of the round function on a message to process the message in accordance with the iterated cryptographic algorithm and a transformation circuit configured to transform the input of a second iteration of the round function following a first iteration of the round function of the plurality of iterations and to supply the transformed input as input to the second iteration wherein the transformation circuit is implemented using a circuit camouflage technique.
15 Citations
25 Claims
-
1. A cryptographic processor comprising:
-
a processing circuit configured to perform a round function of an iterated cryptographic algorithm; a controller configured to control the processing circuit to apply a plurality of iterations of the round function on a message to process the message in accordance with the iterated cryptographic algorithm; a transformation circuit configured to transform the input of a second iteration of the round function following a first iteration of the round function of the plurality of iterations and to supply the transformed input as input to the second iteration; wherein the transformation circuit is implemented using a circuit camouflage technique. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17)
-
-
18. A method for implementing a cryptographic processor comprising:
-
forming a processing circuit configured to perform a round function of an iterated cryptographic algorithm; forming a controller configured to control the processing circuit to apply a plurality of iterations of the round function on a message to process the message in accordance with the iterated cryptographic algorithm; forming a transformation circuit configured to transform the input of a second iteration of the round function following a first iteration of the round function of the plurality of iterations and to supply the transformed input as input to the second iteration; wherein the transformation circuit is formed using a circuit camouflage technique.
-
-
19. A key generation circuit comprising
a plurality of circuits, wherein each circuit is configured to output a respective predetermined output value in response to a respective predetermined input and wherein the plurality of circuits are implemented using a circuit camouflage technique; a controller configured to supply, for each circuit of the plurality of circuits, the predetermined input to the circuit and to derive a cryptographic key from the output values of the circuits. - View Dependent Claims (20, 21, 22, 23, 24, 25)
Specification