Asymmetric key wrapping using a symmetric cipher
First Claim
Patent Images
1. A method of asymmetric key wrapping in a system, comprising the steps of:
- (A) transferring a first key from a storage in said system to a cipher in said system while in a first of a plurality of modes, wherein (i) an operation of said cipher utilizes a second key, (ii) said cipher is selectable between an encryption and a decryption as determined by a first signal and (iii) said first signal selects said modes;
(B) receiving a second signal into said system, said second signal carrying a third key in an unencrypted form;
(C) generating a fourth key by encrypting said third key with said cipher using said first key as said second key while said system is in said first mode; and
(D) presenting a third signal external to said system while said system is in said first mode, said third signal carrying said fourth key.
9 Assignments
0 Petitions
Accused Products
Abstract
A method of asymmetric key wrapping in a system is disclosed. The method generally includes the steps of (A) transferring a shared key from a key storage to a cipher operation, wherein the cipher operation comprises a symmetric-key cipher utilizing a cipher key, (B) generating an encrypted key by encrypting a decrypted key with the cipher operation using the shared key as the cipher key in a wrap-encrypt mode and (C) presenting the encrypted key external to the system in the wrap-encrypt mode.
35 Citations
20 Claims
-
1. A method of asymmetric key wrapping in a system, comprising the steps of:
-
(A) transferring a first key from a storage in said system to a cipher in said system while in a first of a plurality of modes, wherein (i) an operation of said cipher utilizes a second key, (ii) said cipher is selectable between an encryption and a decryption as determined by a first signal and (iii) said first signal selects said modes; (B) receiving a second signal into said system, said second signal carrying a third key in an unencrypted form; (C) generating a fourth key by encrypting said third key with said cipher using said first key as said second key while said system is in said first mode; and (D) presenting a third signal external to said system while said system is in said first mode, said third signal carrying said fourth key. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A method of asymmetric key wrapping in a system, comprising the steps of:
-
(A) transferring a first key from a storage in said system to a cipher in said system while in a first of a plurality of modes, wherein (i) an operation of said cipher utilizes a second key, (ii) said cipher is selectable between an encryption and a decryption as determined by a first signal and (iii) said first signal selects said modes; (B) receiving a second signal into said system, said second signal carrying a third key in an encrypted form; (C) generating a fourth key by decoding said third key with said cipher using said first key as said second key while said system is in said first mode; and (D) transferring said fourth key from said cipher to a register while said system is in said first mode, wherein said register is unreadable from external to said system. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A system comprising:
-
a first circuit configured to generate (i) a first key by encrypting a second key while said system is in a first of a plurality of modes and (ii) a third key by decrypting a fourth key while said system is in a second of said modes, wherein (i) an operation of said first circuit utilizes a fifth key, (ii) said operation is selectable between an encryption and a decryption as determined by a first signal and (iii) said first signal selects said modes; a second circuit configured to store a sixth key; a third circuit configured to store said third key, wherein said third circuit is unreadable from external to said system; and a fourth circuit configured to transfer (i) said sixth key from said second circuit to said first circuit as said fifth key, (ii) said first key from said first circuit to an external port of said system while said system in said first mode and (iii) said decrypted third key from said first circuit to said third circuit while said system is in said second mode. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification