×

Method and apparatus for the virtualization of cryptographic resources

  • US 9,959,414 B1
  • Filed: 03/14/2017
  • Issued: 05/01/2018
  • Est. Priority Date: 11/05/2014
  • Status: Active Grant
First Claim
Patent Images

1. A method of provisioning a cryptographic memory operation comprising:

  • a keying operation, an initialization operation, a store plaintext operation and a store ciphertext operation;

    the keying operation, the store plaintext operation and the store ciphertext operation are performed by at least a physical processor coupled to a memory;

    the keying operation for generating a random number and keying a symmetric-key algorithm; and

    the initialization operation for initializing each byte of a cryptographic memory allocation with consecutive values from a keystream computed using the symmetric key algorithm in a counter based cipher mode; and

    the store plaintext operation wherein a logical set of plaintext bytes are encoded using the consecutive values from the keystream computed using the symmetric key algorithm before being written to the cryptographic memory allocation; and

    an encoded logical set of plaintext bytes written to initialized bytes of the cryptographic memory allocation replacing the consecutive values from the keystream which was used to encode the logical set of plaintext bytes by writing the encoded logical set of plaintext bytes to the initialized bytes of the cryptographic memory allocation storing the consecutive values; and

    the store ciphertext operation wherein the encoded logical set of plaintext bytes are decoded using the consecutive values from the keystream computed using the symmetric key algorithm before being written to the cryptographic memory allocation; and

    decoded logical set of plaintext bytes written to the cryptographic memory allocation replacing the consecutive values from the keystream which was used to decode the encoded logical set of plaintext bytes by writing the decoded logical set of plaintext bytes to the same location on the cryptographic memory allocation.

View all claims
  • 3 Assignments
Timeline View
Assignment View
    ×
    ×