Method of improving operational speed of encryption engine
Method of improving operational speed of encryption engine
 CN 1,965,524 B
 Filed: 03/28/2005
 Issued: 10/29/2014
 Est. Priority Date: 04/05/2004
 Status: Active Grant
First Claim
1. a method of utilizing logical blocks to implement secondary encryption function from the input of multiple buffers with reception, the execution of this function be according to can have from the first buffer the first or second value the first variable (B) input and can there is the input of second variable (C) of the first or second value from the second buffer, the method comprises the following step:
 Provide actual value from this second variable (C) of this second buffer to this logical blocks;
According to be set in this first variable (B) this first value this first variable (B) input and there is the input of this second variable (C) of this actual value of this second variable (C), and carry out this secondary encryption function in this logical blocks, to the first output is provided;
AndAccording to be set in this first variable (B) this second value this first variable (B) input and there is the input of this second variable (C) of this actual value of this second variable (C), and carry out this secondary encryption function in this logical blocks, to the second output is provided.
Chinese PRB Reexamination
Abstract
In the present method of implementing functioning of an encryption engine, a plurality of logic blocks (LB I  LB 32) are provided, each for running a function (F, G, H, I). Each function is run based on three variables (B, C, D), each of which may have a first or second value. The function is run with the first variable value (B) selected as having its first value, and with the second and third variables (C, D) having their actual values. The function is again run with the first variable value (B) selected as having its second value, and again with the second and third variables (C, D) having their actual values. An actual value of the first variable (B) is determined, and the output of the logic block is determined by the actual value of the first variable (B).
10 Claims

1. a method of utilizing logical blocks to implement secondary encryption function from the input of multiple buffers with reception, the execution of this function be according to can have from the first buffer the first or second value the first variable (B) input and can there is the input of second variable (C) of the first or second value from the second buffer, the method comprises the following step:

Provide actual value from this second variable (C) of this second buffer to this logical blocks; According to be set in this first variable (B) this first value this first variable (B) input and there is the input of this second variable (C) of this actual value of this second variable (C), and carry out this secondary encryption function in this logical blocks, to the first output is provided;
AndAccording to be set in this first variable (B) this second value this first variable (B) input and there is the input of this second variable (C) of this actual value of this second variable (C), and carry out this secondary encryption function in this logical blocks, to the second output is provided.


2. the method for claim 1, further comprises the following step:
 provide the actual value of this first variable (B) to this logical blocks.

3. method as claimed in claim 2, further comprise the following step:
 from this logical blocks, select this first or this second output wherein arbitrary, if be worth and this first variable (B) has the reality first of this first variable (B), select this first output, be worth if this first variable (B) has the reality second of this first variable (B), select this second output.

4. a method of utilizing multiple logical blocks of parallel join to implement secondary encryption function from the input of multiple buffers with reception, wherein each buffer has other and is connected to each of the plurality of logical blocks, the execution of this function is according to the input can from the first buffer with first variable (B) of the first or second value, can there is the input of second variable (C) of the first or second value from the second buffer, and can there is the input of the ternary (D) of the first or second value from the 3rd buffer, the method comprises the following step:

Provide the actual value of this second and third variable (C, D) to the plurality of logical blocks; According to be set in this first variable (B) this first value this first variable (B) input, have this actual value of this second variable (C) this second variable (C) input and there is the input of this ternary (D) of this actual value of this ternary (D), and carry out this secondary encryption function in the plurality of logical blocks, to the first output is provided;
AndAccording to be set in this first variable (B) this second value this first variable (B) input, have this actual value of this second variable (C) this second variable (C) input and there is the input of this ternary (D) of this actual value of this ternary (D), and carry out this secondary encryption function in the plurality of logical blocks, to the second output is provided.


5. method as claimed in claim 4, further comprises the following step:
 the actual value that this first variable (B) is provided is to each of the plurality of logical blocks.

6. method as claimed in claim 5, further comprise the following step:
 from each of the plurality of logical blocks select this first or this second output wherein arbitrary, if and this actual value of this first variable (B) is this first value of this first variable (B), select this first output, if this actual value of this first variable (B) is this second value of this first variable (B), select this second output.

7. utilize logical blocks to implement a method for the work of crypto engine from the input of multiple buffers with reception, comprise the following step:

First and second logical blocks is provided, and each logical blocks is used for carrying out secondary encryption function;
Wherein the execution of this secondary encryption function of this first logical blocks be according to can have from the first buffer the first or second value the first variable (B) input and can there is the input of second variable (C) of the first or second value from the second buffer, the execution of this secondary encryption function of the second logical blocks be basis from this first buffer can have this first or the input of this first variable (B) of this second value and can there is the input of the ternary (D) of the first or second value from the 3rd buffer;Provide the actual value of this second variable (C) to this first logical blocks; According to being set in from the input of this first variable (B) of this first value of this first variable (B) of this first buffer and according to the input of this second variable (C) of this actual value of this second variable (C) from this second buffer, and carry out this secondary encryption function of this first logical blocks, to the first output is provided; According to being set in from the input of this first variable (B) of this second value of this first variable (B) of this first buffer and according to the input of this second variable (C) of this actual value of this second variable (C) from this second buffer, and carry out this secondary encryption function of this first logical blocks, to the second output is provided; Provide actual value from this ternary (D) of the 3rd buffer to this second logical blocks; According to being set in from the input of this first variable (B) of this first value of this first variable (B) of this first buffer and according to the input of this ternary (D) of this actual value of this ternary (D) from the 3rd buffer, and carry out this secondary encryption function of this second logical blocks, to the 3rd output is provided;
AndAccording to being set in from the input of this first variable (B) of this second value of this first variable (B) of this first buffer and according to the input of this ternary (D) of this actual value of this ternary (D) from the 3rd buffer, and carry out this secondary encryption function of this second logical blocks, to the 4th output is provided.


8. method as claimed in claim 7, further comprises the following step:
 the actual value that this first variable (B) is provided is to each of this first and second logical blocks.

9. method as claimed in claim 8, further comprise the following step:
 from this first logical blocks, select this first or this second output, if be worth and this first variable (B) has the reality first of this first variable (B), select this first output, be worth if this first variable (B) has the reality second of this first variable (B), select this second output.

10. method as claimed in claim 9, further comprise the following step:
 from this second logical blocks, select the 3rd or the 4th output, if be worth and this first variable (B) has the reality first of this first variable (B), select the 4th output, be worth if this first variable (B) has the reality second of this first variable (B), select this second output.
Specification(s)