US20080101599A1 - Apparatus for encrypting/decrypting real-time input stream - Google Patents

Apparatus for encrypting/decrypting real-time input stream Download PDF

Info

Publication number
US20080101599A1
US20080101599A1 US11/927,229 US92722907A US2008101599A1 US 20080101599 A1 US20080101599 A1 US 20080101599A1 US 92722907 A US92722907 A US 92722907A US 2008101599 A1 US2008101599 A1 US 2008101599A1
Authority
US
United States
Prior art keywords
key
unit
block
data
encryption
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US11/927,229
Inventor
Yoon Yang
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
LG Electronics Inc
Original Assignee
LG Electronics Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by LG Electronics Inc filed Critical LG Electronics Inc
Priority to US11/927,229 priority Critical patent/US20080101599A1/en
Assigned to LG ELECTRONICS INC. reassignment LG ELECTRONICS INC. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: YANG, YOON SEOK
Publication of US20080101599A1 publication Critical patent/US20080101599A1/en
Abandoned legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/065Encryption by serially and continuously modifying data stream elements, e.g. stream cipher systems, RC4, SEAL or A5/3
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/12Details relating to cryptographic hardware or logic circuitry
    • H04L2209/122Hardware reduction or efficient architectures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/24Key scheduling, i.e. generating round keys or sub-keys for block encryption

Definitions

  • the present invention relates to an apparatus for encrypting/decrypting a real-time input stream using AES (Advanced Encryption Standards) algorithm.
  • AES Advanced Encryption Standards
  • NIST National Institute of Standards and Technology
  • FIPS Federal Information Processing Standards
  • the AES as a block encryption algorithm (which carries out the encryption by gathering streams by block unit) replaces the previous encryption standards, DES, and will be used for protecting information of U.S. government and people. Allowance of exporting encryption devices by U.S. government will make the AES as encryption standards prevail throughout the world.
  • DES selected as encryption standards by U.S. government in 1976 uses 56-bits encryption system, while AES uses three systems of 128, 192, and 256 bits so as to strengthen the encryption with such excellent advantages as performance, efficiency, flexibility, and easy embodiment.
  • the AES algorithm introduced by software fails to carry out encryption/decryption for a real-time input stream. Namely, for real-time operation, a block round should fulfill the calculation of all rounds before the next block data are transferred. However, the block round in the AES algorithm constructed with software fails to fulfill such operation. Thus, when consecutive data streams are inputted, the block round with software is unable to secure a time to perform a processing on data by preparing one block, thereby failing to carry out the real-time processing on the consecutive data streams.
  • the present invention is directed to an apparatus for encrypting/decrypting a real-time input stream that substantially obviates one or more problems due to limitations and disadvantages of the related art.
  • An object of the present invention is to provide an apparatus for encrypting/decrypting a real-time input stream enabling to encrypt and decrypt a real-time inputted stream real-timely by constructing Rijndael algorithm selected as AES algorithm with hardware.
  • Another object of the present invention is to provide an apparatus for encrypting/decrypting a real-time input stream enabling to carry out encryption and decryption with a simple hardware structure by sharing a block used in common when realizing hardware of Rijndael algorithm.
  • an apparatus for encrypting/decrypting a real-time input stream includes a control unit receiving a real-time stream of byte units, converting the real-time stream into block data, and outputting the block data for encryption or decryption, the control unit receiving encrypted or decrypted block data, converting the received encrypted or decrypted block data into byte units, and outputting the converted block data of the byte units, a key schedule unit carrying out a key schedule every round in accordance with a size and a key value of a block inputted from outside so as to output a key value for the encryption or decryption each round, and a block round unit receiving the converted data of block units from the control unit, receiving the key value from the key schedule unit so as to carry out the encryption or decryption, and outputting the encrypted or decrypted result to the control unit.
  • control unit comprises an input buffer storing the real-time stream of byte units inputted from the outside and converting the received real-time stream into the block data having the size inputted from the outside so as to output the converted block data to the block round unit and an output buffer receiving the block data encrypted or decrypted in the block round unit and converting the received block data into the byte units so as to output the converted data.
  • the block round unit completes all round calculation of data having been currently encrypted or decrypted before a next block data is inputted from the control unit and then stores the corresponding result in the output buffer of the control unit.
  • the key schedule unit carries out every round the key schedule on a key required for the block round unit to process each round so as to output the key scheduled result to the block round unit.
  • the key schedule unit includes a key expansion unit expanding the inputted key value into a size amounting to ⁇ block size*(count of rounds+1) ⁇ and a key selection unit selecting a 128 bits key required for each round from the expanded key value so as to output the selected key to the block round unit.
  • the key schedule unit expands the inputted key value into a size of ⁇ block size*(count of rounds+1) ⁇ and then carries out a step of selecting the 128 bits key required for each round using one key register.
  • the key schedule unit comprises the key register amounting to the key value required substantially for one round.
  • the key register has a capacity amounting to ⁇ (size of an inputted block)*(size of one round) ⁇ .
  • control unit generates a control signal to produce the key value every round and then outputs the control signal to the key schedule unit.
  • FIG. 1 illustrates a schematic block diagram of an encryption/decryption apparatus of a real-time input stream according to a preferred embodiment of the present invention
  • FIG. 2 illustrates a detailed block diagram of an encryption/decryption apparatus of a real-time input stream according to the preferred embodiment of the present invention
  • FIG. 3 illustrates a detailed block diagram of a key schedule unit in FIG. 2 ;
  • FIG. 4 illustrates a detailed block diagram of an encryption unit of a block round unit in FIG. 2 ;
  • FIG. 5 illustrates a detailed block diagram of a decryption unit of a block round unit in FIG. 2 ;
  • FIG. 6 illustrates a detailed block diagram of a control unit in FIG. 2 .
  • FIG. 1 illustrates a schematic block diagram of an encryption/decryption apparatus of a real-time input stream according to the present invention, in which input/output signals are shown exemplarily.
  • FIG. 2 illustrates a detailed block diagram of an encryption/decryption apparatus of a real-time input stream according to the preferred embodiment of the present invention.
  • an AES encryption/decryption apparatus includes a key schedule unit 202 receiving 128/192/256 bit keys so as to be in charge of a key schedule, a block round unit 203 receiving 128 block data so as to carry out encryption/decryption, and a control unit 201 generating control signals required for the key schedule unit 202 and the block round unit 203 and receiving to convert a stream of a byte unit into that of a block unit through an input buffer to output the converted stream to the block round unit 203 or converting block data outputted from the block round unit 203 into byte units so as to output the converted byte units externally.
  • signals preferably inputted to the control unit 201 include stream data (MPEG system stream, DSS stream, and the like) Data_in[7:0] for encryption or decryption of byte units, data valid signal Data_valid, wsel[1:0] signal informing a size of a key value, block data Out_block[127:0] encrypted or decrypted in the block round unit 203 , and encrypted or decrypted block data valid signal Out_block_valid.
  • stream data MPEG system stream, DSS stream, and the like
  • Data_in[7:0] for encryption or decryption of byte units
  • Data_valid data valid signal
  • wsel[1:0] signal informing a size of a key value
  • block data Out_block[127:0] encrypted or decrypted in the block round unit 203 and encrypted or decrypted block data valid signal Out_block_valid.
  • signals preferably outputted from the control unit 201 include byte-united stream data Out_data[7:0] encrypted or decrypted through the key schedule unit 202 and the block round unit 203 , output data valid signal Out_valid, block data In_block[127:0] outputted to the block round unit 203 for encryption and decryption, block data valid signal In_block_valid for encryption and decryption, and key schedule start control signal Key_start outputted to the key schedule unit 202 .
  • Signals inputted to the key schedule unit 202 include wsel[1:0] signal informing a size of a key value, Encrypt_en signal informing whether to encrypt or decrypt, Key_data[128,192,256], and Key_start signal outputted from the control unit 201 . And, signals outputted from the key schedule unit 202 include key data Round_key/I_round_key[127:0] and key data valid signal Round_key_valid.
  • Signals inputted to the block round unit 203 include wsel[1:0] informing a size of a key value, Encrypt_en signal informing whether to be encrypt or decrypt, block data In_block[127:0] outputted from the control unit 201 for encryption and decryption, the block data valid signal In_block_valid, key data outputted from the key schedule unit 202 for encryption and decryption, and key data valid signal Round_key_valid.
  • signals outputted from the block round unit 203 include encrypted or decrypted block data Out_block[127:0] and the block data valid signal Out_block_valid.
  • the plain text i.e. block data inputted for encryption
  • the plain text is the block data becoming the target of encryption.
  • the plain text to be encrypted i.e. a size of a block
  • the key value means ‘192’.
  • such a wsel[1:0] signal is inputted to the control unit 201 , key schedule unit 202 , and block round unit 203 , simultaneously.
  • FIG. 3 illustrates a detailed block diagram of a key scheduling unit in FIG. 2 .
  • the key schedule unit 202 preferably comprises a key expansion unit 301 and a key selection unit 302 .
  • a size of the key value is determined by the wsel signal, as shown in Table 1, and inputted to the key expansion unit 301 .
  • the key expansion unit 301 then expands the inputted key value into a size corresponding to ⁇ a block size*(account of rounds+1) ⁇ through a key expansion process key_expans.
  • Each of the expanded keys is inputted to the block round unit 203 through the key selection unit 302 every round or period (or a predetermined period) so as to carry out encryption/decryption, i.e. cipher/decipher Rijndael algorithm.
  • the key selection unit 302 selects a 128 bit key required for each round so as to output the selected key to the block round unit 203 . This is because each round needs the key value when the block round unit 203 carries out the encryption or decryption.
  • the key schedule unit 202 finds a key for encrypting or decrypting each round so as to output the found key to the block round unit 203 . If an encryption process is currently carried out, the selection unit 302 generates to output the key value Round_key[127:0] required for each round selectively. If a decryption process is currently carried out, the key selection unit 302 carries out an inverse operation by receiving a final 128 bit key value found previously through a decryption key schedule in an initial process so as to generate a key value required for each round.
  • the register should have excessively large capacity. This wastes memory size and processing time.
  • the present invention finds the key for encryption or decryption of one block every round so as to output the found key to the block round unit 203 .
  • the register having the key value only required for a round is necessary.
  • the register needs a value of (block size*value for one round).
  • the encryption/decryption apparatus carries out the encryption/decryption operation by key-scheduling each round in order to reduce the size of the register. And, the present invention enables to carry out both of the encryption and decryption using the encrypt_en signal and the key schedule unit 202 only.
  • FIG. 4 illustrates a detailed block diagram of an encryption unit of the block round unit 203 in FIG. 2
  • FIG. 5 illustrates a detailed block diagram of a decryption unit 500 of the block round unit in FIG. 2 .
  • the block round unit 203 carries out the encryption/decryption operation using the block data In_block[127:0] and valid signal In_block_valid provided by the input buffer of the control unit 201 .
  • the encryption/decryption key required for each round is inputted from the key schedule unit 202 .
  • the block round unit 203 carries out the calculation of all rounds before the next block data is transferred from the control unit 201 . This is because the hardware structure that the control unit 201 , key schedule unit 202 , and block round unit 203 are preferably constructed with logic gates so as to enable a real-time processing. Alternatively, other programmable logic devices or software processing known to one of ordinary in the art may also be substituted.
  • a data conversion unit 401 of the encryption unit 400 in FIG. 4 receives to convert the block data In_block[127:0] to be encrypted from the control unit 201 into byte units.
  • the data conversion unit 401 has a non-linear characteristic so as to carry out non-linear substitution for the conversion of byte units, and plays an important role of determining robustness of encryption in encryption algorithm.
  • the data substituted by byte units in the data conversion unit 401 is inputted to a shifter 402 to be shifted in a row direction, inputted to a mixer 403 so as to be mixed in a column direction, inputted to a key mixer 404 so as to be combined with the round key Round_key[127:0] outputted from the key schedule unit 202 , and outputted to the control unit 201 , successively.
  • the inputted block data passes through the data conversion unit 401 , shifter 402 , mixer 403 , and key mixer 404 sequentially so as to complete one round.
  • the above steps are repeated in accordance with a count of the previous setup rounds. In this case, the count of the repeated rounds is determined by the key value.
  • the encryption in FIG. 4 is carried out in reverse.
  • the reverse process is shown in FIG. 5 .
  • the key mixer 501 adds the block data In_block[127:0] to the inverse round key I_round_key outputted from the key schedule unit 202 so as to output the added result to an inverse mixer 502 .
  • the inverse mixer 502 mixes inversely the data outputted from the key mixer 501 in a column direction, and then outputs the result to an inverse shifter 503 so as to carry out inverse shift in a row direction. This is because the mixing is carried out in the column direction for encryption as well as the shift is carried out in the row direction. Thus, the process for decryption is carried out in a reverse manner of the encryption.
  • Data outputted from the inverse shifter 503 is outputted to the control unit 201 through a data conversion unit 504 .
  • the block data Out_block[127:0] which is encrypted in the encryption unit 400 of the block round unit 203 or decrypted in the decryption unit 500 , is transferred to an output buffer in the control unit 201 with the block data output valid signal Out_block_valid.
  • FIG. 6 illustrates a detailed block diagram of the control unit 201 in FIG. 2 .
  • the control unit 201 includes an input buffer 601 receiving to convert a bit stream to be encrypted or decrypted into block units and then outputting the converted block data In_block[127:0] and the block data valid signal In_block_valid to the block round unit 203 , an output buffer 603 receiving the encrypted or decrypted data Out_block[127:0] from the block round unit 203 and the data valid signal Out_block_valid in byte unit, and a state control unit 602 controlling data storage and output of the input/output buffers 601 and 603 and generating the control signal key_start to generate the key value of each round so as to output the generated signal key_start to the key schedule unit 202 .
  • the input buffer 601 of the control unit 201 stores the bit stream Data_in[7:0] inputted for encryption or decryption in byte unit therein.
  • the input buffer 601 outputs the accumulated data streams to the block round unit 203 in block unit.
  • the state control unit 602 controls the data storage and output of the input/output buffers 601 and 603 as well as generates to output the control signal key_start to the key schedule unit 202 so as to generate the key value for each round.
  • the output buffer 603 receives to store the encrypted or decrypted data from the block round unit 203 so as to output the data Out_data[7:0] of byte units with the valid signal Out_valid.
  • the apparatus of encrypting/decrypting a real-time input stream realizes the encryption and decryption of the AES algorithm in a manner of hardware, thereby enabling to carry out the encryption and decryption of the input data stream in real time.
  • the present invention is applicable to all information encryption devices requiring real-time encryption, and specifically, to pay stream encryption for a receive-restricting system and private information encryption, and the like.
  • the present invention finds the key for encryption or decryption of one block every round when realizing the encryption and decryption of the AES algorithm in a hardware manner, and then outputs the found keys to the block round unit. Therefore, the present invention reduces the size of the key register required for the encryption/decryption of block data to maximum 1/15 to minimum 1/10 times less than that of the related art, thereby enabling to reduce a size of hardware as well as cost of product.

Abstract

Disclosed is an apparatus for encrypting/decrypting a real-time input stream. The present invention includes a control unit, a key schedule unit, and a block round unit. Accordingly, the present invention realizes the encryption and decryption of AES algorithm in a manner of hardware, thereby enabling to carry out the encryption and decryption of the real-time input stream real-timely. And, the present invention finds the key for encryption or decryption of one block every round when realizing the encryption and decryption of the AES algorithm in a hardware manner, and then outputs the found keys to the block round unit. The present invention reduces the size of the key register required for the encryption/decryption of block data, thereby enabling to reduce a size of hardware as well as cost of product.

Description

    CROSS REFERENCE TO RELATED ART
  • This application claims the benefit of Korean Patent Application No. 2001-2644, filed on Jan. 17, 2001, which is hereby incorporated by reference.
  • BACKGROUND OF THE INVENTION
  • 1. Field of the Invention
  • The present invention relates to an apparatus for encrypting/decrypting a real-time input stream using AES (Advanced Encryption Standards) algorithm.
  • 2. Background of the Related Art
  • As importance of pay information and privacy protection increases, so does that of encryption/decryption apparatuses. Specifically, the next generation encryption standards have been newly proposed so as to replace the DES (Data Encryption Standards) which has been the U.S. encryption standard.
  • NIST (National Institute of Standards and Technology) has evaluated 15 algorithms as AES candidate technologies for years, and has narrowed the candidates to 5 and has finally selected the Rijndael algorithm as the next generation encryption standards through a close investigation and set about details. NIST is going to open/examine/modify the Rijndael algorithm for a while so as to confirm it as the AES. The confirmed proposal will be selected as FIPS (Federal Information Processing Standards).
  • The AES as a block encryption algorithm (which carries out the encryption by gathering streams by block unit) replaces the previous encryption standards, DES, and will be used for protecting information of U.S. government and people. Allowance of exporting encryption devices by U.S. government will make the AES as encryption standards prevail throughout the world. DES selected as encryption standards by U.S. government in 1976 uses 56-bits encryption system, while AES uses three systems of 128, 192, and 256 bits so as to strengthen the encryption with such excellent advantages as performance, efficiency, flexibility, and easy embodiment.
  • Yet, the AES algorithm introduced by software fails to carry out encryption/decryption for a real-time input stream. Namely, for real-time operation, a block round should fulfill the calculation of all rounds before the next block data are transferred. However, the block round in the AES algorithm constructed with software fails to fulfill such operation. Thus, when consecutive data streams are inputted, the block round with software is unable to secure a time to perform a processing on data by preparing one block, thereby failing to carry out the real-time processing on the consecutive data streams.
  • SUMMARY OF THE INVENTION
  • Accordingly, the present invention is directed to an apparatus for encrypting/decrypting a real-time input stream that substantially obviates one or more problems due to limitations and disadvantages of the related art.
  • An object of the present invention is to provide an apparatus for encrypting/decrypting a real-time input stream enabling to encrypt and decrypt a real-time inputted stream real-timely by constructing Rijndael algorithm selected as AES algorithm with hardware.
  • Another object of the present invention is to provide an apparatus for encrypting/decrypting a real-time input stream enabling to carry out encryption and decryption with a simple hardware structure by sharing a block used in common when realizing hardware of Rijndael algorithm.
  • Additional advantages, objects, and features of the invention will be set forth in part in the description which follows and in part will become apparent to those having ordinary skill in the art upon examination of the following or may be learned from practice of the invention. The objectives and other advantages of the invention may be realized and attained by the structure particularly pointed out in the written description and claims hereof as well as the appended drawings.
  • To achieve these objects and other advantages and in accordance with the purpose of the invention, as embodied and broadly described herein, an apparatus for encrypting/decrypting a real-time input stream according to the present invention includes a control unit receiving a real-time stream of byte units, converting the real-time stream into block data, and outputting the block data for encryption or decryption, the control unit receiving encrypted or decrypted block data, converting the received encrypted or decrypted block data into byte units, and outputting the converted block data of the byte units, a key schedule unit carrying out a key schedule every round in accordance with a size and a key value of a block inputted from outside so as to output a key value for the encryption or decryption each round, and a block round unit receiving the converted data of block units from the control unit, receiving the key value from the key schedule unit so as to carry out the encryption or decryption, and outputting the encrypted or decrypted result to the control unit.
  • Preferably, the control unit comprises an input buffer storing the real-time stream of byte units inputted from the outside and converting the received real-time stream into the block data having the size inputted from the outside so as to output the converted block data to the block round unit and an output buffer receiving the block data encrypted or decrypted in the block round unit and converting the received block data into the byte units so as to output the converted data.
  • More preferably, the block round unit completes all round calculation of data having been currently encrypted or decrypted before a next block data is inputted from the control unit and then stores the corresponding result in the output buffer of the control unit.
  • Preferably, the key schedule unit carries out every round the key schedule on a key required for the block round unit to process each round so as to output the key scheduled result to the block round unit.
  • More preferably, the key schedule unit includes a key expansion unit expanding the inputted key value into a size amounting to {block size*(count of rounds+1)} and a key selection unit selecting a 128 bits key required for each round from the expanded key value so as to output the selected key to the block round unit.
  • Preferably, the key schedule unit expands the inputted key value into a size of {block size*(count of rounds+1)} and then carries out a step of selecting the 128 bits key required for each round using one key register.
  • More preferably, the key schedule unit comprises the key register amounting to the key value required substantially for one round.
  • More preferably, the key register has a capacity amounting to {(size of an inputted block)*(size of one round)}.
  • Preferably, the control unit generates a control signal to produce the key value every round and then outputs the control signal to the key schedule unit.
  • It is to be understood that both the foregoing general description and the following detailed description of the present invention are exemplary and explanatory and are intended to provide further explanation of the invention as claimed.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • The accompanying drawings, which are included to provide a further understanding of the invention and are incorporated in and constitute a part of this application, illustrate embodiment(s) of the invention and together with the description serve to explain the principle of the invention. In the drawings:
  • FIG. 1 illustrates a schematic block diagram of an encryption/decryption apparatus of a real-time input stream according to a preferred embodiment of the present invention;
  • FIG. 2 illustrates a detailed block diagram of an encryption/decryption apparatus of a real-time input stream according to the preferred embodiment of the present invention;
  • FIG. 3 illustrates a detailed block diagram of a key schedule unit in FIG. 2;
  • FIG. 4 illustrates a detailed block diagram of an encryption unit of a block round unit in FIG. 2;
  • FIG. 5 illustrates a detailed block diagram of a decryption unit of a block round unit in FIG. 2; and
  • FIG. 6 illustrates a detailed block diagram of a control unit in FIG. 2.
  • DETAILED DESCRIPTION OF THE INVENTION
  • Reference will now be made in detail to the preferred embodiments of the present invention, examples of which are illustrated in the accompanying drawings.
  • FIG. 1 illustrates a schematic block diagram of an encryption/decryption apparatus of a real-time input stream according to the present invention, in which input/output signals are shown exemplarily. FIG. 2 illustrates a detailed block diagram of an encryption/decryption apparatus of a real-time input stream according to the preferred embodiment of the present invention.
  • Referring to FIG. 2, an AES encryption/decryption apparatus according to the present invention includes a key schedule unit 202 receiving 128/192/256 bit keys so as to be in charge of a key schedule, a block round unit 203 receiving 128 block data so as to carry out encryption/decryption, and a control unit 201 generating control signals required for the key schedule unit 202 and the block round unit 203 and receiving to convert a stream of a byte unit into that of a block unit through an input buffer to output the converted stream to the block round unit 203 or converting block data outputted from the block round unit 203 into byte units so as to output the converted byte units externally.
  • In this case, signals preferably inputted to the control unit 201 include stream data (MPEG system stream, DSS stream, and the like) Data_in[7:0] for encryption or decryption of byte units, data valid signal Data_valid, wsel[1:0] signal informing a size of a key value, block data Out_block[127:0] encrypted or decrypted in the block round unit 203, and encrypted or decrypted block data valid signal Out_block_valid.
  • And, signals preferably outputted from the control unit 201 include byte-united stream data Out_data[7:0] encrypted or decrypted through the key schedule unit 202 and the block round unit 203, output data valid signal Out_valid, block data In_block[127:0] outputted to the block round unit 203 for encryption and decryption, block data valid signal In_block_valid for encryption and decryption, and key schedule start control signal Key_start outputted to the key schedule unit 202.
  • Signals inputted to the key schedule unit 202 include wsel[1:0] signal informing a size of a key value, Encrypt_en signal informing whether to encrypt or decrypt, Key_data[128,192,256], and Key_start signal outputted from the control unit 201. And, signals outputted from the key schedule unit 202 include key data Round_key/I_round_key[127:0] and key data valid signal Round_key_valid.
  • Signals inputted to the block round unit 203 include wsel[1:0] informing a size of a key value, Encrypt_en signal informing whether to be encrypt or decrypt, block data In_block[127:0] outputted from the control unit 201 for encryption and decryption, the block data valid signal In_block_valid, key data outputted from the key schedule unit 202 for encryption and decryption, and key data valid signal Round_key_valid. And, signals outputted from the block round unit 203 include encrypted or decrypted block data Out_block[127:0] and the block data valid signal Out_block_valid.
  • In this case, the plain text, i.e. block data inputted for encryption, is preferably fixed to 128. Namely, the plain text is the block data becoming the target of encryption. The wsel signal values in accordance with the plain text and key value are illustratively shown in Table 1. Alternatively, other values may be assigned as the size of the plain text or key value without deviating from the gist of the present invention.
    TABLE 1
    wsel[1:0] Plain text = 128
    key value = 128 00
    Key value = 192 01
    Key value = 256 10
  • For instance, assuming that the inputted wsel[1:0] signal is ‘01’, the plain text to be encrypted, i.e. a size of a block, is 128. In this case, the key value means ‘192’. And, such a wsel[1:0] signal is inputted to the control unit 201, key schedule unit 202, and block round unit 203, simultaneously.
  • FIG. 3 illustrates a detailed block diagram of a key scheduling unit in FIG. 2.
  • Referring to FIG. 3, the key schedule unit 202 preferably comprises a key expansion unit 301 and a key selection unit 302.
  • A size of the key value is determined by the wsel signal, as shown in Table 1, and inputted to the key expansion unit 301. The key expansion unit 301 then expands the inputted key value into a size corresponding to {a block size*(account of rounds+1)} through a key expansion process key_expans. Each of the expanded keys is inputted to the block round unit 203 through the key selection unit 302 every round or period (or a predetermined period) so as to carry out encryption/decryption, i.e. cipher/decipher Rijndael algorithm. Preferably, the key selection unit 302 selects a 128 bit key required for each round so as to output the selected key to the block round unit 203. This is because each round needs the key value when the block round unit 203 carries out the encryption or decryption.
  • Preferably, the key schedule unit 202 finds a key for encrypting or decrypting each round so as to output the found key to the block round unit 203. If an encryption process is currently carried out, the selection unit 302 generates to output the key value Round_key[127:0] required for each round selectively. If a decryption process is currently carried out, the key selection unit 302 carries out an inverse operation by receiving a final 128 bit key value found previously through a decryption key schedule in an initial process so as to generate a key value required for each round.
  • In this case, if the expanded key is previously stored instead of finding the key for encryption or decryption of one block every round, a register amounting to {block size*(count of rounds+1)} is required. For instance, if the block size is 128 bits and a size of the key value is 256 bits, a count of rounds becomes ‘14’. Hence, a required size of the register is {128*(14+1)} bits=1920 bits=240 bytes. For another instance, if the block size is 128 bits and a size of the key value is 128 bits, a count of rounds becomes ‘10’. Hence, a required size of the register is {128*(10+1)} bits=1408 bits=176 bytes.
  • Namely, if the register is constructed so as to have all of the key value (block size*count of rounds) expanded by key schedule, the register should have excessively large capacity. This wastes memory size and processing time.
  • In order to prevent such an unnecessary waste, the present invention finds the key for encryption or decryption of one block every round so as to output the found key to the block round unit 203. Hence, the register having the key value only required for a round is necessary.
  • For instance, if the block size is 128 bits and a size of the key value is 256 bits, the register needs a value of (block size*value for one round). Hence, the required size of the register is 128*1=16 bytes.
  • The encryption/decryption apparatus according to the present invention carries out the encryption/decryption operation by key-scheduling each round in order to reduce the size of the register. And, the present invention enables to carry out both of the encryption and decryption using the encrypt_en signal and the key schedule unit 202 only.
  • FIG. 4 illustrates a detailed block diagram of an encryption unit of the block round unit 203 in FIG. 2, and FIG. 5 illustrates a detailed block diagram of a decryption unit 500 of the block round unit in FIG. 2.
  • Namely, the block round unit 203 carries out the encryption/decryption operation using the block data In_block[127:0] and valid signal In_block_valid provided by the input buffer of the control unit 201.
  • In this case, the encryption/decryption key required for each round is inputted from the key schedule unit 202. Moreover, the block round unit 203 carries out the calculation of all rounds before the next block data is transferred from the control unit 201. This is because the hardware structure that the control unit 201, key schedule unit 202, and block round unit 203 are preferably constructed with logic gates so as to enable a real-time processing. Alternatively, other programmable logic devices or software processing known to one of ordinary in the art may also be substituted.
  • If the encryption is carried out, a data conversion unit 401 of the encryption unit 400 in FIG. 4 receives to convert the block data In_block[127:0] to be encrypted from the control unit 201 into byte units. In this case, the data conversion unit 401 has a non-linear characteristic so as to carry out non-linear substitution for the conversion of byte units, and plays an important role of determining robustness of encryption in encryption algorithm.
  • The data substituted by byte units in the data conversion unit 401 is inputted to a shifter 402 to be shifted in a row direction, inputted to a mixer 403 so as to be mixed in a column direction, inputted to a key mixer 404 so as to be combined with the round key Round_key[127:0] outputted from the key schedule unit 202, and outputted to the control unit 201, successively. Namely, the inputted block data passes through the data conversion unit 401, shifter 402, mixer 403, and key mixer 404 sequentially so as to complete one round. And, the above steps are repeated in accordance with a count of the previous setup rounds. In this case, the count of the repeated rounds is determined by the key value.
  • If the decryption is being carried out, the encryption in FIG. 4 is carried out in reverse. The reverse process is shown in FIG. 5.
  • Namely, when the block data In_block[127:0] is inputted from the control unit 201 for decryption, the key mixer 501 adds the block data In_block[127:0] to the inverse round key I_round_key outputted from the key schedule unit 202 so as to output the added result to an inverse mixer 502. The inverse mixer 502 mixes inversely the data outputted from the key mixer 501 in a column direction, and then outputs the result to an inverse shifter 503 so as to carry out inverse shift in a row direction. This is because the mixing is carried out in the column direction for encryption as well as the shift is carried out in the row direction. Thus, the process for decryption is carried out in a reverse manner of the encryption. Data outputted from the inverse shifter 503 is outputted to the control unit 201 through a data conversion unit 504.
  • Thus, the block data Out_block[127:0], which is encrypted in the encryption unit 400 of the block round unit 203 or decrypted in the decryption unit 500, is transferred to an output buffer in the control unit 201 with the block data output valid signal Out_block_valid.
  • FIG. 6 illustrates a detailed block diagram of the control unit 201 in FIG. 2.
  • Referring to FIG. 6, the control unit 201 includes an input buffer 601 receiving to convert a bit stream to be encrypted or decrypted into block units and then outputting the converted block data In_block[127:0] and the block data valid signal In_block_valid to the block round unit 203, an output buffer 603 receiving the encrypted or decrypted data Out_block[127:0] from the block round unit 203 and the data valid signal Out_block_valid in byte unit, and a state control unit 602 controlling data storage and output of the input/ output buffers 601 and 603 and generating the control signal key_start to generate the key value of each round so as to output the generated signal key_start to the key schedule unit 202.
  • Preferably, the input buffer 601 of the control unit 201 stores the bit stream Data_in[7:0] inputted for encryption or decryption in byte unit therein. When the stored bit streams Data_in[7:0] are accumulated as much as a size of one block, the input buffer 601 outputs the accumulated data streams to the block round unit 203 in block unit. The state control unit 602 controls the data storage and output of the input/ output buffers 601 and 603 as well as generates to output the control signal key_start to the key schedule unit 202 so as to generate the key value for each round. And, the output buffer 603 receives to store the encrypted or decrypted data from the block round unit 203 so as to output the data Out_data[7:0] of byte units with the valid signal Out_valid.
  • Accordingly, the apparatus of encrypting/decrypting a real-time input stream according to the present invention realizes the encryption and decryption of the AES algorithm in a manner of hardware, thereby enabling to carry out the encryption and decryption of the input data stream in real time.
  • Moreover, the present invention is applicable to all information encryption devices requiring real-time encryption, and specifically, to pay stream encryption for a receive-restricting system and private information encryption, and the like.
  • Furthermore, the present invention finds the key for encryption or decryption of one block every round when realizing the encryption and decryption of the AES algorithm in a hardware manner, and then outputs the found keys to the block round unit. Therefore, the present invention reduces the size of the key register required for the encryption/decryption of block data to maximum 1/15 to minimum 1/10 times less than that of the related art, thereby enabling to reduce a size of hardware as well as cost of product.
  • The forgoing embodiments are merely exemplary and are not to be construed as limiting the present invention. The present teachings can be readily applied to other types of apparatuses. The description of the present invention is intended to be illustrative, and not to limit the scope of the claims. Many alternatives, modifications, and variations will be apparent to those skilled in the art.

Claims (9)

1. A method of controlling a protection key of data, comprising:
scheduling the protection key according to a predetermined period, the scheduling comprising:
initializing generation of a protection key according to a start key signal;
generating the protection key according to the predetermined period; and
representing validity of the protection key, the validity indicating the completion of the generation; and
encrypting a first data corresponding to the predetermined period with the protection key,
wherein the validity further indicates that a second data is unencrypted.
2. The method of claim 1, wherein the encrypted first data are in a block unit.
3. The method of claim 1, wherein the first data are encrypted according to the start key signal in real time.
4. An apparatus for controlling a key for encrypting or decrypting data units, the apparatus comprising:
a schedule unit scheduling the key according to a predetermined period; and
a block round unit encrypting a first data unit corresponding to the interval by using the key,
wherein the schedule unit initializes generation of the key according to a start key signal, generates the key in the predetermined period, and represents validity of the key, the validity indicating completion of the generation,
wherein the validity further indicates that a second data unit is unencrypted.
5. The apparatus of claim 4, wherein the encrypted data unit is in a block unit.
6. The apparatus of claim 4, wherein the first data unit is encrypted according to the start key signal in real time.
7. A computing program product recorded in a readable medium, the computing program product comprising instructions operating to cause a data processing unit embodied in a machine to:
schedule a key according to a predetermined period; and
encrypt a first data unit corresponding to the predetermined period by using the key,
wherein the data processing unit initializes generation of the key according to a start key signal, generate the key in the predetermined period and represents validity of the key, the validity indicating completion of the generation, according to the instructions,
wherein the validity further indicates that a second data unit is unencrypted.
8. The computing program product of claim 7, wherein the encrypted data unit is in a block unit.
9. The computing program product of claim 7, wherein the first data unit is encrypted according to the start key signal in real time.
US11/927,229 2001-01-17 2007-10-29 Apparatus for encrypting/decrypting real-time input stream Abandoned US20080101599A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US11/927,229 US20080101599A1 (en) 2001-01-17 2007-10-29 Apparatus for encrypting/decrypting real-time input stream

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
KR10-2001-0002644A KR100525389B1 (en) 2001-01-17 2001-01-17 Scrambler/descrambler of real time input stream
KR10-2001-0002644 2001-01-17
US10/050,274 US7783036B2 (en) 2001-01-17 2002-01-16 Apparatus for encrypting/decrypting real-time input stream
US11/927,229 US20080101599A1 (en) 2001-01-17 2007-10-29 Apparatus for encrypting/decrypting real-time input stream

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
US10/050,274 Continuation US7783036B2 (en) 2001-01-17 2002-01-16 Apparatus for encrypting/decrypting real-time input stream

Publications (1)

Publication Number Publication Date
US20080101599A1 true US20080101599A1 (en) 2008-05-01

Family

ID=19704749

Family Applications (3)

Application Number Title Priority Date Filing Date
US10/050,274 Active 2024-08-28 US7783036B2 (en) 2001-01-17 2002-01-16 Apparatus for encrypting/decrypting real-time input stream
US11/927,229 Abandoned US20080101599A1 (en) 2001-01-17 2007-10-29 Apparatus for encrypting/decrypting real-time input stream
US11/931,548 Abandoned US20080137866A1 (en) 2001-01-17 2007-10-31 Apparatus for encrypting/decrypting real-time input stream

Family Applications Before (1)

Application Number Title Priority Date Filing Date
US10/050,274 Active 2024-08-28 US7783036B2 (en) 2001-01-17 2002-01-16 Apparatus for encrypting/decrypting real-time input stream

Family Applications After (1)

Application Number Title Priority Date Filing Date
US11/931,548 Abandoned US20080137866A1 (en) 2001-01-17 2007-10-31 Apparatus for encrypting/decrypting real-time input stream

Country Status (2)

Country Link
US (3) US7783036B2 (en)
KR (1) KR100525389B1 (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050190923A1 (en) * 2004-02-26 2005-09-01 Mi-Jung Noh Encryption/decryption system and key scheduler with variable key length
US20100220863A1 (en) * 2009-02-27 2010-09-02 ATMELCorporation Key Recovery Mechanism for Cryptographic Systems

Families Citing this family (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TW527783B (en) * 2001-10-04 2003-04-11 Ind Tech Res Inst Encryption/deciphering device capable of supporting advanced encryption standard
US20040202318A1 (en) * 2001-10-04 2004-10-14 Chih-Chung Lu Apparatus for supporting advanced encryption standard encryption and decryption
KR20030051111A (en) * 2001-12-18 2003-06-25 신경욱 Round processing circuit and on-line round key generation circuit for the hardware implementation of AES Rijndael cipher algorithm
US7221763B2 (en) * 2002-04-24 2007-05-22 Silicon Storage Technology, Inc. High throughput AES architecture
DE602004012096T2 (en) * 2003-05-23 2009-03-26 Nxp B.V. METHOD AND DEVICE FOR A HADWARE IMPLEMENTATION OF THE KEY EXPANSION FUNCTION WITH LITTLE MEMORY
EP1636935A1 (en) * 2003-06-12 2006-03-22 Philips Intellectual Property & Standards GmbH Processor for encrypting and/or decrypting data and method of encrypting and/or decrypting data using such a processor
US7688974B2 (en) * 2003-06-16 2010-03-30 Electronics And Telecommunications Research Institute Rijndael block cipher apparatus and encryption/decryption method thereof
US7561689B2 (en) * 2004-06-17 2009-07-14 Agere Systems Inc. Generating keys having one of a number of key sizes
CN100389553C (en) * 2006-07-31 2008-05-21 西安西电捷通无线网络通信有限公司 High efficient encryption and decryption processing device for implementing SMS4 algorithm
US7949130B2 (en) 2006-12-28 2011-05-24 Intel Corporation Architecture and instruction set for implementing advanced encryption standard (AES)
US8538015B2 (en) 2007-03-28 2013-09-17 Intel Corporation Flexible architecture and instruction for advanced encryption standard (AES)
US8787565B2 (en) 2007-08-20 2014-07-22 Intel Corporation Method and apparatus for generating an advanced encryption standard (AES) key schedule
US9191197B2 (en) * 2007-10-10 2015-11-17 Canon Kabushiki Kaisha AES encryption/decryption circuit
CN100581101C (en) * 2007-11-19 2010-01-13 西安西电捷通无线网络通信有限公司 Packet cipher algorithm based encryption processing arrangement
JP4952627B2 (en) * 2008-03-21 2012-06-13 富士通株式会社 Image processing apparatus, image processing method, and image processing program
US9213653B2 (en) * 2013-12-05 2015-12-15 Intel Corporation Memory integrity
KR20200055529A (en) 2018-11-13 2020-05-21 현대자동차주식회사 Method for decoding encrypted data stored in an engine control unit
JP7383985B2 (en) * 2019-10-30 2023-11-21 富士電機株式会社 Information processing device, information processing method and program

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4255811A (en) * 1975-03-25 1981-03-10 International Business Machines Corporation Key controlled block cipher cryptographic system
US5420866A (en) * 1994-03-29 1995-05-30 Scientific-Atlanta, Inc. Methods for providing conditional access information to decoders in a packet-based multiplexed communications system
US5835600A (en) * 1995-11-01 1998-11-10 Rsa Data Security, Inc. Block encryption algorithm with data-dependent rotations
US6182216B1 (en) * 1997-09-17 2001-01-30 Frank C. Luyster Block cipher method
US6212281B1 (en) * 1996-10-11 2001-04-03 Certicom Corp. Digital signature protocol
US20010010722A1 (en) * 1996-02-23 2001-08-02 Sony Corporation Encryption and decryption method and apparatus using a work key which is generated by executing a decryption algorithm
US6779112B1 (en) * 1999-11-05 2004-08-17 Microsoft Corporation Integrated circuit devices with steganographic authentication, and steganographic authentication methods
US7162037B1 (en) * 1999-07-27 2007-01-09 Deutsche Telekom Ag Method for generating/regenerating an encryption key for a cryptographic method

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4255811A (en) * 1975-03-25 1981-03-10 International Business Machines Corporation Key controlled block cipher cryptographic system
US5420866A (en) * 1994-03-29 1995-05-30 Scientific-Atlanta, Inc. Methods for providing conditional access information to decoders in a packet-based multiplexed communications system
US5835600A (en) * 1995-11-01 1998-11-10 Rsa Data Security, Inc. Block encryption algorithm with data-dependent rotations
US20010010722A1 (en) * 1996-02-23 2001-08-02 Sony Corporation Encryption and decryption method and apparatus using a work key which is generated by executing a decryption algorithm
US6212281B1 (en) * 1996-10-11 2001-04-03 Certicom Corp. Digital signature protocol
US6182216B1 (en) * 1997-09-17 2001-01-30 Frank C. Luyster Block cipher method
US7162037B1 (en) * 1999-07-27 2007-01-09 Deutsche Telekom Ag Method for generating/regenerating an encryption key for a cryptographic method
US6779112B1 (en) * 1999-11-05 2004-08-17 Microsoft Corporation Integrated circuit devices with steganographic authentication, and steganographic authentication methods

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050190923A1 (en) * 2004-02-26 2005-09-01 Mi-Jung Noh Encryption/decryption system and key scheduler with variable key length
US7606365B2 (en) * 2004-02-26 2009-10-20 Samsung Electronics Co., Ltd. Encryption/decryption system and key scheduler with variable key length
US20100220863A1 (en) * 2009-02-27 2010-09-02 ATMELCorporation Key Recovery Mechanism for Cryptographic Systems
US8233620B2 (en) * 2009-02-27 2012-07-31 Inside Secure Key recovery mechanism for cryptographic systems

Also Published As

Publication number Publication date
US20080137866A1 (en) 2008-06-12
KR100525389B1 (en) 2005-11-02
US20020131588A1 (en) 2002-09-19
KR20020061718A (en) 2002-07-25
US7783036B2 (en) 2010-08-24

Similar Documents

Publication Publication Date Title
US20080101599A1 (en) Apparatus for encrypting/decrypting real-time input stream
US5799089A (en) System and apparatus for blockwise encryption/decryption of data
Nie et al. Performance evaluation of DES and Blowfish algorithms
US5381480A (en) System for translating encrypted data
US6459792B2 (en) Block cipher using key data merged with an intermediate block generated from a previous block
US20080240424A1 (en) Cryptographic systems and methods supporting multiple modes
US20060147040A1 (en) Rijndael block cipher apparatus and encryption/decryption method thereof
US20030059054A1 (en) Apparatus for generating encryption or decryption keys
JPH1075240A (en) Method for protecting data transmission and device for ciphering or deciphering data
JP2000162965A (en) Ciphering and deciphering device, and storage medium
JP2005531023A (en) Round key generation for AES (Rijndael) block ciphers
US6914984B2 (en) Encryption apparatus using data encryption standard algorithm
US20060188098A1 (en) Encryption/decryption device, communication controller, and electronic instrument
JPH1074044A (en) Method for encoding digital data and apparatus therefor
US7447311B2 (en) Method of designing optimum encryption function and optimized encryption apparatus in a mobile communication system
US20060259769A1 (en) Method and device for encryption and decryption
US6466669B1 (en) Cipher processor, IC card and cipher processing method
US6931127B2 (en) Encryption device using data encryption standard algorithm
US7257229B1 (en) Apparatus and method for key scheduling
US20120321079A1 (en) System and method for generating round keys
US20040096059A1 (en) Encryption apparatus with parallel Data Encryption Standard (DES) structure
US7606363B1 (en) System and method for context switching of a cryptographic engine
EP1629626B1 (en) Method and apparatus for a low memory hardware implementation of the key expansion function
US7583800B2 (en) Encryption apparatus and method in a wireless communications system
Landge et al. VHDL based Blowfish implementation for secured embedded system design

Legal Events

Date Code Title Description
AS Assignment

Owner name: LG ELECTRONICS INC., KOREA, REPUBLIC OF

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:YANG, YOON SEOK;REEL/FRAME:020039/0702

Effective date: 20020116

STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION