Claims
- 1. An apparatus for performing cryptographic operations, comprising:
a cryptographic instruction, received by a computing device as part of an instruction flow executing on said computing device, wherein said cryptographic instruction prescribes one of the cryptographic operations, and wherein said cryptographic instruction prescribes that a provided cryptographic key be expanded into a corresponding key schedule for employment during execution of said one of the cryptographic operations; keygen logic, operatively coupled to said cryptographic instruction, configured to direct said computing device to expand said provided cryptographic key into said corresponding key schedule; and execution logic, operatively coupled to said keygen logic, configured to expand said provided cryptographic key into said corresponding key schedule.
- 2. The apparatus as recited in claim 1, wherein said one of the cryptographic operations further comprises:
an encryption operation, said encryption operation comprising encryption of a plurality of plaintext blocks to generate a corresponding plurality of ciphertext blocks.
- 3. The apparatus as recited in claim 1, wherein said one of the cryptographic operations further comprises:
a decryption operation, said decryption operation comprising decryption of a plurality of ciphertext blocks to generate a corresponding plurality of plaintext blocks.
- 4. The apparatus as recited in claim 1, wherein said provided cryptographic key is stored in memory.
- 5. The apparatus as recited in claim 1, wherein said corresponding key schedule comprises an expanded key schedule according to the Advanced Encryption Standard (AES) algorithm.
- 6. The apparatus as recited in claim 1, wherein said keygen logic is configured to interpret a key generation field within a control word which is referenced by said cryptographic instruction.
- 7. The apparatus as recited in claim 1, wherein said cryptographic instruction is prescribed according to the x86 instruction format.
- 8. The apparatus as recited in claim 1, wherein said cryptographic instruction implicitly references a plurality of registers within said computing device.
- 9. The apparatus as recited in claim 8, wherein said plurality of registers comprises:
a first register, wherein contents of said first register comprise a first pointer to a first memory address, said first memory address specifying a first location in memory for access of said plurality of input text blocks upon which said one of the cryptographic operations is to be accomplished.
- 10. The apparatus as recited in claim 8, wherein said plurality of registers comprises:
a first register, wherein contents of said first register comprise a first pointer to a first memory address, said second memory address specifying a first location in said memory for storage of a corresponding plurality of output text blocks, said corresponding plurality of output text blocks being generated as a result of accomplishing said one of the cryptographic operations upon a plurality of input text blocks.
- 11. The apparatus as recited in claim 8, wherein said plurality of registers comprises:
a first register, wherein contents of said first register indicate a number of text blocks within a plurality of input text blocks.
- 12. The apparatus as recited in claim 8, wherein said plurality of registers comprises:
a first register, wherein contents of said first register comprise a first pointer to a first memory address, said first memory address specifying a first location in memory for access of cryptographic key data for use in accomplishing said one of the cryptographic operations.
- 13. The apparatus as recited in claim 12, wherein said cryptographic key data comprises said provided cryptographic key.
- 14. The apparatus as recited in claim 8, wherein said plurality of registers comprises:
a first register, wherein contents of said first register comprise a first pointer to a fourth memory address, said first memory address specifying a first location in memory, said first location comprising an initialization vector location, contents of said initialization vector location comprising an initialization vector or initialization vector equivalent for use in accomplishing said one of the cryptographic operations.
- 15. The apparatus as recited in claim 8, wherein said plurality of registers comprises:
a first register, wherein contents of said first register comprise a first pointer to a first memory address, said first memory address specifying a first location in memory for access of a control word for use in accomplishing said one of the cryptographic operations, wherein said control word prescribes cryptographic parameters for said one of the cryptographic operations, and wherein said control word comprises:
a keygen field, configured to specify that said provided cryptographic be expanded into said corresponding key schedule be employed during execution of said one of the cryptographic operations.
- 16. The apparatus as recited in claim 1, wherein said execution logic comprises:
a cryptography unit, configured execute a plurality of cryptographic rounds on each of said plurality of input text blocks to generate a corresponding each of a plurality of output text blocks, wherein said plurality of cryptographic rounds are prescribed by a control word that is provided to said cryptography unit.
- 17. An apparatus for performing cryptographic operations, comprising:
a cryptography unit within a device, configured to execute one of the cryptographic operations responsive to receipt of a cryptographic instruction within an instruction flow that prescribes said one of the cryptographic operations, wherein said cryptographic instruction also prescribes that a cryptographic key be expanded into a corresponding key schedule be employed when executing said one of the cryptographic operations; and keygen logic, operatively coupled to said cryptography unit, configured to direct said device to perform said one of the cryptographic operations and to expand said cryptographic key into said corresponding key schedule.
- 18. The apparatus as recited in claim 17, wherein said cryptographic key is stored in memory.
- 19. The apparatus as recited in claim 17, wherein said corresponding key schedule comprises an expanded key schedule according to the Advanced Encryption Standard (AES) algorithm.
- 20. The apparatus as recited in claim 17, wherein said keygen logic is configured to interpret a key generation field within a control word which is referenced by said cryptographic instruction.
- 21. The apparatus as recited in claim 17, wherein said cryptographic instruction is prescribed according to the x86 instruction format.
- 22. A method for performing cryptographic operations in a device, the method comprising:
receiving a cryptographic instruction that prescribes expansion of a cryptographic key into a corresponding key schedule for employment during execution of one of a plurality of cryptographic operations; and expanding the cryptographic key into the corresponding key schedule.
- 23. The method as recited in claim 22, wherein said receiving comprises:
via a field within a control word that is referenced by the cryptographic instruction, specifying expansion of the cryptographic key into the corresponding key schedule.
- 24. The method as recited in claim 22, wherein said expanding comprises:
loading the cryptographic key from memory.
- 25. The method as recited in claim 22, wherein the corresponding key schedule comprises an expanded key schedule according to the Advanced Encryption Standard (AES) algorithm.
- 26. The method as recited in claim 22, wherein said receiving comprises:
prescribing the cryptographic instruction according to the x86 instruction format.
CROSS-REFERENCE TO RELATED APPLICATIONS
[0001] This application claims the benefit of the following U.S. Provisional Applications, which are herein incorporated by reference for all intents and purposes.
1FILINGSERIAL NUMBERDATETITLE60/506971Sep. 29, 2003MICROPROCESSOR APPARATUS AND(CNTR.2070)METHOD FOR OPTIMIZING BLOCKCIPHER CRYPTOGRAPHIC FUNCTIONS60/507001Sep. 29, 2003APPARATUS AND METHOD FOR(CNTR.2071)PERFORMING OPERATING SYSTEMTRANSPARENT BLOCK CIPHERCRYPTOGRAPHIC FUNCTIONS60/506978Sep. 29, 2003MICROPROCESSOR APPARATUS AND(CNTR.2072)METHOD FOR EMPLOYING CONFIGURABLEBLOCK CIPHER CRYPTOGRAPHICALGORITHMS60/507004Sep. 29, 2003APPARATUS AND METHOD FOR(CNTR.2073)PROVIDING USER-GENERATED KEYSCHEDULE IN A MICROPROCESSORCRYPTOGRAPHIC ENGINE60/507002Sep. 29, 2003MICROPROCESSOR APPARATUS AND(CNTR.2075)METHOD FOR PROVIDING CONFIGURABLECRYPTOGRAPHIC BLOCK CIPHER ROUNDRESULTS60/506991Sep. 29, 2003MICROPROCESSOR APPARATUS AND(CNTR.2076)METHOD FOR ENABLING CONFIGURABLEDATA BLOCK SIZE IN ACRYPTOGRAPHIC ENGINE60/507003Sep. 29, 2003APPARATUS FOR ACCELERATING BLOCK(CNTR.2078)CIPHER CRYPTOGRAPHIC FUNCTIONS INA MICROPROCESSOR60/464394Apr. 18, 2003ADVANCED CRYPTOGRAPHY UNIT(CNTR.2222)60/506979Sep. 29, 2003MICROPROCESSOR APPARATUS AND(CNTR.2223)METHOD FOR PROVIDING CONFIGURABLECRYPTOGRAPHIC KEY SIZE60/508927Oct. 3, 2003APPARATUS AND METHOD FOR(CNTR.2226)PERFORMING OPERATING SYSTEMTRANSPARENT CIPHER BLOCK CHAININGMODE CRYPTOGRAPHIC FUNCTIONS60/508679Oct. 3, 2003APPARATUS AND METHOD FOR(CNTR.2227)PERFORMING OPERATING SYSTEMTRANSPARENT CIPHER FEEDBACK MODECRYPTOGRAPHIC FUNCTIONS60/508076Oct. 3, 2003APPARATUS AND METHOD FOR(CNTR.2228)PERFORMING OPERATING SYSTEMTRANSPARENT OUTPUT FEEDBACK MODECRYPTOGRAPIC FUNCTIONS60/508604Oct. 3, 2003APPARATUS AND METHOD FOR(CNTR.2230)GENERATING A CRYPTOGRAPHIC KEYSCHEDULE IN A MICROPROCESSOR
[0002] This application is a continuation-in-part of the following co-pending U.S. Patent Applications, all of which have a common assignee and common inventors.
2SERIALFILINGNUMBERDATETITLE10/674057Sep. 29, 2003MICROPROCESSOR APPARATUS(CNTR.2224)AND METHOD FOR PERFORMINGBLOCK CIPHER CRYPTOGRAPHICFUNCTIONS10/800983Mar. 15, 2004APPARATUS AND METHOD FOR(CNTR.2073)PROVIDING USER-GENERATEDKEY SCHEDULE IN AMICROPROCESSORCRYPTOGRAPHIC ENGINE
[0003] This application is related to the following co-pending U.S. Patent Applications, all of which have a common assignee and common inventors.
3FILINGSERIAL NUMBERDATETITLE10/730167Dec. 5, 2003MICROPROCESSOR APPARATUS ANDCNTR.2224-C1)METHOD FOR PERFORMING BLOCKCIPHER CRYPTOGRAPHIC FUNCTIONS10800768Mar. 15, 2004MICROPROCESSOR APPARATUS AND(CNTR.2070)METHOD FOR OPTIMIZING BLOCKCIPHER CRYPTOGRAPHIC FUNCTIONS10/727973Dec. 4, 2003APPARATUS AND METHOD FOR(CNTR.2071)PERFORMING TRANSPARENT BLOCKCIPHER CRYPTOGRAPHIC FUNCTIONS10/800938Mar. 15, 2004MICROPROCESSOR APPARATUS AND(CNTR.2072)METHOD FOR EMPLOYINGCONFIGURABLE BLOCK CIPHERCRYPTOGRAPHIC ALGORITHMS HEREWITHMICROPROCESSOR APPARATUS AND(CNTR.2075)METHOD FOR PROVIDINGCONFIGURABLE CRYPTOGRAPHIC BLOCKCIPHER ROUND RESULTS HEREWITHMICROPROCESSOR APPARATUS AND(CNTR.2076)METHOD FOR ENABLING CONFIGURABLEDATA BLOCK SIZE IN ACRYPTOGRAPHIC ENGINE HEREWITHMICROPROCESSOR APPARATUS AND(CNTR.2223)METHOD FOR PROVIDINGCONFIGURABLE CRYPTOGRAPHIC KEYSIZE HEREWITHAPPARATUS AND METHOD FOR(CNTR.2226)PERFORMING TRANSPARENT CIPHERBLOCK CHAINING MODECRYPTOGRAPHIC FUNCTIONS HEREWITHAPPARATUS AND METHOD FOR(CNTR.2227)PERFORMING TRANSPARENT CIPHERFEEDBACK MODE CRYPTOGRAPHICFUNCTIONS HEREWITHAPPARATUS AND METHOD FOR(CNTR.2228)PERFORMING TRANSPARENT OUTPUTFEEDBACK MODE CRYPTOGRAPICFUNCTIONS
Provisional Applications (13)
|
Number |
Date |
Country |
|
60506971 |
Sep 2003 |
US |
|
60507001 |
Sep 2003 |
US |
|
60506978 |
Sep 2003 |
US |
|
60507004 |
Sep 2003 |
US |
|
60507002 |
Sep 2003 |
US |
|
60506991 |
Sep 2003 |
US |
|
60507003 |
Sep 2003 |
US |
|
60464394 |
Apr 2003 |
US |
|
60506979 |
Sep 2003 |
US |
|
60508927 |
Oct 2003 |
US |
|
60508679 |
Oct 2003 |
US |
|
60508076 |
Oct 2003 |
US |
|
60508604 |
Oct 2003 |
US |
Continuation in Parts (2)
|
Number |
Date |
Country |
Parent |
10674057 |
Sep 2003 |
US |
Child |
10826632 |
Apr 2004 |
US |
Parent |
10800983 |
Mar 2004 |
US |
Child |
10826632 |
Apr 2004 |
US |