发明名称 Secure data processing for unaligned data
摘要 A method for data cryptography includes accepting input data, which contains a section that is to undergo a cryptographic operation and starts at an offset with respect to a beginning of the input data, by a Direct Memory Access (DMA) module. The input data is aligned by the DMA module to cancel out the offset. The aligned input data is read out of the DMA module, and the cryptographic operation is performed on the section.
申请公布号 US8918650(B2) 申请公布日期 2014.12.23
申请号 US200812258626 申请日期 2008.10.27
申请人 SanDisk IL Ltd. 发明人 Dolgunov Boris;Minz Leonid;Krotman Roy
分类号 G06F21/00;G06F13/28;G06F21/72;G06F21/60;H04L9/06 主分类号 G06F21/00
代理机构 Brinks Gilson & Lione 代理人 Brinks Gilson & Lione
主权项 1. A method for cryptography, the method comprising: accepting input data with a first Direct Memory Access (DMA) module, the input data comprising a section that is to undergo a cryptographic operation and that starts at an offset with respect to a beginning of the input data; receiving, with the first DMA module, a notification of where the section that is to undergo the cryptographic operation starts with respect to the beginning of the input data so as to enable the first DMA module to align the input data; aligning, with the first DMA module, based on the received notification, the input data to cancel out the offset, wherein aligning the input data comprises forming one or more data blocks where at least one of the data blocks comprises data that was received at the first DMA module in two different data blocks; reading, with a cryptography module that is distinct from the first DMA module, the aligned input data out of the first DMA module; and performing, with the cryptography module, the cryptographic operation on the section of the aligned input data; accepting, with a second DMA module that is distinct from the first DMA module, an output of the cryptography module from the cryptography module; and re-introducing, with the second DMA module, the offset into the output of the cryptographic operation; wherein performing the cryptographic operation comprises performing the operation by at least first and second cryptography cores cascaded in a pipeline, the first cryptography core configured to perform decryption of the section of aligned input data and the second cryptography core configured to perform signature verification of the section of the aligned input data.
地址 Kfar Saba IL