USO0RE40694E

(19) United States (12) Reissued Patent

(10) Patent Number:

Davis (54)

US RE40,694 E

(45) Date of Reissued Patent: (56)

APPARATUS AND METHOD FOR RE-ENCRYPTING DATA WITHOUT UNSECURED EXPOSURE OF ITS NON-ENCRYPTED FORMAT

(75) Inventor:

References Cited U.S. PATENT DOCUMENTS

Derek L. Davis, Phoenix, AZ (US)

(73) Assignee: Intel Corporation, Santa Clara, CA

(Us)

4,558,176 A

* 12/1985

4,588,991 A 4,864,494 A 4,905,277 A

* * *

5/1986 9/1989 2/1990

5,109,152 A

*

4/l992

5,161,193 A 5,381,480

* 11/1992 l/l995

5,533,123 A

(21) Appl.No.: 11/016,685 (22) Filed:

Mar. 31, 2009

Arnoldet al. ............. .. 713/190

Takagi et al. .... ..

Lampson Butter et al. etal. ................ .. .. 380/50

7/1996 Force et al.

OTHER PUBLICATIONS

Dec. 20, 2004

Earl E. SwartZlander, Jr., “ApplicationiSpeci?c VLSL Pro

cessors,” Computer Engineering Handbook, 1992, Chapter 14, pp. 14.14431.

Related US. Patent Documents

Carl H. Meyer and Stephen M. Matyas, “Communication

Reissue of:

(64) Patent No.: Issued: Appl. No.: Filed:

Security and File Security Using Cryptography,” Cryp

5,805,706 Sep. 8, 1998 08/633,581 Apr. 17, 1996

tograhy: A New Dimension in Computer Data Security, 1982, Chapter 4, pp. 1924200, 2084211, 224, 269. * cited by examiner

US. Applications: (60)

Continuation of application No. 10/974,956, ?led on Oct. 28, 2004, now abandoned, which is a continuation-in-part of application No. 08/25 1,486, ?led on May 31, 1994, now Pat. No. 5,539,828, and a continuation-in-part of application No. 08/472,95l, ?led on Jun. 7, 1995, now Pat. No. 5,568,552, which is a division of application No. 08/303,084, ?led on

ABSTRACT

(200601)

encapsulated in an integrated circuit package. The crypto graphic device decrypts information having a ?rst encrypted format that is input into the cryptographic device producing

us. Cl. ........................ .. 713/189; 380/28; 713/153; 713/172

information in a non-encrypted format. The information in ‘he non'encrypted fonna‘ is sllbse?uemly re'encrypted into a second encrypted format which is output from the crypto

_ _ _ Field of Classi?cation Search ................. .. 713/189

graphic device. The decryption and re-encryption operations are accomplished entirely Within the Cryptographic device_

(51) Int_ CL H04L 9/00

(58)

(57)

A cryptographic device formed as an integrated circuit

Sep. 7, 1994, now Pat. No. 5,473,692.

(52)

Primary ExamineriKambiz Zand Assistant ExamineriMatthew Heneghan (74) Attorney, Agent, or FirmiSteven Skabrat

See application ?le for complete search history.

15 Claims, 4 Drawing Sheets

505

f /40 800

'

Ill/PU 7'

PROCESSOR

6/0

l :60/

5 OFFE R

god/U H/ZQB ‘:31 L

222

MEMOR?

346'

ELEMENT

284/

/'

32/

2Z3 O0 7770 T

L

ZOE

F/RS‘T CR PPTOGRHPH/C UNIT

(

340 25/

83o

EOFFER

I'

w 220

SECOND CR‘PPTOéRAPH/O CJ/\// 7'

US. Patent

Mar. 31, 2009

Sheet 3 of4

ENCRVPTED 04774 /~

I eA/mvpreo DATA 007'

US RE40,694 E

sucnypraa mm w

éwmvprso 04714 007' Z‘

/40

/4@ / J

/

CRVPTOéRAPH/C 0N”-

/ PROCESSOR

I

44 r C /49

75”

BUFFER

MEMO/‘1’?

M7

GLEMENT

(449

F1620

FIG.2D 505

F l G. 3 / /4O 1, / 200 I

PROC65$0R

M400 T

8/0 / 5 UFFE R

l :ZO/

god/H lPZOB F1

I' $0.2

FIRST

L248

MEMOR?

CR PPTOGRHP/l/C (/A/IT

ELEMENT :56” 22/

SECOND

0U 779C.) T

5OF'FER

V 880

(

340

%j/

V

/4O

US. Patent

Mar. 31, 2009

Sheet 4 of4

US RE40,694 E

EA/CRPPTED 04m RE‘CE/VéD

V 300

as) THE 6/2949 roe/20pm: DEV/CE

i EA/CRG’PTED wpcrr 04774 /5 OPT/ONQLLV EQFFERED

/ 305

L mm) 7- 04 m /5 ascnvp r50 asws n F/R57'PR65CR/56D

GRVPTOGR/QPH/C ALGOR/?/M

/5/0

?/VD COMMON/m T/O/V KEY

L Pun/v TEXT rs STORED

m/ MEMO/2S" ELEMENT

/3/5

/F A/ECEJSS‘AR?

L THE PLAIN TEX T/5 €NCR9PT£D os/A/e A SECOND PRESCR/BED

CRPprOGRAPH/C ALGORITHM

/32O

‘ AND COMMON/CA9 T/ON KEY

l NEWLY OPT/DNALLP EA/CRVPTED BUFFé'RéED PAT‘! /5

/

V 0077007- xve'wu'r‘ ENCRVPTED

F/G.4

DATA

/ 33o

US RE40,694 E 1

2

APPARATUS AND METHOD FOR RE-ENCRYPTING DATA WITHOUT UNSECURED EXPOSURE OF ITS NON-ENCRYPTED FORMAT

text) from main memory or a mass storage device onto a

?oppy disk. However, neither the storage of information in an encrypted format nor the conventional cryptographic

transmission technique fully protects plain text from unse cured exposure (i.e., outside the con?nes of the element

executing the cryptographic algorithm). For example, in

Matter enclosed in heavy brackets [ ] appears in the original patent but forms no part of this reissue speci?ca tion; matter printed in italics indicates the additions made by reissue.

order to transfer an encrypted document from one computer

to another, the encrypted document would be decrypted to plain text and re-encrypted with a communication key spe ci?c to the targeted recipient. Thus, the plain text will be

CROSS-REFERENCES TO RELATED APPLICATIONS

exposed at least on the system bus and, in those cases where the document is greater in size than main memory, the plain text might be temporarily stored on the computer’s mass

The [named inventor of the] present application [has ?led

storage device (e.g., internal hard disk). This exposure prob

two] is a continuation ofpending US. patent application Ser. No. 10/974,956?led Oct. 28, 2004, now abandoned,

lem poses a number of disadvantages associated with secu

rity.

which is a reissue application of US. Pat. No. 5,805,706.

One clear disadvantage is that plain text may be readable

US. Pat. No. 5,805,706 maturedfrom application Ser. No. 08/633,581, which is a continuation-in-part of co-pending

United States Patent Applications [entitled] (i) “Apparatus and Method for Providing Secured Communications”

20

(application Ser. No. 08/251,486 ?led May 3], 1994) now US. Pat. No. 5,539,828 [“Secured Method for Providing Secured Communications” (application Ser. No. 08/538,

by an unauthorized person in those situations where it is not immediately removed from the internal hard disk or the hard disk is accessible to other computers through a local area network. Even if the sender diligently removes the plain text from the hard disk or the document as plain text is never stored on the hard disk, there is a possibility that an inter

From One Node to Another Node” (application Ser. No.

loper may gain access to the plain text by simply monitoring the system bus of the computer through software (e.g., computer-virus) or hardware means (e. g., logic analyzer).

08/472,951?led Jun. 1995), now US. Pat. No. [5,568,522 and a recently issued patent entitled] 5,568,552 which is a

Another disadvantage is that there is no mechanism to guarantee that only the intended recipient can read the con

869), pending] and [A] (ii) “Method For ProvidingA Roving Software License [In A Hardware Agent-Based System]

division of “Roving Software License [For A] for a Hard ware Agent” (application Ser. No. 08/303,084 ?led Sep. 7, 1994) now US. Pat. No. 5,473,692[)]. The presentApplica

25

tents of a message when the message is sent in an encrypted 30

format to a third party (e.g., system administrator) who is responsible for re-encrypting the message with a different

tion is also related to r‘Apparatus and Methodfor Providing Secured Communications” (application Ser. No. 08/538,

encrypted format.

869) now US. Pat. No. 5,796,840 which is a division ofthe

protect against unauthorized use of data provided through content distribution or by software packages (i.e., copy

08/251,486 application. These applications and patent are owned by the same assignee of the present Applicationiie,

Yet another disadvantage is that there is no mechanism to 35

protection).

by Intel Corp.

Hence, it would be desirable to create a cryptographic device that suf?ciently mitigates access to information in a

BACKGROUND OF THE INVENTION

1. Field of the Invention The present invention relates to the ?eld of cryptography. More particularly, the present invention relates to a crypto

40

graphic device which translates encrypted information from one encrypted format to another without unsecured expo sure

of its non-encrypted format.

45

2. Description of Art Related to the Invention In today’s society, it is becoming more and more desirable from one location to another in a manner which is clear and 50

55

recipient is used for such encryption. Thereafter, the targeted recipient decrypts the encrypted information for his or her own use. This conventional cryptographic transmission tech 60

mation (e.g., con?dential, proprietary, etc.) is being trans mitted.

Likewise, it is further becoming desirable to store digital

sensitive information in a non-encrypted format (i.e., plain

that decrypts information having a ?rst encrypted format that is input into the cryptographic device producing infor mation in a non-encrypted format. The non-encrypted infor mation is subsequently re-encrypted according to a second encrypted format. The information having the second encrypted format is output from the cryptographic device. The decryption and re-encryption operations are accom

plished entirely within the cryptographic device.

nique is commonly used in governmental applications as

information in an encrypted format within main memory or a mass storage device associated with a computer. This is done to prevent an unauthorized person from downloading

BRIEF SUMMARY OF THE INVENTION

The present invention relates to a cryptographic device

unambiguous to a targeted recipient, but incomprehensible to any illegitimate interlopers. Accordingly, before transmission, the digital information is typically encrypted

well as for commercial applications where sensitive infor

same encrypted format. The cryptographic device would vir tually eliminate any interlopers from stealing secure infor mation because the interloper would have to obtain that information from integrated circuits inside the chip package which is clearly more dif?cult than obtaining information from bus lines.

to transmit digital information (i.e., data, control or address)

by a host processor executing an encryption algorithm stored in main memory. A communication key speci?c to a targeted

non-encrypted format (i.e., plain text) originally contained within one source in one encrypted format and needs to be transferred to another source through another or even the

65

BRIEF DESCRIPTION OF THE DRAWINGS

The features and advantages of the present invention will become apparent from the following detailed description of the present invention in which: FIG. 1 is a block diagram of a computer system incorpo rating an cryptographic device associated with the present invention.

US RE40,694 E 4

3

ent buses. The U0 bus 160 transfers information into and from at least one peripheral device in the computer system

FIGS. 2Ai2D are illustrative block diagrams of various

embodiments of the cryptographic device.

100. Examples of the peripheral devices may include, but are not limited to a display device 132 (e.g., cathode ray tube,

FIG. 3 is a more detailed block diagram of another illus

trative embodiment of the cryptographic device. FIG. 4 is a ?owchart illustrating the method for preclud

liquid crystal display, ?at panel display, etc.); an alphanu meric input device 133 (e.g., keyboard, key pad, etc.); a

ing access to information as plain text outside the crypto

cursor control device 134 (e.g., a mouse, trackball,

graphic device.

touchpad, joystick, etc.); a mass data storage device 135

(e.g., magnetic tapes, hard disk drive, ?oppy disk drive,

DETAILED DESCRIPTION OF THE INVENTION

etc.); an information transceiver device 136 (fax machine, modem, scanner etc.) alloWing information to be transfer ring from the computer system 100 to a remotely located

The present invention relates to an apparatus and method for translating information from one encrypted format to the same or another encrypted format Without exposing the intermediary plain text to an unsecured environment. In the folloWing description, numerous detailed are set forth in

system and vice versa; and a hard copy device 137 (e.g.,

plotter, printer, etc.). It is contemplated that the computer system 100 shoWn in FIG. 1 may employ some or all of these components or different components than those illustrated. Besides a computer system, it is further contemplated that

order to provide a thorough understating of the present invention. HoWever, it is apparent to one skilled in the art

that the present invention may be practiced through many different embodiments than that illustrated Without deviating from the spirit and scope of the present invention. In other instances, Well-knoWn circuits, elements and the like are not set forth in detail in order to avoid unnecessarily obscuring

20

the present invention. In the detailed description, a number of cryptography related terms are frequently used to describe certain charac teristics or qualities Which is de?ne herein. A “communica

tion key” is an encoding and/ or decoding parameter used by cryptographic algorithms such as Rivest, Shamir and Adle man (“RSA”) Which uses public and private key pairs and Data Encryption Standard (“DES”) Which uses a select key shared in con?dence betWeen tWo parties. Normally, the communication key is a sequential distribution (“string”) of binary data being “n” bits in length, Where “n” is an arbitrary

receive information in one encrypted format and transmit or

store the information in another encrypted format. These 25

sequence of bus cycles. “Plain text” is de?ned as non

30

another encrypted format. The cryptographic device 140 comprises one or more integrated circuits 141 encapsulated 35

ums.

40

puter system 100 utiliZing the present invention is illus trated. The computer system 100 comprises a plurality of subsystems including a processor subsystem 110, a memory subsystem 120 and an input/output (“I/O”) subsystem 130. These subsystems and a cryptographic device 140 are

45

The decryption unit 143 receives information in a ?rst

encrypted format (“encrypted data in”) and decrypts that information. Thus, the decryption unit 143 is con?gured With the necessary communication key “KEYM” to decrypt the information thereby producing the information as plain

50

The processor subsystem 110 includes the host processor 111 Which executes instructions from the memory sub

text. Thereafter, the decryption unit 143 may be hardWare or

?r'mWare implemented to function accordingly. The encryp tion unit 144 receives the plain text and re-encrypts it according to a selected communication key “KEYOM” to

produce re-encrypted information (“encrypted data out”). 55

is contemplated that more than one processor could be

employed Within the computer system 100. Moreover, the

The encrypted information is output from the cryptographic device 140 to the memory subsystem or mass storage device for storage or to the transceiver unit for transmission to

another remotely located system.

memory subsystem 120 may include a memory controller

The decryption unit 143 and encryption unit 144 may be

121 controlling access to one or more memory device(s) 122

such as dynamic random access memory (“DRAM”), read only memory (“ROM”), video random access memory

cuits 141 from damage, harmful contaminants and make it more dif?cult for interlopers to obtain the plain text or key information. The integrated circuits 141 feature a decryption unit 143 coupled to an encryption unit 144 of Which the functionality of both units is described in a publication

entitled “Applied Cryptography Second Edition: Protocols,

information to be communicated betWeen the subsystems and the cryptographic device 140. It is contemplated that the cryptographic device 140 may alteratively be coupled to an

system 120 and processes information from the computer system 100. While only one host processor 111 is shoWn, it

Within an integrated circuit component package 142, prefer ably hermetically encapsulated, to protect the integrated cir

Algorithms, and Source Code in C” by Bruce Schneider, published in 1996.

coupled together through a system bus 150 Which enables

I/O bus 160 (e.g., a PCI bus or ISA bus), a local bus Within a host processor 111 or any bus mechanism.

(e.g., documents, ?les, etc.) having a selected encrypted for mat from the information transceiver device and to

re-encrypt (i.e., subsequently encrypt) the information into

encrypted information Which may include, but is not limited to digital date representing text, video audio and other medi Referring to FIG. 1, an illustrative embodiment of a com

examples are illustrative and should not be construed as a

limitation to the present invention. Referring noW to FIG. 2A, the cryptographic device 140 is coupled to the system bus alloWing it to receive information

number. A “document” is generally de?ned as information

(e.g., data, address, keys, etc.) being transferred in a

the cryptographic device 140 may be implemented in any electronic system that relies on encrypted communications. For example, these electronic systems may include cable television control boxes, bank ATM machines and perhaps netWorked peripheral nodes that could be con?gured to

60

hardWare or ?r'mWare implemented to function as described

above. Clearly, the decryption unit 143 and encryption unit

(“VRAM”) and the like. The memory device(s) 122 store(s)

144 may be a general purpose microprocessor With crypto

information for use by the host processor 111. The U0 subsystem 130 includes an I/O controller 131

graphic algorithms executed and plain text maintained Within a secure environment or any intelligent electronic

Which acts as an interface betWeen an I/O bus 160 and the 65

device capable of performing this decryption or encryption. It is contemplated that other implementations may be

system bus 150. This provides a communication path for transferring information betWeen devices coupled to differ

used. For example, in FIG. 2B, a buffer 145 may be inter

US RE40,694 E 5

6

posed between the decryption unit 143 and the encryption

second cryptographic unit 250 encrypts the plain text into the second encrypted format and transmits that information to the output buffer 220 via communication line(s) 223. Thereafter, the output buffer 220 transfers the encrypted information to the system bus for storage in the memory

unit 144 to temporarily store the plain text. This implemen tation may be necessary if the encrypted formats differ enough to require timing adjustments to be made. In FIG. 2C, decryption and re-encryption are handled by the same cryptographic “unit” 146 Which feeds back the plain text, preferably from a buffer 147, for re-encryption after decrypt

device or mass storage device or for transmission to a remote

system via the information transceiver device.

ing the input information. In FIG. 2D, decryption and

It is contemplated that copy protection may be provided by merely encrypting at least a portion of the context distrib uted data and that data being decrypted, processed and later

re-encryption are performed by a processor 148 obtaining

requisite encryption and decryption algorithms from a memory element 149. Both the encrypted data input into the cryptographic device 140 and output from the cryptographic device 140 may be transmitted through to the bus through

encrypted for storage Within the cryptographic device. Referring noW to FIG. 4, a ?owchart illustrating the

re-encryption operations of data input into the cryptographic

different or identical connection pins similar to that of FIGS. 2Ai2C. Referring to FIG. 3, a more detailed block diagram of a

device is shoWn. In step 300, data encrypted With the ?rst format is input into the cryptographic device. Next, in optional Step 305, the encrypted data is buffered for timing concerns. Next, in Step 310, the encrypted data is decrypted using a prescribed cryptographic algorithm and communica

general purpose cryptographic device is shoWn incorporat ing features evident in FIGS. 2Ai2D. The cryptographic device 140 includes a processor 200, a plurality of buffers 210 and 220, a memory element 230 and a plurality of cryp

tion key. This operation may be performed through 20

tographic units 240 and 250. The cryptographic device 140 receives encrypted input information normally from a device

implementation. Upon decrypting the data, the plain text is stored in random access memory (Within the device 140) if

coupled to the I/O bus, such as the mass storage device or the information transceiver device, or from the host processor.

The encrypted information is selectively routed to the pro

necessary (Step 315). Thereafter, in Step 320, the plain text is encrypted using a second prescribed cryptographic algo 25

cessor 200 via communication line 201 or to a ?rst crypto

device is desired or the ?rst prescribed algorithm and com

munication key is used in the event that the encryption involves the same encrypted format as received at input. 30

re-encrypted data is output from the cryptographic device

ured to perform encryption or decryption at a sloWer speed

for storage in the mass storage device or transmission

by executing cryptographic algorithms contained in the 35

In the event that the encrypted information propagates

into the ?rst cryptographic unit 240, the ?rst cryptographic unit 240 decrypts the encrypted information into a plain text format and transfers the decrypted information via commu nication line(s) 241 into the memory unit 230. Alteratively, in the event that the encrypted information propagates into the processor 200, the processor 200 executes a particular

embodiments, other embodiments may come to mind to 40

45

format, three alternative data paths could be folloWed. A ?rst data path is Where the plain text is to be encrypted With the 50

this case, the plain text propagates through communication line(s) 242 into the ?rst cryptographic unit 240 Which, this time, encrypts the plain text into the ?rst encrypted format and outputs that information into an output buffer 220 via

communication line(s) 221. The second data path is Where the plain text needs to be encrypted With an encrypted format not provided by either the ?rst or second cryptographic units 240 and 250. In this situation, the plain text is transferred to the processor 200 via communication line(s) 204. The pro cessor 200 receives the plain text and encrypts that informa

those skilled in the art Without departing from the spirit and scope of the present invention. The invention should, therefore, be measured in terms of the claims Which folloWs. What is claimed is:

1. A cryptographic device comprising: an integrated circuit package; a decryption unit that uses a ?rst cryptographic algorithm

203. In order to encrypt the plain text into a second encrypted

same format upon Which the information Was received. In

through the information transceiver device 330. The present invention described herein may be designed in many differ ent methods and using many different con?gurations. While the present invention has been described in terms of various

cryptographic algorithm to decrypt the encrypted informa tion and transmits the decrypted information in its plain text form into the memory unit 230 via communication line(s)

Next, in optional Step 325, the encrypted data is buffered for timing concerns similar to that of Step 305. Thereafter, the

of encrypted format While the processor 200 may be con?g memory element 230.

rithm and communication key in the event that an encrypted

format different from that input into the cryptographic

graphic unit 240 via communication lines 202 depending on

the encrypted format of the input information. The routing selection is normally performed by the host processor 111. The reason for controlling data How is that each crypto graphic unit is able to only decrypt information in one type

hardWare, ?rmWare or software depending on the chosen

55

to decrypt input information having a ?rst encrypted format into information having a non-encrypted format, the decryption unit contained Within the integrated cir cuit package; and an encryption unit coupled to said decryption unit and contained in the integrated circuit package, said encryption unit using a second cryptographic algorithm to re-encrypts said information having the non encrypted format into output information having a sec

ond encrypted format, the cryptographic device con?g ured not to expose the information having the non encryptedformat to an unsecured environment. 60

2. The cryptographic device according to claim 1, Wherein the ?rst encrypted format and the ?rst cryptographic algo

tion upon executing an associated cryptographic algorithm. Thereafter, the processor 200 transfers the encrypted infor mation to the output buffer 220 via communication line(s)

rithm are different from the second encrypted format and the

222. A third alternative data path is Where the plain text is to be encrypted With a format provided by a second crypto graphic unit 250. The plain text is provided to the second cryptographic unit 250 via communication line(s) 251. The

the ?rst encrypted format is identical to the second

second cryptographic algorithm, respectively. 3. The cryptographic device according to claim 1, Wherein 65

encrypted format. [4. The cryptographic device according to claim 1, Wherein said decryption unit and said encryption unit are

US RE40,694 E 8

7 collectively a cryptographic processor Which decrypts the input information to produce the information having the non-encrypted format and Which re-encrypts the information having the non-encrypted format into the output informa

?gured not to expose the information having a non encryptedformat to an unsecured environment.

10. A system comprising: a bus;

tion.]

a host processor coupled to said bus; and a cryptographic device coupled to said bus and imple

5. The cryptographic device component according to claim 1 further comprising a storage unit that temporarily contains therein the information having the non-encrypted format before transfer into said encryption unit. 6. The cryptographic device according to claim 5, Wherein

mented Within a single integrated circuit package said

cryptographic device internally decrypting input infor mation having a ?rst encrypted format into output information having a second encrypted format, said

said decryption unit includes at least one of a ?rst crypto

cryptographic device including

graphic processor and a processor executing a cryptographic

a decryption unit to use a ?rst cryptographic algorithm

algorithm contained Within said storage unit.

to decrypt the input information into information having a non-encrypted format, and

[7. The cryptographic device according to claim 6, Wherein said encryption unit includes at least one of the ?rst cryptographic processor, the processor and a second crypto

an encryption unit to use a second cryptographic algo rithm to re-encrypt said information having the non

graphic processor] 8. A cryptographic device comprising: decryption means for using a ?rst cryptographic algorithm to decrypt input information having a ?rst encrypted format into information having a non-encrypted for mat; encryption means for using a second cryptographic algo rithm to re-encrypt said information having the non encrypted format into output information having a sec

encrypted format into the output information, the 20

encrypted format and the ?rst cryptographic algorithm of 25

30

environment.

9. Implemented Within an integrated circuit package, a

cryptographic device comprising:

encrypted format into output information having a sec ond encrypted format to be transferred to said output

35

40

45

50

one of a ?rst cryptographic processor and a processor

executing a cryptographic algorithm contained Within said

one of the ?rst cryptographic processor, the processor and a

second cryptographic processor.] 17. A system in communication With a remote device

remotely located from the system, comprising:

the output information to be transferred to said output

a bus; 55

a host processor coupled to said bus; and

a cryptographic device coupled to said bus, said crypto

graphic device internally decrypting input information from the remote device and internally encrypting out put information to said remote device, said crypto 60

graphic device including a ?rst cryptographic processor coupled to said bus and contained in an integrated circuit package, said ?rst

tion into the output information and transfers the output information to said output buffer; and

cryptographic processor for selectively decrypting

an integrated circuit package containing the input buffer, the output buffer, the ?rst cryptographic processor, the processing unit, the memory element and the second cryptographic processor, the cryptographic device con

porarily contain said information having the non-encrypted format before transferring said non-encrypted information into said encryption unit.

[16. The system according to claim 15, Wherein said encryption unit of said cryptographic device includes at least

encrypted format and selectively re-encrypts said infor mation using the second cryptographic algorithm into

element and said output buffer, said second crypto graphic processor selectively re-encrypts said informa

graphic device are collectively a cryptographic processor Which decrypts the input information into said information having the non-encrypted format and Which re-encrypts said information into the output information.] 14. The system according to claim 10, Wherein said cryp

memory element.

output buffer, said processing unit selectively decrypts the input information using the ?rst cryptographic algo

a memory element coupled to said ?rst cryptographic pro cessor and said processing unit, at least said informa tion is contained Within said memory element; a second cryptographic processor coupled to said memory

12. The system according to claim 10, Wherein the ?rst encrypted format of said input information of said crypto graphic device is identical to the second encrypted format of said output information. [13. The system according to claim 10, Wherein said decryption unit and said encryption unit of said crypto

15. The system according to claim 14, Wherein said decryption unit of said cryptographic device includes at least

a processing unit coupled to said input buffer and said

buffer;

cryptographic algorithm of said output information, respec

tographic device further includes a memory element to tem

buffer;

rithm to produce said information having the non

said input information of said cryptographic device are dif ferent from the second encrypted format and the second

tively.

decryption means and the encryption means, the cryp

an input buffer; an output buffer; a ?rst cryptographic processor coupled to said input buffer and said output buffer, said ?rst cryptographic proces sor selectively using a ?rst cryptographic algorithm to decrypt input information having a ?rst encrypted for mat to produce information having a non-encrypted format and using a second cryptographic algorithm to selectively re-encrypt said information having the non

unsecured environment.

11. The system according to claim 10, Wherein the ?rst

ond encrypted format; and integrated circuit packaging means for containing the tographic device con?gured not to expose the informa tion having the non-encrypted format to an unsecured

cryptographic device configured not to expose the information having a non-encrypted format to an

65

the input information to produce information having a non-encrypted format and selectively re-encrypting said information having the non-encrypted format into the output information,

US RE40,694 E 9

10

a processing unit coupled to said bus, said processing

an output buffer connected betWeen (i) said bus and (ii) said ?rst cryptographic processor, said second crypto

unit for selectively decrypting the input information to produce said information into the output

graphic processor and said processing unit, said output

information,

buffer receives said output information and places said

a memory element coupled to the ?rst cryptographic processor and said processing unit, said memory ele ment for containing at least said information, and a second cryptographic processor coupled to said memory element and said bus, said second crypto

output information on said bus.

19. A method for internally decrypting and re-encrypting data to produce output data having a requisite encrypted format, the method comprising the steps of:

graphic processor for selectively re-encrypting said

receiving data having a ?rst encrypted format Within a secure environment of an integrated circuit package;

information to produce said output information for subsequent output to the remote device, the crypto graphic device con?gured not to expose the informa

decrypting said data Within the secure environment to pro

tion having a non-encrypted format to an unsecured

duce data having a non-encrypted format; and

environment.

re-encrypting Within the secure environment said data having a non-encrypted format into data having a sec

18. The system according to claim 17, Wherein said cryp

tographic device further comprises

ond encrypted format without exposing the data having

an input buffer connected betWeen (i) said bus and (ii) to said ?rst cryptographic processor and said processing

a non-encrypted format to an unsecured environment

between the de-crypting and re-encrypting steps.

unit, said input buffer receives said input information and transfers said input information to one of said ?rst

cryptographic processors and said processing unit; and

20

god/U H/ZQB ':31

Dec 20, 2004 - tograhy: A New Dimension in Computer Data Security,. 1982, Chapter .... from the hard disk or the document as plain text is never stored on the ...

883KB Sizes 1 Downloads 247 Views

Recommend Documents

2015 05 31 Newsletter May 31 2015.pdf
Saggart Pastoral Council Meeting. Tuesday 2nd June at 8.00pm. Saggart Parish Pastoral Council will meet on Tuesday 2nd June at. 8.00pm. If there is anything ...

1660-01-31
Oct 12, 2017 - Authority: T.C.A. § 70-1-206. Administrative History: Original rules filed July 14, 2017; effective. October 12, 2017. 1660-01-31-.03 IMPORTATION AND EXPORTATION. (1) All shipments of mussels imported into Tennessee by a person, firm,

1660-01-31
Oct 12, 2017 - No person, firm, or corporation shall be in possession of ... The payment to TWRA shall be calculated from receipts filled out by the wholesale ...

31.pdf
yr' no ouo

31.pdf
In the last decade, the Internet and price declines for computer hardware, telecom, storage ... Although the transformation is clearly not understood, it is clear that ...

31.pdf
A type of reproduction where fusion of gamates. occurs is ... What is Bt cotton? 1 ... HS/XII/Sc/Bio-Bot/13/31. Page 4 of 5. 31.pdf. 31.pdf. Open. Extract. Open with.

Tuesday, May 31, 2011
May 31, 2011 - a _B_. 11. chat a. A standard short-distance wireless technology. 12. tracks b. A viewing area less than or equal to the screen size.

31.pdf
Cognition As A Research Object. In The ... e-mail : [email protected]. Abstract ... 31.pdf. 31.pdf. Open. Extract. Open with. Sign In. Details. Comments.

1660-01-31
Oct 12, 2017 - (1) No person, firm, or corporation shall take, buy, sell, barter, or possess mussels (alive or dead) that are not of the species and sizes listed in ...

Accounting (9706/31)
Choose the one you consider correct and record your choice in soft pencil on the ... The company decides to purchase 60 000 of its own shares for $400 000.

news & views - Troop 31
Jul 19, 2015 - Software Engineer visited the class and discussed ... about the company and hear first hand on the company's mission focusing on education.

Accounting (9706/31)
*6900024638*. UNIVERSITY OF CAMBRIDGE INTERNATIONAL EXAMINATIONS. General Certificate of Education Advanced Level. ACCOUNTING. 9706/31.

Accounting (9706/31)
income statement (profit and loss account). 10 000 .... 28 A machine costs $160 000 with an estimated residual value of $20 000 after four years. During each of ...

,31 £33
Dec 23, 1980 - For data speeds above 2400 bits per second two physically separate two-wire lines of voice band width are required. If two-way (full duplex) high-speed simultaneous communication between two points could be accomplished at full bandwid

,31 £33
Dec 23, 1980 - 28, data recovery east 29 for [restoring received] determining .... such as a tape machine, card punch or a computer. Echo canceller 34 is ...

news & views - Troop 31
Jul 19, 2015 - BSA Troop 31. State College, PA. July/August. 2015. NITTANY VALLEY DISTRICT, JUNIATA VALLEY COUNCIL * CHARTERED BY ST.

Tuesday, May 31, 2011
May 31, 2011 - "'1' JL» sump” #1.; wt)... ,b-i auger” mafia-m,. (.QJlJ 074.; JA l) no 1. habit 2. artificial 3. memorize 4. expert 5. combine A. 6. amplify 7. obvious 8.

Accounting (9706/31)
What is the correct accounting treatment for these items at 31 August 2009? ... 18 A company makes three products for which the following details are given.

31 TKI.pdf
... men- setup, memelihara dan melacak. serta. memecahkan masalah. (troubleshooting) pada. komputer personal. 8. Melakukan Installasi. Sistem Operasi Dasar. 8.2. Melaksanakan installasi. Sistem Operasi sesuai installasi. manual. 8.2.1. Melakukan Inst

31
EMC 751 • Daily Math Practice. WEEK 31. WEEK 31. = 6 [^h]ZgbVc XVj\]i '- [^h]# =Z. hdaY &- [^h] VcY \VkZ VlVn *#. How many fish did he have left? fish. 4. G. G.

circular 31.pdf
with their objective observations and creative suggestions and. proposals. The procedure and dynamics of the assembly will be. according to the Norms and ...

SS-31-BusStudies.pdf
19. Explain the meaning of investment decision under financial decision. and describe 'Short-term investment decisions'. 4. Page 4 of 7. SS-31-BusStudies.pdf.