欢迎访问ic37.com |
会员登录 免费注册
发布采购

3DES-XX 参数 Datasheet PDF下载

3DES-XX图片预览
型号: 3DES-XX
PDF下载: 下载PDF文件 查看货源
内容描述: [Core3DES]
分类和应用:
文件页数/大小: 13 页 / 148 K
品牌: ACTEL [ Actel Corporation ]
 浏览型号3DES-XX的Datasheet PDF文件第4页浏览型号3DES-XX的Datasheet PDF文件第5页浏览型号3DES-XX的Datasheet PDF文件第6页浏览型号3DES-XX的Datasheet PDF文件第7页浏览型号3DES-XX的Datasheet PDF文件第9页浏览型号3DES-XX的Datasheet PDF文件第10页浏览型号3DES-XX的Datasheet PDF文件第11页浏览型号3DES-XX的Datasheet PDF文件第12页  
Core3DES  
Decryption  
To begin the process of decrypting data, the following  
inputs are set:  
order in which the three cipher sub-keys are required  
differs from the encryption process (described in the  
previous section); cipher sub-key three is required first,  
cipher sub-key two is next, and cipher sub-key one is last.  
1. K[1:64] is set to the third of three cipher sub-keys  
("ck3" in Figure 9) to encrypt the data.  
After 48 clock cycles of the EN input being held  
continuously at a logic '1' value, the QVAL signal will  
transition from logic '0' to logic '1' and remain valid for  
one clock cycle, indicating that valid plaintext (un-  
encrypted data, shown as q1 in Figure 9) is available on  
the Q[1:64] outputs. Note that the decrypted plaintext  
data is only available during clock cycle 48, thus the user  
must register or latch the data on Q[1:64] using the  
QVAL signal as a qualifying register enable or latch  
enable.  
2. D[1:64] is set to the ciphertext data ("d1" in Figure  
9) to be decrypted.  
3. ED is set to logic '0'.  
4. EN is set to logic '1'.  
After 15 clock cycles of the EN input being held  
continuously at a logic '1' value, the KSEL[1:0] outputs  
will change from '10' to '01', indicating that the second  
of three cipher sub-keys (ck2 in Figure 9) will need to be  
presented on the K[1:64] inputs, which must be done by  
the rising clock edge of the start of clock cycle 17 (one  
complete clock cycle of slack is built into the Core3DES  
circuitry). After 31 clock cycles of the EN input being held  
at a logic '1', the KSEL[1:0] outputs will change from '01'  
to '00', indicating that the first of three cipher sub-keys  
(ck1 in Figure 9) will need to be presented on the K[1:64]  
inputs, which must be done by the rising clock edge of  
the start of clock cycle 33. Note that for decryption, the  
As shown in Figure 9, continuous decryption is possible.  
For example, the second 64-bit ciphertext data word (d2  
in Figure 9) can be immediately decrypted by presenting  
d2 on the D[1:64] inputs by the rising clock edge of clock  
cycle 49 and by presenting the cipher sub-keys ck3, ck2,  
and ck1 in the sequence described earlier in this section.  
...  
...  
...  
47 48 49 50  
cycle  
1
2
15 16 17 18  
31 32 33 34  
CLK  
K[1:64]  
D[1:64]  
ED  
ck3  
d1  
ck2  
ck1  
ck3  
d2  
EN  
10  
10 01  
01 00  
00 10  
KSEL[1:0]  
q1  
Q[1:64]  
QVAL  
Undefined  
Don't care  
Figure 9 Example Decryption Sequence  
8
v5.0