Visible to Intel only — GUID: kzr1644256060208
Ixiasoft
1. Introduction
2. Interface Overview
3. Parameters
4. Designing with the IP Core
5. Block Description
6. Cryptographic IP Data Profiles
7. Configuration Registers
8. Design Example
9. Symmetric Cryptographic Intel FPGA Hard IP User Guide Archives
10. Document Revision History for the Symmetric Cryptographic Intel FPGA Hard IP User Guide
4.1. Installing and Licensing Intel® FPGA IP Cores
4.2. Specifying the IP Core Parameters and Options
4.3. Generated File Structure
4.4. Symmetric Cryptographic IP Core Flow
4.5. Dynamically Disabling SM4 Capability
4.6. Error Handling
4.7. Error Reporting
4.8. Resetting the IP Core
4.9. Channel Definition and Allocation
4.10. Byte Ordering
4.11. AXI-ST Single Packet Mode
4.12. AXI-ST Multiple Packet Mode
7.1. Cryptographic Primary Control Register
7.2. Cryptographic Secondary Control Register
7.3. Cryptographic Primary Status Register
7.4. Cryptographic Error Status Register
7.5. Cryptographic Error Control Register
7.6. Cryptographic Packet Error Control 1 Register
7.7. Cryptographic Packet Error Control 2 Register
7.8. Cryptographic Error Code Control 1 Register
7.9. Cryptographic Error Code Control 2 Register
7.10. Cryptographic Error Code Internal Control Register
7.11. Cryptographic Internal Error Control Register
7.12. Cryptographic First Error Log Register
7.13. Cryptographic Packet Error Log 1 Register
7.14. Cryptographic Packet Error Log 2 Register
7.15. Cryptographic Internal Error Log Register
7.16. Cryptographic Wall Clock LSB Register
7.17. Cryptographic Wall Clock MSB Register
7.18. Ternary Control Register
Visible to Intel only — GUID: kzr1644256060208
Ixiasoft
1.1. Terminology
Terminology | Description |
---|---|
AES | Advanced Encryption Standard. |
AAD | Additional Authentication Data. Specifies data that only requires authentication, not encryption or decryption. |
Block Cipher | Algorithm that operates on fixed length blocks of data, one block at a time. |
Ciphertext | The result of an encryption performed on a plaintext. |
CTR | Counter mode. |
CTS | Ciphertext Stealing. Method of encrypting plaintext using a block cipher without padding the message to a multiple of the block size. |
DTLS | Datagram Transport Layer Security. |
EML | Exact Match Lookup. Performs Lookup operation on DDR and produces result which may or may not match based on the lookup. |
HPS | Hard Processor System. |
HSSI SS | High Speed Serial Interface Subsystem. |
GCM | Galois/Counter mode used for symmetric-key block ciphers. |
ICA | Inline Cryptographic Accelerator. |
ICV | Integrity check value. |
IV | Initialization Vector. Continually changing number used in conjunction with a key to encrypt data. |
Key | A string of bits used within an encryption algorithm for altering data so it appears random. |
MAC | Message Authentication Code. |
MAC Security | Media Access Control Security used to protect Ethernet links. |
MCDMA | Multichannel Direct Memory Access. |
Memory SS | Memory Subsystem. |
OSCCA | Office of the State Commercial Cryptographic Administration |
PCIe SS | PCI Express Subsystem. |
Plaintext | The result of a decryption performed on a ciphertext. |
SCA | State Cryptographic Administration. |
SM4 | Block cipher used in the Chinese National Standard for Wireless LAN. |
TCAM | Ternary Content-Addressable Memory. |
Tweak | A string of bits added to the encryption algorithm to mimic random permutation. |
VSIP | Validation Soft IP. |
XTS | XEX-based tweaked-code block mode with ciphertext stealing. |