Difference between revisions of "AES Engine"

From DSiBrew
Jump to navigation Jump to search
(mostly courtesy of neimod. someone needs to wikify those tables a bit :P)
(No difference)

Revision as of 11:51, 5 February 2010

Registers

NAME ADDRESS WIDTH
REG_AESCNT 0x04004400 4
REG_AESBLKCNT 0x04004404 4
REG_AESWRFIFO 0x04004408 4
REG_AESRDFIFO 0x0400440C 4
REG_AESCTR 0x04004420 16
REG_AESMAC 0x04004430 16
REG_AESKEY0 0x04004440 48
REG_AESKEY1 0x04004470 48
REG_AESKEY2 0x040044A0 48
REG_AESKEY3 0x040044D0 48


(:tableend:)

REG_AESCNT

(:table border=1 cellspacing=0 cellpadding=3 bgcolor=#F0F0F0 :) (:cellnr bgcolor=#E0E0E0 :)BIT (:cell bgcolor=#E0E0E0 :)DESCRIPTION (:cellnr:)4-0 (:cell:)Write fifo count (:cellnr:)9-5 (:cell:)Read fifo count (:cellnr:)10 (:cell:)Flush write fifo (:cellnr:)11 (:cell:)Flush read fifo (:cellnr:)15-12 (:cell:)? (:cellnr:)18-16 (:cell:)MAC size (size in bytes = s*2+2, e.g, 7 == 16 bytes) (:cellnr:)19 (:cell:)? (:cellnr:)20 (:cell:)MAC input control (0 = read MAC from FIFO, 1 = read MAC from REG_AESMAC) (:cellnr:)21 (:cell:)MAC status (0 = invalid, 1 = verified) (:cellnr:)23-22 (:cell:)? (:cellnr:)24 (:cell:)Key select (:cellnr:)25 (:cell:)Key schedule busy (:cellnr:)27-26 (:cell:)Key slot (0..3) (:cellnr:)29-28 (:cell:)Mode (0=AES CCM decrypt, 1=AES CCM encrypt, 2=AES CTR) (:cellnr:)30 (:cell:)Interrupt enable (:cellnr:)31 (:cell:)Enable (:tableend:)


REG_AESBLKCNT

(:table border=1 cellspacing=0 cellpadding=3 bgcolor=#F0F0F0 :) (:cellnr bgcolor=#E0E0E0 :)BIT (:cell bgcolor=#E0E0E0 :)DESCRIPTION (:cellnr:)15-0 (:cell:)CBC-MAC associated data blocks to process (1 block = 4 words) (:cellnr:)31-16 (:cell:)CTR or payload data blocks to process (1 block = 4 words) (:tableend:)

REG_AESKEY0/1/2/3

(:table border=1 cellspacing=0 cellpadding=3 bgcolor=#F0F0F0 :) (:cellnr bgcolor=#E0E0E0 :)BYTE (:cell bgcolor=#E0E0E0 :)DESCRIPTION (:cellnr:)0-15 (:cell:)Key data (:cellnr:)16-31 (:cell:)Special key data X (:cellnr:)32-47 (:cell:)Special key data Y (:tableend:)


Key gets updated when either the last word of the key data or the last word of "special key data y" is written. When writing to special key data the actual key is F((key data x) xor (key data y)) where F is some unkown function implemented in hardware.


AES CCM mode (Counter with CBC-MAC)

AES CCM mode combines AES CTR with AES CBC-MAC, to provide confidentiality and authenticity of a message.

The message contains optional associated data and an actual payload. The payload is XORed with an AES CTR generated stream, while AES CBC-MAC is used to generate a MAC based on both the associated data and the payload. The MAC can be used to verify integrity of the message. In addition, a nonce is used to initialize the AES CTR and CBC-MAC modes of operation.

More information can be found in NIST 800-38C or RFC 3610.

The used MAC size can be adjusted in hardware, but usually a MAC size of 16 bytes is used. The hardware has a hardcoded maximum payload size of 24 bits for CCM, and this automatically means the nonce is 12 bytes.

When encrypting or decrypting, the first 12 bytes of REG_AESCTR are used for the nonce. The actual counter used is defined in NIST 800-38C, and looks like this: (02 <nonce> 00 00 00). The last 3 bytes are the counter and is incremented for each subsequent AES CTR operation. The first block for AES CBC-MAC is also defined in NIST 800-38C, and looks like this: (<flags> <nonce> <payloadsize>), where flags is (0 <adata> <m> ), where adata is 1 or 0 if associated data is used, m the encoded mac size, and q the sizebytes (always 2).

CCM hardware encryption

First, the optional associated data is written to the write fifo. During this time, the hardware will internally update the MAC with the associated data. If no associated data is used, this step can be skipped. Then, the actual payload is written to the write fifo. The crypted payload will appear in the read fifo, and during this time the MAC will be internally updated with the payload data. Once all blocks are done, the MAC can be read from the read fifo. The hardware knows when this is because the number of associated blocks and payload blocks are specified in REG_AESBLKCNT.

CCM hardware decryption

It is possible to let the hardware use the dedicated MAC slot in REG_AESMAC or from the write fifo for verification. This option depends on bit 20 of REG_AESCNT. Like encryption, first the optional associated data is written to the write fifo. Then the actual payload is written to the write fifo, and the crypted payload will appear in the read fifo. If using the dedicated MAC slot, the hardware will now verify whether the MAC matches. Otherwise, the MAC must be supplied into the write fifo for verification.