Table 128. Initialization Of Aes_Ivrx Registers In Ccm Mode; Figure 249. Ccm Mode Authenticated Decryption - ST STM32F423 Reference Manual

Advanced arm-based 32-bit mcus
Hide thumbs Also See for STM32F423:
Table of Contents

Advertisement

RM0430
AES hardware accelerator (AES)
CCM processing
Figure 249
describes the CCM implementation within the AES peripheral (decryption
example).

Figure 249. CCM mode authenticated decryption

The data input to the generation-encryption process are a valid nonce, a valid payload
string, and a valid associated data string, all properly formatted. The CBC chaining
mechanism is applied to the formatted plaintext data to generate a MAC, with a known
length. Counter mode encryption that requires a sufficiently long sequence of counter blocks
as input, is applied to the payload string and separately to the MAC. The resulting ciphertext
C is the output of the generation-encryption process on plaintext P.
AES_IVRx registers are used for processing each data block, AES automatically
incrementing the CTR counter with a bit length defined by the first block B0.
Table 128
shows how the application must load the B0 data.

Table 128. Initialization of AES_IVRx registers in CCM mode

Register
AES_IVR3[31:0]
AES_IVR2[31:0]
AES_IVR1[31:0]
AES_IVR0[31:0]
Input data
B0[31:0]
B0[63:32]
B0[95:64]
B0[127:96]
RM0430 Rev 8
721/1324
743

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the STM32F423 and is the answer not in the manual?

Table of Contents