Similarly to CM7, all lookup tables must be placed in DTCM memory.
scalar only
Uses a single T table per enc/dec cipher and additional inv_sbox for final round in decryption.
similarly to CM7, dtcm access pattern can be timed by DMA
uses diffused 4 T tables
fully resistant to bank timming attacks
Cipher function | RA8D1 - CM85_1T | RA8D1 - CM85_d4T |
---|---|---|
setEncKey<128> |
120 | |
setEncKey<192> |
||
setEncKey<256> |
||
encrypt<128> |
263 | 273 |
encrypt<192> |
313 | 325 |
encrypt<256> |
363 | 377 |
setDecKey<128> |
||
setDecKey<192> |
||
setDecKey<256> |
||
decrypt<128> |
||
decrypt<192> |
||
decrypt<256> |
Function | code size in bytes | stack usage in bytes | notes |
---|---|---|---|
CM85_1T_AES128_keyschedule_enc |
124 | 24 | uses Te2 table |
CM85_1T_AES_encrypt |
446 | 40 | uses Te2 table |
CM85_d4T_AES_encrypt |
342 | 56 | uses d4Te table, sensitive (partially processed in final round) data visits stack |