scalar only
similarly to CM7, dtcm access pattern can be timed by DMA
uses diffused 4 T tables
fully resistant to bank timming attacks
not optimized yet
Cipher function | RA8D1 - CM85_1T | RA8D1 - CM85_d4T |
---|---|---|
setEncKey<128> |
120 | |
setEncKey<192> |
||
setEncKey<256> |
||
encrypt<128> |
263 | 299 |
encrypt<192> |
313 | 355 |
encrypt<256> |
363 | 411 |
setDecKey<128> |
||
setDecKey<192> |
||
setDecKey<256> |
||
decrypt<128> |
||
decrypt<192> |
||
decrypt<256> |
Function | code size in bytes | stack usage in bytes | notes |
---|---|---|---|
CM85_1T_AES128_keyschedule_enc |
124 | 24 | uses Te2 table |
CM85_1T_AES_encrypt |
446 | 40 | uses Te2 table |
CM85_d4T_AES_encrypt |
276 | 72 | uses d4Te table, sensitive (partially processed) data visits stack |