Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Programmable security processor

A security processor and program memory technology, applied in the field of programmable security processors, to achieve the effects of reducing time and number of instructions, improving execution efficiency, and saving time

Inactive Publication Date: 2008-09-17
INST OF COMPUTING TECH CHINESE ACAD OF SCI
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Therefore, a simple dedicated cryptographic chip is not enough

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Programmable security processor
  • Programmable security processor
  • Programmable security processor

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0050] In order to make the objectives, technical solutions and advantages of the present invention clearer, the present invention will be further described in detail below with reference to specific embodiments and accompanying drawings.

[0051] The processor architecture of the present invention is a structure that can support programmability. By analyzing the basic operations of most cryptographic operations, and then setting these basic operation units, multiple encryption and decryption algorithms can be implemented through program control and basic operations.

[0052] Most encryption and decryption algorithms, especially block ciphers, such as RSA, AES, etc., involve a large number of cycles.

[0053] For example, in the RSA algorithm, assuming that the key is {d, n}, the encrypted and decrypted data should first be divided into several groups, and each group is encrypted separately, which is a large cycle; The algorithm used is to express the key d as a binary code, a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A programmable safety processor consists of program storage, control stack, control decoder, operation decoder, RAM controller, operation executor, operation stack and interface module. It is featured as supporting programmable structure, setting with some basic operation units and utilizing program control and said basic operation unit to realize multiple ciphering deciphering / algorithm.

Description

technical field [0001] The invention relates to the technical field of microprocessor design in integrated circuit design, in particular to a programmable safety processor. Background technique [0002] Today's society has entered the information age. With the development and application of network information technology, information security is related to the fate of the country and individuals. Information security has attracted more and more attention of the country, society and individuals. [0003] Information security is mainly based on various encryption and decryption algorithms, which generally require a large amount of computation. In a wide range of embedded application systems, the computing power of general embedded microprocessors is limited, and it takes a long time to perform an encryption and decryption operation, which makes the microprocessor incompetent in some application fields that require both security and real-time performance. . [0004] For examp...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/00H04L9/14G06F21/72
Inventor 何子键徐勇军谢磊李晓维
Owner INST OF COMPUTING TECH CHINESE ACAD OF SCI
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products