Check patentability & draft patents in minutes with Patsnap Eureka AI!

Micro-processor kernel device used for cryptography arithmetic

A microprocessor core and cryptography technology, applied in the field of information security, can solve problems such as small data size, instruction to complete a single function, and the same or similar functions are difficult to share.

Active Publication Date: 2009-03-18
BEIJING TONGFANG MICROELECTRONICS
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

2) The data size of the algorithm is small, but the access density is high
[0004] In the software implementation mode, the algorithm program and other programs of the system run on the same general-purpose processor. The function is flexible (parameters are easy to set), but the disadvantage is that the program can only use general-purpose instructions, and the cost of realizing special calculation functions is high, and one instruction can only complete a single function, which cannot achieve the parallel pipeline processing method commonly used in hardware implementation, so The calculation speed is low; at the same time, because the cryptographic program and other programs run on the same processor, the key and data are stored in the ordinary memory, which is easy to be attacked and has low security; in addition, it cannot be used in embedded applications (such as smart card)
[0005] In the hardware implementation mode, the dedicated hardware module implements the required cryptographic algorithm, and several sub-steps can be processed in parallel and pipelined according to the characteristics of the algorithm, thereby greatly improving the calculation speed; at the same time, the cryptographic operation is completed inside the hardware, which is not easily affected by External attacks, high security; the disadvantage is that the hardware acceleration module is usually only designed for one encryption algorithm, and the parameters of the algorithm are not easy to change (for example, only fixed-length operations can be provided for the RSA algorithm), which lacks flexibility and versatility
In addition, when multiple algorithms are required, it is necessary to design their own acceleration hardware for each algorithm. It is difficult to share the same or similar functions in different hardware, which makes the cost of the system higher.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Micro-processor kernel device used for cryptography arithmetic
  • Micro-processor kernel device used for cryptography arithmetic
  • Micro-processor kernel device used for cryptography arithmetic

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0034] see figure 1 and figure 2 , the present invention includes an instruction register 11, an instruction decoding unit 12, a register file 13, a data operation unit 14, a program address generating unit 15, a program memory interface 16, a data memory interface 17, a cryptography acceleration module interface 18, including DES cryptography The cryptography acceleration module 19 of the acceleration module 191 and the AES cryptography acceleration module 192 . The register file 13 includes a program counter 131 , a stack pointer 132 , a data pointer 133 , an acceleration module pointer 134 , a data register 135 , an index register 136 , a comparison register 137 and a bit register 138 . The instruction decoding unit 12 includes a program control sub-instruction decoding unit 121, a memory access sub-instruction decoding unit 122, an acceleration module access sub-instruction decoding unit 123, a register copy sub-instruction decoding unit 124, an arithmetic logic sub-inst...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A kind of micro-processor inner core used for cryptology calculation relates to the cryptology technology in the information security field. The invention is connected with the program memory and data memory, used for accelerating the cryptology calculation. The invention includes: instruction register, instruction decode unit, register stack including program counter, stack pointer, data pointer, accelerating module pointer, data register, index register, comparison register and bit register, data calculation unit, program address generation unit, program memory interface, data memory interface, cryptology calculation module interface and cryptology calculation module. Comparing with current technology, the invention can not only get higher calculation speed but also make the algorithm function more flexible and more general with the way to bond the software and hardware, and it is characterized in low-cost, high performance, function collocation, flexibility and generality.

Description

technical field [0001] The invention relates to cryptography technology in the field of information security, in particular to a microprocessor core device for cryptography operations. Background technique [0002] Cryptography is a basic technology in modern information technology. It is widely used in various fields involving information security, such as data encryption, identity recognition, and electronic transactions. Efficient and safe cryptographic operations are an important component of a security system. Basic cryptographic algorithms can be roughly divided into symmetric key algorithms (such as DES and AES), asymmetric key algorithms (such as RSA and ECC), and digest algorithms (such as MD5 and SHA-1). It is an essential computing function in a system (such as a public key infrastructure, PKI). [0003] In the prior art, the common characteristics of general cryptographic algorithms are: 1) The program scale of the algorithm is small, and the flow and structure ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/00G06F15/76G06F21/71
Inventor 杨湘渝王晓丹黄钧侯书郡徐磊陈冈
Owner BEIJING TONGFANG MICROELECTRONICS
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More