Design method of asynchronous block cipher algorithm coprocessor

A block cipher algorithm and coprocessor technology, applied in the direction of electrical digital data processing, special data processing applications, encryption devices with shift registers/memory, etc., can solve the problem of high resistance to power consumption attack protection capabilities, difficulties in implementing asynchronous circuits, lack of Aided design tools and other issues

Inactive Publication Date: 2009-12-23
NAT UNIV OF DEFENSE TECH
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, compared with the above constant power consumption logic units such as logic units based on sensitive amplifiers, the constant power consumption characteristics of asynchronous circuits are relatively poor, that is, the protection ability is relatively low
Compared with synchronous circuits, the most significant advantage of asynchronous circuits lies in their low power consumption. The low power consumption design and implementation technology based on asynchronous circuits is also the frontier research content in the field of integrated circuits; but asynchronous circuits do not have computing performance and chip Advantages in terms of area
In addition, the realization of asynchronous circuits is relatively difficult, and there is a lack of mature auxiliary design tools
At present, there is no public report on the asynchronous block cipher algorithm coprocessor that adopts asynchronous circuit design to realize high anti-power attack protection ability, high computing performance and low power consumption.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Design method of asynchronous block cipher algorithm coprocessor
  • Design method of asynchronous block cipher algorithm coprocessor
  • Design method of asynchronous block cipher algorithm coprocessor

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0039] figure 1 For adopting the present invention to carry out the design flowchart of asynchronous block cipher algorithm coprocessor, mainly comprise the following steps:

[0040] 1. Divide the block cipher algorithm into sub-modules to obtain sub-modules;

[0041] 2. Sub-module design, including the following steps:

[0042] 2.1 HDL design, get the HDL code of the sub-module.

[0043] 2.2 Logically synthesize the HDL code of the sub-module to obtain the static monorail netlist of the sub-module.

[0044] 2.3 Convert the static single-rail netlist into a netlist composed only of complementary two-input AND gates and OR gates to obtain a composite logic netlist.

[0045] 2.4 Add a delay matching module with the same delay as the sub-module to ensure that the delay from any input signal to the output signal of each sub-module is the same, and the arrival time of any two inputs in the circuit is the same as the two inputs of the gate and the OR gate .

[0046] 3. Integrat...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a design method of an asynchronous block cipher algorithm coprocessor, and the technical problem to be solved is to provide a design method of an asynchronous block cipher algorithm coprocessor. The technical solution is to use each round of iterations in the block cipher algorithm as an independent sub-module; use HDL to design each sub-module and carry out logical synthesis on each sub-module to obtain a static monorail netlist; convert the static monorail netlist into only complementary Composite logic netlist composed of two-input AND gates and OR gates; delay matching for each sub-module, adding a delay matching module with the same delay as the sub-module, and ensuring the delay from the input signal to the output signal of each sub-module The same, and the input arrival time of any AND gate and OR gate is the same; connect each sub-module sequentially to obtain a complete netlist; carry out back-end layout and wiring to obtain the GDS layout. The coprocessor designed by this method has high protection ability against power consumption attack, and has high computing performance and low power consumption characteristics at the same time.

Description

technical field [0001] The invention relates to a design method of a microprocessor, in particular to a design method of a cryptographic algorithm co-processor. Background technique [0002] The security of cryptographic algorithms includes two aspects, one is the security in the mathematical sense of cryptographic algorithms, and the other is the security in the implementation of cryptographic algorithms. Traditional cryptanalysis is a cracking method aimed at the cryptographic algorithm itself, such as differential and linear cryptanalysis. Conventional cryptanalysis and brute force cracking are ineffective for existing widely used cryptographic algorithms. The power consumption attack is an effective method to crack the key by using the weak link in the specific implementation of the cryptographic algorithm, and it is the attack method with the highest security threat in the side-channel attack. Because there is a statistical correlation between the private key in the se...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F17/50H04L9/06
Inventor 王志英童元满陆洪毅任江春王蕾戴葵龚锐石伟阮坚李勇
Owner NAT UNIV OF DEFENSE TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products