Micro-processor kernel used for cryptography arithmetic

A microprocessor core and cryptography technology, applied in the field of information security, can solve problems such as high security, low computing speed, and difficulty in sharing the same or similar functions

Active Publication Date: 2008-02-27
BEIJING TONGFANG MICROELECTRONICS
View PDF0 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

2) The data size of the algorithm is small, but the access density is high
[0004] In the software implementation mode, the algorithm program and other programs of the system run on the same general-purpose processor. The function is flexible (parameters are easy to set), but the disadvantage is that the program can only use general-purpose instructions, and the cost of realizing special calculation functions is high, and one instruction can only complete a single function, which cannot achieve the parallel pipeline processing method commonly used in hardware implementation, so The calculation speed is low; at the same time, because the cryptographic program and other programs run on the same processor, the key and data are stored in the ordinary memory, which is easy to be attacked and has low security; in addition, it cannot be used in embedded applications (such as smart card)
[0005] In the hardware implementation mode

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Micro-processor kernel used for cryptography arithmetic
  • Micro-processor kernel used for cryptography arithmetic
  • Micro-processor kernel used for cryptography arithmetic

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0034] 1 and 2, the present invention includes an instruction register 11, an instruction decoding unit 12, a register file 13, a data operation unit 14, a program address generation unit 15, a program memory interface 16, a data memory interface 17, and a cryptographic acceleration module interface 18. A cryptography acceleration module 19 including a DES cryptography acceleration module 191 and an AES cryptography acceleration module 192 . The register file 13 includes a program counter 131 , a stack pointer 132 , a data pointer 133 , an acceleration module pointer 134 , a data register 135 , an index register 136 , a compare register 137 and a bit register 138 . The instruction decoding unit 12 includes a program control sub-instruction decoding unit 121, a memory access sub-instruction decoding unit 122, an acceleration module access sub-instruction decoding unit 123, a register copy sub-instruction decoding unit 124, an arithmetic logic sub-instruction decoding unit Code ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A kind of micro-processor inner core used for cryptology calculation relates to the cryptology technology in the information security field. The invention is connected with the program memory and data memory, used for accelerating the cryptology calculation. The invention includes: instruction register, instruction decode unit, register stack including program counter, stack pointer, data pointer, accelerating module pointer, data register, index register, comparison register and bit register, data calculation unit, program address generation unit, program memory interface, data memory interface, cryptology calculation module interface and cryptology calculation module. Comparing with current technology, the invention can not only get higher calculation speed but also make the algorithm function more flexible and more general with the way to bond the software and hardware, and it is characterized in low-cost, high performance, function collocation, flexibility and generality.

Description

technical field [0001] The invention relates to cryptography technology in the field of information security, in particular to a microprocessor core used for cryptography operations. Background technique [0002] Cryptography is a basic technology in modern information technology. It is widely used in various fields involving information security, such as data encryption, identity recognition, and electronic transactions. Efficient and safe cryptographic operations are an important component of a security system. Basic cryptographic algorithms can be roughly divided into symmetric key algorithms (such as DES and AES), asymmetric key algorithms (such as RSA and ECC), and digest algorithms (such as MD5 and SHA-1). It is an essential computing function in a system (such as a public key infrastructure, PKI). [0003] In the prior art, the common characteristics of general cryptographic algorithms are: 1) The program scale of the algorithm is small, and the flow and structure ar...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/00G06F15/76G06F21/71
Inventor 杨湘渝王晓丹黄钧侯书郡徐磊陈冈
Owner BEIJING TONGFANG MICROELECTRONICS
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products