Trusted reconfigurable device and using method thereof
A device, trusted technology, applied in the direction of instrument, internal/peripheral computer component protection, electrical digital data processing, etc., can solve the problem of not providing hardware quota data and firmware code tampering, etc.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0054] In the embodiments of the present invention, a Field Programmable Gate Array (Field Programmable Gate Array, FPGA) is used as an example to illustrate the reconfigurable device. Because the FPGA device is a complete chip, since the internal transformation of the chip cannot be realized, the following approximate implementation method is used for illustration.
[0055] like image 3 Shown:
[0056] The encryption algorithm engine selects SHA1 algorithm, ECC algorithm and RSA algorithm.
[0057] The controller selects an 8-bit internal microcontroller with Flash. Internal Flash is used to store root key and session key. Both the root key and the session key are 2048-bit keys.
[0058] The control interface, the configuration interface and the inspection interface respectively select 8-bit wide input and output pins on the original FPGA chip. (A total of 24 bits) The 24-bit input and output interfaces of the single-chip microcomputer are directly connected to the cont...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 