Method for generating energy consumption information of instruction level password equipment
A cryptographic device and energy consumption technology, which is applied in the field of information security, can solve problems such as incompatibilities with energy analysis, inability to generate energy consumption information for microprocessors, and methods for generating energy consumption information that have not yet appeared.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0045] Taking the instruction-level energy consumption information generation of the cryptographic algorithm under the C51 architecture as an example, the present invention is mainly implemented in the following four basic steps.
[0046] (1) Precompile
[0047] Compile the assembly code whose input object is the cryptographic algorithm C51, and obtain the assembly instruction sequence of the source program. If the system input is a high-level language implementation code such as C of the cryptographic algorithm, the implementation code under the C51 instruction system with equivalent functions or the assembler code of other instruction systems can be obtained by using compilation tools such as Keil uVision.
[0048] (2) Instruction paving
[0049] Flatten non-sequentially executed instructions (for example, jump instructions) in the cryptographic algorithm assembly instruction sequence into sequentially executed instruction sequences. The instruction paving technology mainl...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 