Unlock instant, AI-driven research and patent intelligence for your innovation.

Instruction code dynamic encryption and decryption method

An instruction code, encryption and decryption technology, applied in the field of CPU core design, can solve problems such as cracking risk reduction, being cracked, changing encryption and decryption methods, etc., achieving high performance and maintaining performance

Active Publication Date: 2019-04-09
NO 47 INST OF CHINA ELECTRONICS TECH GRP
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, although this protects the hard disk to a certain extent, it requires an additional encryption chip, and the cost is high, and there is still a risk of being cracked; at the same time, since there is no encryption based on the instruction code, the risk of cracking may also be reduced; because The encryption algorithm of the system is fixed, so it cannot be adjusted in real time, nor can the encryption and decryption methods be changed online and dynamically

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Instruction code dynamic encryption and decryption method
  • Instruction code dynamic encryption and decryption method
  • Instruction code dynamic encryption and decryption method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0027] The specific implementation manners of the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments.

[0028] In this method, by way of software, a compiler is used to divide the instruction code OPCODE domain segment into several parts and insert them into each domain segment to encrypt; when the encrypted program is running, the CPU core decrypts the instruction through hardware logic.

[0029] The CPU core Pipeline includes an instruction fetch module, a decoder, an executor, and write-back. The decoding process involved in this method is performed in the decoder.

[0030] The decoder includes decoding control, decryption, branch prediction result return, address generation and register read module; both the decryption module and the register read module can access the Regbank (general purpose register file).

[0031] The decoding control module supports pre-decoding operations, and mainly analyzes the ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to an instruction code dynamic encryption and decryption method. The method comprises the steps of obtaining a non-secret instruction or an encryption instruction compiled by a compiler; carrying out Pre-decoding, analyzing a password segment of the instruction, and determining whether the current instruction is an encrypted instruction or a non-encrypted instruction; Decrypting and decoding the encryption instruction; directly decoding the non-secret instruction; And performing instruction execution on the decoded instruction code. According to the invention, bottom layer encryption and decryption can be carried out through software and hardware combination modes of compiler encryption and CPU kernel decryption, and an encryption instruction set and a non-secret instruction set are compatible at the same time.

Description

technical field [0001] The invention belongs to the field of CPU core design, in particular to a method for dynamic encryption and decryption of instruction codes. Background technique [0002] Encryption algorithms are mostly in the software field. Although various algorithms are becoming more and more complex and more secure, once the pure software algorithm is obtained, it may be cracked. [0003] At present, the hardware encryption technology uses a dedicated encryption chip, which will correspond to and encrypt the encryption chip information, proprietary key information, and hard disk information, and write it into the main partition table of the hard disk at the same time. [0004] However, although this protects the hard disk to a certain extent, it requires an additional encryption chip, and the cost is high, and there is still a risk of being cracked; at the same time, since there is no encryption based on the instruction code, the risk of cracking may also be redu...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/72G06F9/30G06F9/38
CPCG06F9/30145G06F9/3867G06F21/72
Inventor 郭庆隆
Owner NO 47 INST OF CHINA ELECTRONICS TECH GRP