Unlock instant, AI-driven research and patent intelligence for your innovation.

Instruction system with reconfigurable password coprocessor

A cryptographic coprocessor and instruction system technology, applied in the field of instruction system, can solve the problems of prolonging the design cycle, increasing the design cost, poor adaptability of special cryptographic chips, etc., and achieve the effect of reducing redundant codes and length

Inactive Publication Date: 2005-07-06
HISENSE
View PDF0 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] 1. The dedicated cryptographic chip can only implement its specific algorithm during use, and users can only use this predetermined cryptographic algorithm to encrypt / decrypt data and cannot be replaced at will;
[0005] 2. The special cryptographic chip itself has poor adaptability and cannot meet the requirements of different users or the same user for different cryptographic algorithms
If the algorithm needs to be replaced, the chip must be replaced, which increases the design cost and prolongs the design cycle;
[0006] 3. Any cryptographic algorithm may be broken. Once the cryptographic algorithm is broken or the cryptographic algorithm cannot be used due to other reasons, it is necessary to upgrade the original cryptographic algorithm. However, it is impossible to upgrade the dedicated cryptographic chip, so there is no expansion poor security
However, there is no prior public disclosure in the prior art, and the circuit design of the reconfigurable cryptographic chip is also blank, and there is no related technology for the design of the instruction system of the reconfigurable cryptographic chip.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0061] The instruction system of the reconfigurable cryptographic coprocessor as described in the present invention can realize various types of cryptographic algorithms, it adopts a very long instruction word (VLIW) structure, and the instruction length is 202 bits (actually, due to the minimum The storage unit is a byte, so in practical applications, we need to pad the instruction so that its length is an integer multiple of bytes, that is, 208 bits).

[0062] insformat[201:200]

inscode[199:0]

[0063] in:

[0064] insformat is an instruction format control field, insformat=00 indicates an execution instruction, insformat=01 indicates a configuration instruction, insformat=10 indicates a stop instruction, and insformat=11 indicates a jump instruction.

[0065] inscode is the instruction code field.

[0066] The instruction system of the reconfigurable cryptographic coprocessor has the following four instruction formats, namely: execute instruction, conf...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

This invention refers to an instruction system of reconfigurable cipher coprocessor adopting very long instruction word (VLIW), which contains execution instruction, configuration instruction, stop instruction and skip instruction. Said instruction system changes the problem of current special cipher chip (without instruction system) only realizing special cipher algorithm and has good flexibility and use performance.

Description

technical field [0001] The invention relates to an instruction system of a reconfigurable cryptographic coprocessor. Background technique [0002] At present, with the development and application of network information technology, daily office and life are increasingly dependent on the network environment for communication and information sharing. Therefore, accurate transmission of information and effective confidentiality in the process of network communication have become important issues for safe use of the network. [0003] Cryptographic chips are the key core components for building information security products. The cryptographic chips widely used at home and abroad are dedicated devices designed for specific cryptographic algorithms. The architecture of the chip is fixed and not easy to change, and the implementation of the cryptographic algorithm is done by hardware, so there is no corresponding instruction system. Thereby there are following shortcoming and defici...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/16
Inventor 曲英杰刘卫东战嘉瑾丁勇何云鹏刘志恒张世友
Owner HISENSE