Programmable security processor

A security processor and program memory technology, applied in the field of programmable security processors, to save time, improve algorithm execution efficiency, reduce time and the number of instructions

Inactive Publication Date: 2007-05-09
INST OF COMPUTING TECH CHINESE ACAD OF SCI
View PDF1 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Therefore, a simple dedicated cryptographic chip is not enough

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Programmable security processor
  • Programmable security processor
  • Programmable security processor

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0051] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be described in further detail below in conjunction with specific embodiments and with reference to the accompanying drawings.

[0052] The processor architecture of the present invention is a structure that can support programming. By analyzing the basic operations of most cryptographic operations, and then setting these basic operation units, various encryption and decryption algorithms can be realized through program control and basic operations.

[0053] Most encryption and decryption algorithms, especially block ciphers, such as RSA, AES, etc., involve a large number of cycles.

[0054] For example, the RSA algorithm, assuming that the key is {d, n}, first divides the encrypted and decrypted data into several groups, and each group is encrypted separately, which is a big cycle; then find the d power modulo n of the grouped data M, the most comm...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A programmable safety processor consists of program storage, control stack, control decoder, operation decoder, RAM controller, operation executor, operation stack and interface module. It is featured as supporting programmable structure, setting with some basic operation units and utilizing program control and said basic operation unit to realize multiple ciphering deciphering / algorithm.

Description

technical field [0001] The invention relates to the technical field of microprocessor design in integrated circuit design, in particular to a programmable safety processor. Background technique [0002] Today's society has entered the information age. With the development and application of network information technology, information security is related to the fate of the country and individuals. Information security has attracted more and more attention from the country, society and individuals. [0003] Information security is mainly based on various encryption and decryption algorithms, which generally have a large amount of calculation. In a wide range of embedded application systems, the general embedded microprocessor has limited computing power, and it takes a long time to perform an encryption and decryption operation, which makes it difficult for the microprocessor to perform in some application fields that require both safety and real-time performance. . [0004]...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/00H04L9/14G06F21/72
Inventor 何子键徐勇军谢磊李晓维
Owner INST OF COMPUTING TECH CHINESE ACAD OF SCI
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products