期刊文献+

通用密码处理器在FPGA中的实现

Implementation of General Cipher Processor Based on FPGA
下载PDF
导出
摘要 考虑密码应用中存在密码算法基本操作的多样性、使用的复杂性和安全需求等因素,讨论了一种通用密码处理器的设计方案,并在FPGA上实现了该设计的原型。原型的主要设计思想是在一个精简的64位处理器中挂上所需要的密码算法功能部件再增加相应的指令。该原型支持39条指令,除DES、AES和正规基乘法MMU外其它指令都在一个时钟周期完成。支持DES、3DES和AES算法的任意工作模式,同时支持RSA、特征P和特征2上最优正规基的ECC。 There are many problems in cipher application such as the variety of basic operations,the complexity of schemes and security requirement.To meet these problems,the general cipher processor is designed,and the prototype of the chip is implemented based on FPGA.The design idea of the prototype is a reduce processor with 64 bits data bus, attached cipher algorithm parts which are needed.The prototype supports 39 instructions;the executive cycle is one clock per instruction except DES,AES and MMU (normal basic multiplication).It supports any mode of DES,3DES and AES algorithm,and it also supports RSA and ECC(GF(P)and GF(2^m)with normal basic).
出处 《计算机工程与应用》 CSCD 北大核心 2006年第4期98-101,共4页 Computer Engineering and Applications
基金 2004年广州市属高校科技计划项目(编号:2003)
关键词 处理器 密码 体系结构 processor, cipher, system structure
  • 相关文献

参考文献10

  • 1A Hodjat,P Schaumont,I Verbauwhede.Architectural Design Features of a Programmable High Throughput AES Coprocessor[C].In:Proceedings of the International Conference on Information Technology:Coding and Computing(ITCC ' 04) ,2004.
  • 2Gerardo Orlando.Efficient Elliptic Curve Processor Architectures for Field Programmable Logic.2002-03.
  • 3A Hodjat,I Verbauwhede.Minimum Area Cost for a 30 to 70 Gbits/s AES Processor[C].In:Proceedings of IEEE computer Society Annual Symposium on VLSI,2004-02:83-88.
  • 4A Satoh,K Takano.A Scalable Dual-Field Elliptic Curve Cryptographic Processor[J].IEEE Transactions on Computers,2003;52(4):449-460.
  • 5H Eberle,N Gura,S Shantz et al.A Public-key Cryptographic Processor for RSA and ECC[C].In:Proceedings of the 15th IEEE International Conference on Application-Specific Systems,Architectures and Processors ( ASAP' 04 ), 2004.
  • 6曲英杰,刘卫东,战嘉瑾.可重构密码协处理器指令系统的设计方法[J].计算机工程与应用,2004,40(2):10-12. 被引量:11
  • 7田泽,张怡浩,于敦山,盛世敏,仇玉林.单片密码数据处理器系统级体系结构的研究[J].固体电子学研究与进展,2003,23(4):427-433. 被引量:1
  • 8林容益.CPU/SOC及外围电路应用设计[M].北京航空航天大学出版社,2004..
  • 9A Reyhani-Masoteh,M Anwar Hasan.Low Complexity Word-Level Sequential Normal Basis Multipliers[J].IEEE transactions on computers, 2005;54(2) :98-110.
  • 10Standard Specifications for Public Key Cryptography[S].IEEE P1363/ D13,1999:93-94.

二级参考文献16

  • 1[1]Bruce, Schneier.Applied Cryptography:Protocols, Algorithms, and Source Code in C, Prentice Hall, 1999
  • 2[2]Willian Stallings. Cryptography and Network Security Principles and Practice,New York:Wiley, 1996
  • 3[3]Jiang Tao, Liu Ji-ren, Qin Yang. The Research on Dynamic Self-Adaptive Network Security Model Based on Mobile Agent
  • 4[4]ARM DDI0100E, ARM Architecture Reference Manual
  • 5[5]Steve, Furber.ARM System-on-chip Architecture, Addison-Wesly, 2000
  • 6[6]Patterson D. Reduced Instruction Set Computers. ACM, 1985;28(1):8~21
  • 7[7]Tabak D.RISC Architecture, New York: Wiley, 1987
  • 8[8]Smith J, Weiss S.PowerPC 601 and alpha 21064:a tale of two RISC's. IEEE Comput, 1994;27(6):46~58
  • 9[9]L Hennessy John, A Patterson David. Computer Organzation & Design:The Hardware/Software Interface, Morgan Kaufmann Publish, 1998
  • 10[10]Rochit Rajsuman. System-on-a-Chip:Design and Test, Artech House Publishers, 2000

共引文献10

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部