Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Data integrity verification method suitable for embedded processor

An embedded processor and data integrity technology, applied in the direction of electrical digital data processing, instrumentation, error detection/correction, etc., can solve the problem of high cost of missing, unable to meet the requirements of embedded system applications, and the number of hash tree layers , many nodes, etc.

Inactive Publication Date: 2010-10-06
HUAZHONG UNIV OF SCI & TECH
View PDF2 Cites 33 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, this method produces a large number of hash tree layers and nodes, a large missing cost, and a large resource overhead during verification, so it cannot meet the requirements of embedded system applications.
PAT and TEC-tree improve the node value of the Merkle tree, but do not improve the Merkle tree itself, so the two generate more nodes, and also have the disadvantages of missing cost and large resource overhead during verification.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data integrity verification method suitable for embedded processor
  • Data integrity verification method suitable for embedded processor
  • Data integrity verification method suitable for embedded processor

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0066] Below in conjunction with accompanying drawing and example the present invention is described in further detail.

[0067] figure 2 A schematic diagram of the location of the data integrity verification method provided by the present invention in the overall architecture of the processor, that is, to implement this method requires an additional integrity verification module in the existing processor. figure 2 The non-trusted storage area refers to the memory outside the processor chip, and the trusted storage area refers to the memory inside the processor chip.

[0068] Such as image 3 As shown, a cache memory is introduced in the integrity verification module for storing node values ​​of the hash tree, hereinafter referred to as the hash cache. In addition, the integrity verification module also includes two parts, which are the multi-granularity hash calculation module and the hash access control module. The multi-granularity hash calculation module is a circuit ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a data integrity verification method suitable for an embedded processor. The method comprises a multi-granularity hash computation method, an address conversion method and a hash node access control method, wherein the multi-granularity hash computation method is used for generating a multi-granularity Merkle tree which is cached in a hash cache and is in charge of computing a hash value of a data block in a memory when nodes of the tree are absent; the address conversion method is used for providing a unique corresponding address for each node; and the hash node access control method is mainly in charge of accessing the nodes of each hash tree and adopting different strategies particularly during reading absence and writing operation. Due to the multi-granularity hash computation method, the hash tree generated by the data integrity verification method has less nodes and layers so as to reduce a memory space and hardware area overhead, shorten initialization time and improve the performance.

Description

technical field [0001] The invention belongs to the field of digital integrated circuits, and specifically relates to a data integrity verification method suitable for embedded processors. The core of the method is multi-granularity memory hash calculation, which is a high-performance, less-related access, and low-initialization method. Time data integrity check method. Due to consideration of factors such as performance and overhead during design, the method is completely suitable for embedded systems and computer systems, and can provide reliable data integrity verification for them. Background technique [0002] Data integrity verification is an effective means to solve tampering attacks. Based on this, methods such as hash function, message authentication code (MAC: Memory Authentication Code) and AREA (Added Redundancy Explicit Authentication) have emerged. [0003] Among them, hash function (namely Hash function) is an important foundation of modern cryptographic tec...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F11/00
Inventor 刘政林霍文捷陈天山郭超
Owner HUAZHONG UNIV OF SCI & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products