Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Security coprocessor structure based on RISC-V instruction extension

A technology of RISC-V and instruction expansion, which is applied in the direction of concurrent instruction execution, electronic digital data processing, computer security devices, etc., and can solve problems such as poor universality and universality, existence of authorization and universality, and efficiency that cannot meet expectations. , to achieve the effect of reducing intrusion, avoiding instruction set authorization problems, and less intrusiveness

Active Publication Date: 2020-06-23
XIAN MICROELECTRONICS TECH INST
View PDF4 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] (1) "Standard instruction + bus IP", this solution is the simplest to implement in hardware, such as "Coprocessor for Encryption and Decryption Process Control" published by Wang Jianfei et al. The standard bus interface can be integrated into the processor system naturally. At the same time, since it does not involve the modification of the instruction set, there is no need to modify the compiler. However, there is a performance bottleneck in this structure, mainly due to the control of IP and the original text / encryption The transmission of files must be controlled by the processor, and each operation must pass through the system bus, and the efficiency is often not as expected;
[0005] (2) "Instruction extension + custom execution unit", this form is to customize and modify the processor from the bottom layer. First, the instruction is extended based on the commercial instruction set, and then the corresponding execution unit is designed at the execution level of the pipeline. From the software point of view, the method involves the authorization of commercial instruction sets, and from the hardware point of view, the substantial modification of the pipeline will cause the adequacy of the verification coverage. Customized design of an encryption algorithm, which is poor in versatility and universality;
[0006] (3) "Instruction extension + coprocessor" also performs instruction extension on the basis of commercial instruction sets, but it does not modify the original processor pipeline structure, but integrates an independent acceleration engine outside the pipeline, because it does not change the mainstream pipeline structure, so the functional complexity is lower, but there are still issues of authorization and universality

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security coprocessor structure based on RISC-V instruction extension
  • Security coprocessor structure based on RISC-V instruction extension
  • Security coprocessor structure based on RISC-V instruction extension

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0046] In the description of the present invention, it should be noted that the terms "installation", "connected" and "connected" should be understood in a broad sense, unless otherwise clearly specified and limited. For example, they can be fixed or detachable. Connected or integrally connected; it can be a mechanical connection or an electrical connection; it can be directly connected or indirectly connected through an intermediate medium, and it can be the internal communication between two components. For those of ordinary skill in the art, the specific meanings of the above-mentioned terms in the present invention can be understood in specific situations.

[0047] The present invention provides a security coprocessor structure based on RISC-V instruction extension, adopts the user scalability provided by the current open source instruction set RISC-V, and summarizes and extracts mainstream multiple symmetric group encryption and decryption algorithms. Construct a security co...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a security coprocessor structure based on RISC-V instruction extension. The special instruction execution unit and the general instruction execution unit are respectively in control connection with the output result; the security instruction encoding logic given by the processor main pipeline decoding stage performs detailed decoding according to the instruction code and sends the instruction to the special instruction execution unit or the general instruction execution unit; after the instruction is executed, the operation result is output to the write-back stage of the processor main assembly line through the output result control logic, and write-back operation of the general register is achieved through the processor main assembly line. According to the method,the problem of instruction set authorization is avoided, meanwhile, the invasiveness to an original processor is effectively reduced, the application range of encryption and decryption algorithms is expanded, and the method has high application value.

Description

Technical field [0001] The invention belongs to the technical field of integrated circuit design and processor design, and specifically relates to a security coprocessor structure based on RISC-V instruction extension. Background technique [0002] The military application field represented by aerospace applications is facing more and more serious information security threats. Malicious attackers can use a variety of methods to monitor core electronic systems to achieve the purpose of stealing or tampering with key military information. Currently, most of the instructions and data in embedded systems are stored in external SRAM or DRAM, so by adding a small amount of hardware changes to the circuit board, the data on the storage bus can be intercepted, and even the data can be modified in reverse. Based on this practical demand, both the program and data in the off-chip memory need to be encrypted, which requires the processor to decode the program data and re-encode and write th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F9/38G06F9/30G06F21/60
CPCG06F9/3877G06F9/3867G06F9/30189G06F21/602
Inventor 张海金娄冕杨博刘思源苏若皓郭娜娜
Owner XIAN MICROELECTRONICS TECH INST
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products