Data processing equipment and operation method for this

文档序号:1772288 发布日期:2019-12-03 浏览:20次 中文

阅读说明:本技术 数据处理装置和用于此的运行方法 (Data processing equipment and operation method for this ) 是由 J.施拉姆 A.森肯斯 B.卡斯佩尔 于 2019-05-22 设计创作,主要内容包括:本发明涉及一种尤其用于控制设备的数据处理装置,其中所述数据处理装置具有至少一个计算装置、存储装置、硬件安全模块和至少一个密码模块。(The data processing equipment that the present invention relates to a kind of particularly for controlling equipment, wherein the data processing equipment has at least one computing device, storage device, hardware security module and at least one crypto module.)

1. a kind of data processing equipment (100) particularly for controlling equipment (1000), wherein the data processing equipment (100) With at least one computing device (110), storage device (120), hardware security module (130) and at least one crypto module (140;1400;1400a).

2. data processing equipment (100) according to claim 1, is provided in the data processing equipment (100) the first data/address bus (150) of data exchange is carried out between component (110,120,130,140).

3. according to claim 1 to data processing equipment described at least one of 2 (100), wherein at least one described password Module (140;1400;It 1400a) is configured to hardware circuit, and wherein at least one especially described crypto module (140; 1400;It is external 1400a) to be arranged in the hardware security module (130).

4. the data processing equipment according at least one of claim 2 to 3 (100), wherein at least one described password Module (140;1400;1400a) there are the first data for carrying out data exchange by first data/address bus (150) to connect Mouth (142a), wherein at least one especially described crypto module (140;1400;1400a) have for the hardware security mould Block (130) carries out the second data-interface (142b) of direct data exchange (142b').

5. the data processing equipment (100) according at least one of above claim, wherein at least one described password Module (140;1400;1400a) have at least one of lower component: for implementing the master of at least one first password function Password unit (1410), is used the processing unit (1420) for implementing at least one the second cryptographic function, especially comparing unit In at least temporarily the key storage device (1430) of storage cryptographic key, interrupt requests control unit (1440), rule monitoring are single First (1450), manipulation register (1460a), status register (1460b), data buffer (1470a, 1470b).

6. data processing equipment (100) according to claim 5, wherein the first password function has in following element At least one: a) aes algorithm, in particular according to Federal Information Processing Standards publication on November 26th, 197,2001, Https: the aes algorithm of //doi.org/10.6028%2FNIST.FIPS.197;B) CMAC, the message authentication code based on ciphertext; C) ECB, electronic codebook mode;D) CBC, cipher block chaining model;E) CTR, counter mode;F) OFB, output feedback mould Formula;G) CFB, Cipher Feedback mode;H) GCM, Galois counter mode.

7. the data processing equipment (100) according at least one of above claim, wherein the hardware security module (130) it is configured to through the second data/address bus (150a) and at least one described crypto module (140;1400) number is exchanged According to.

8. method of the one kind for running the data processing equipment (100) particularly for controlling equipment (1000), wherein the number There is at least one computing device (110), storage device (120), hardware security module (130) and extremely according to processing unit (100) A few crypto module (140;1400;1400a), wherein the crypto module (140;1400;1400a) implement (310) at least One first password function, wherein the especially described crypto module (140;1400;1400a) with the hardware security module (130) Operation concurrently, especially implement (310) described first password function independently of the hardware security module (130).

9. according to the method described in claim 8, wherein the first password function has at least one of following element: a) Aes algorithm, in particular according to Federal Information Processing Standards publication on November 26th, 197,2001, https: //doi.org/ The aes algorithm of 10.6028%2FNIST.FIPS.197;B) CMAC, the message authentication code based on ciphertext;C) ECB, electronic codebook mould Formula;D) CBC, cipher block chaining model;E) CTR, counter mode;F) OFB, output feedback mode;G) CFB, Cipher Feedback Mode;H) GCM, Galois counter mode.

10. the method according at least one of claim 8 to 9, wherein at least one described crypto module (140; 1400;1400a) have for carrying out data exchange by the first data/address bus (150) of the data processing equipment (100) First data-interface (142a) and have for carrying out direct data exchange with the hardware security module (130) Second data-interface (142b) of (142b').

11. a kind of control equipment (1000) has at least one data according to any one of claim 1 to 7 It manages device (100).

Technical field

The data processing equipment that this disclosure relates to a kind of particularly for controlling equipment, wherein the data processing dress Setting has at least one computing device and storage device.

Present disclosure additionally relates to a kind of operation method for such data processing equipment.

Background technique

The data processing equipment for the type being initially mentioned is known and has relatively low flexibility and safety.

Summary of the invention

Correspondingly, the task of the present invention is improve the data processing equipment of the type being initially mentioned and corresponding as follows Operation method: the flexibility and safety of raising are provided.

In the data processing equipment for the type being initially mentioned, the task according to preferred embodiment by with Under type solves: data processing equipment has hardware security module and at least one crypto module (Kryptografiemodul).The flexibility of raising is especially provided during the operation of data processing equipment as a result,.Preferably, Crypto module at least temporarily can independently of hardware security module work, so that especially also can overlappingly pass through in time On the one hand hardware security module and on the other hand crypto module completes different data processing tasks.In other preferred reality In the case of applying mode, such as it is contemplated that hardware security module particularly with or in order to preparing cryptographic calculations and take over and match Task is set, and cryptographic calculations itself are preferably for example by crypto module and in the case especially independently of hardware security mould Block is carried out in the case where not participated in by hardware security module.

Provided in other preferred embodiment, be provided with for the data processing equipment component it Between carry out data exchange the first data/address bus.In the case, such as can be data processing equipment or goal systems is System bus, data processing equipment are desirably integrated into the goal systems.Goal systems may, for example, be control equipment.

It is provided in other preferred embodiment, at least one described crypto module is preferably entirely constructed For hardware circuit, wherein at least one especially described crypto module is arranged in outside the hardware security module.A side as a result, Face can be realized the especially efficient data processing by crypto module, and on the other hand provide the safety improved and can Scalability (such as by the way that multiple crypto modules are arranged).

It is provided in other preferred embodiment, at least one described crypto module has for by described First data/address bus, such as system bus carry out the first data-interface of data exchange.Thereby, it is possible to realize and be connected to first The efficient data exchange of other component on data/address bus.

Provided in other preferred embodiment, at least one described crypto module have for it is described hard Part security module carries out the second data-interface of direct data exchange.Thus it provides for carrying out data with hardware security module The ultra-safe possibility of exchange.Especially, the other component being connected to when necessary on the first data/address bus or system bus (in addition to hardware security module) can not access crypto module by the second data-interface.Especially thus it is advantageously carried out safety (Separation) is isolated with secure domain in domain, this is because being by the first data-interface and with first according to the separation of hardware The second different data-interface of data-interface is realized.

It is provided in other preferred embodiment, at least one described crypto module has in lower component At least one: is for implementing the main password unit of at least one first password function, for implementing at least one second password function Can and/or the processing unit of other function (such as comparison), especially comparing unit, at least temporary storage cryptographic key Key storage device, interrupt requests control unit, regular monitoring unit, manipulation register, status register, data buffer.

It is provided in other preferred embodiment, the first password function has in following element at least One: a) aes algorithm, in particular according to Federal Information Processing Standards publication on November 26th, 197,2001, https: // The aes algorithm of doi.org/10.6028%2FNIST.FIPS.197;B) CMAC, the message authentication code based on ciphertext;C) ECB, electricity Sub-codebook mode;D) CBC, cipher block chaining model;E) CTR, counter mode;F) OFB, output feedback mode;G) CFB, Cipher Feedback mode;H) GCM, Galois counter mode.

It is provided in other preferred embodiment, the hardware security module is configured to through the second number Data are exchanged at least one crypto module according to bus.The setting of second data/address bus can be realized hardware security module with it is close The data transmission of the safety for being especially totally independent of the first data/address bus or system bus between code module.

Other preferred embodiment is related to according to Patent right requirement 8 for operation data processing unit Method.

Other preferred embodiment is related to the control equipment according to Patent right requirement 11.In addition preferred Embodiment is the theme of dependent claims.

Other feature, application possibility and advantage of the invention is as the embodiment of the invention shown in the figure of attached drawing Be described below and obtain.Here, described or shown all features itself or mode in any combination constitute this hair Bright theme, and it is unrelated with its summary in the claims or its adduction relationship and with its table in the specification or attached drawings It states or indicates and is unrelated.

Detailed description of the invention

In the accompanying drawings:

Fig. 1 schematically shows the simplified block diagram of data processing equipment according to a kind of embodiment;

Fig. 2 schematically shows the simplified block diagram of crypto module according to a kind of embodiment;

Fig. 3 schematically shows the simplified block diagram of control equipment according to a kind of embodiment;

Fig. 4 schematically shows the simplified block diagram of the crypto module according to another embodiment;

Fig. 5 schematically shows the simplified flowchart of method according to a kind of embodiment, and

Fig. 6 schematically shows data structure according to a kind of embodiment.

Specific embodiment

Fig. 1 schematically shows the simplified block diagram of data processing equipment 100 according to a kind of embodiment.Data processing dress Setting 100 has at least one computing device 110 and storage device 120.Computing device 110 can have in a manner known in itself One or more calculates core or processor, is configured to implement software, such as computer program.Storage device 120 is excellent Selection of land has volatile memory, especially working storage 120a and nonvolatile memory, such as flash EEPROM memory 120b。

Furthermore data processing equipment 100 has hardware security module 130, the hardware security module 130 is configured to Implement cryptographic methods and/or the implementation for supporting cryptographic methods by other component, such as protecting or examining in data Processing unit 100 or the goal systems comprising data processing equipment 100 and the message exchanged between another unit (not shown).This It especially can when data processing equipment 100 is used in the control equipment for motor vehicle in preferred embodiment It can be such case.Due to the more and more extensive correspondence within motor vehicle with except, in control equipment in vehicle Combine to authenticate and/or encrypt by means of cipher mechanism, such as in (Steuerger teverbund) and each vehicle message is carried out Protection is advantageous.This action (Vorgehen) is included into secret communication (Secure Communication).This is related to The reception (verifying) and transmission (generation) of reliable or identifiable message.In preferred embodiment, thus can be with It is used to support the secret communication within control equipment or between different control equipment using hardware security module 130.

In other particularly preferred embodiment, hardware security module 130 can be used for example for calculating Unique fingerprint value (such as symmetric cryptography based on AES-128CMAC method) for secret communication.Thus, it is possible to realize pair Goal systems or the secure domain (Security Dom ne) for controlling equipment are (outstanding using its cryptographic key and external " unsafe " It is in secrecy meaning) security function of security domain (Safety Dom ne) is packaged (Sapselung).Other complete In the case of full particularly preferred embodiment, type that hardware security module 130 mentions the above-mentioned example of cryptographic calculations It can have optional hardware accelerator (" AES accelerator ").

In other particularly preferred embodiment, data processing is further increased advantageous by following manner The flexibility of device 100: it i.e. other than hardware security module 130, is provided at least one individually namely does not integrate for example To the crypto module 140 in hardware security module 130.

Thus the flexibility also further improved especially during data processing equipment 100 is run is provided.Preferably, close Code module 140 can temporarily, at least work independently of 130 ground of hardware security module, so that can also especially be overlapped in time Ground is by the one hand hardware security module 130 and on the other hand crypto module 140 completes different data processing tasks.Another In the case of outer preferred embodiment, such as it is contemplated that hardware security module 130 undertakes particularly for cryptographic calculations Configuration task, and cryptographic calculations itself are for example by crypto module 140 and in the case especially independently of hardware security mould 130 ground of block is carried out in the case where not participated in by hardware security module 130.

It provides, is provided in the portion of the data processing equipment 100 in other preferred embodiment The first data/address bus 150 of data exchange is carried out between part 110,120,130,140.It for example can be at data in the case The system bus of device 100 or goal systems (control equipment) is managed, wherein data processing equipment 100 is desirably integrated into the target In system.

Alternatively it is also possible to be provided with the device 160 for debugging, described device is for example with debugging interface or dedicated tune Try hardware.In other embodiment, device 160 can for example pass through system bus 150 and data processing equipment 100 Other component connection.

Provided in other preferred embodiment, at least one described crypto module 140 especially fully by It is configured to hardware circuit, wherein at least one especially described crypto module 140 is arranged in outside the hardware security module 130. It on the one hand can be realized the especially efficient data processing by crypto module 140 as a result, and on the other hand raising be provided Safety and scalability (Skalierbarkeit) (such as by the way that multiple crypto modules 140 are optionally arranged).

It is provided in other preferred embodiment, at least one described crypto module 140 has for passing through First data/address bus 150, such as system bus carry out the first data-interface 142a of data exchange.Thereby, it is possible to realize It is exchanged with the efficient data for the other component 110,120,130 being connected on the first data/address bus 150.

Provided in other preferred embodiment, at least one described crypto module 140 have for institute State the second data-interface 142b that hardware security module 130 carries out direct data exchange (referring to line 142b').Thus use is provided In the ultra-safe possibility for carrying out data exchange with hardware security module 130.Especially, it is connected to the first data when necessary Other component (in addition to hardware security module 130) in bus 150 or system bus can not pass through the second data-interface 142b accesses crypto module 140.

It is advised in the case of the other preferred embodiment that illustratively configuration 1400 of reference according to fig. 2 describes below Fixed, described at least one crypto module 140(Fig. 1) have at least one of lower component: for implement at least one first The main password unit 1410 of cryptographic function, for implementing at least one second cryptographic function and/or other function (such as comparison) Processing unit 1420, especially comparing unit, at least temporarily storage cryptographic key key storage device 1430, interrupt ask Ask control unit 1440, regular monitoring unit 1450, manipulation register 1460a, status register 1460b, data buffer 1470a、1470b。

In other preferred embodiment, at least one crypto module 140 in Fig. 1 can for example with The configuration 1400 described in Fig. 2.Conceivable in other embodiment to be, crypto module 140 has to be retouched in Fig. 2 The only one or multiple in component drawn, rather than there is the institute in Fig. 2 in the component of example plot of configuration 1400 There is component.

It is provided in other preferred embodiment, the first password function is (particularly by main password unit 1410(Fig. 2) it is implementable) there is at least one of following element: a) aes algorithm, go out in particular according to Federal Information Processing Standards Version object (Federal Information Processing Standards Publication) on November 26th, 197,2001, Https: the aes algorithm of //doi.org/10.6028%2FNIST.FIPS.197;B) CMAC, the message authentication code based on ciphertext (Cipher-Based Message Authentication Code);C) ECB, electronic codebook mode (Electronic code Book mode);D) CBC, cipher block chaining model (Cipher block chaining mode);E) CTR, counter mould Formula (Counter mode);F) OFB, output feedback mode (Output feedback mode);G) CFB, Cipher Feedback mode (Cipher feedback mode);H) GCM, Galois counter mode (Galois counter mode).

It is provided in other preferred embodiment, the hardware security module 130 is configured to by Two data/address bus 150a(Fig. 1) at least one crypto module 140 exchange data.The setting of second data/address bus 150a can be real The first data/address bus 150 or system bus are especially totally independent of between present hardware security module 130 and crypto module 140 Ultra-safe data transmission.

Fig. 3 is schematically shown as according to the goal systems of the data processing equipment 100 of the embodiment Control the simplified block diagram of equipment 1000.Control equipment 1000 for example can be used for motor vehicle, such as the internal combustion for controlling motor vehicle The operation of machine 10.Control equipment 1000 can possess other component 200.Advantageously, it is provided by data processing equipment 100 Functionality can be used especially in terms of cryptographic function implementation by control equipment 1000 or its other component 200.Thus especially Be that by for example within other component 200 and/or with external component (not shown), such as motor vehicle is another The guarded communication of outer control equipment.

Fig. 4 schematically shows the crypto module 1400a according to another embodiment.In some embodiments, Such as crypto module 1400 according to the crypto module 140 of Fig. 1 or according to fig. 2 can have the configuration below with reference to Fig. 4 description Or the configuration is at least partly.It is particularly preferred that crypto module 1400a is completely with hardware realization.

Crypto module 1400a have main password unit 1410, the main password unit for example with main password list according to fig. 2 Member 1410 constructs comparablely.In other words, it is configured to implement at least one first password according to the main password unit 1410 of Fig. 4 Function, wherein first password function has at least one of following element: a) aes algorithm, in particular according to Federal Information processing Standards Publication (Federal Information Processing Standards Publication) 197,2001 11 The moon 26, https: the aes algorithm of //doi.org/10.6028%2FNIST.FIPS.197;B) CMAC, the message based on ciphertext Authentication code (Cipher-Based Message Authentication Code);C) ECB, electronic codebook mode (Electronic code book mode);D) CBC, cipher block chaining model (Cipher block chaining Mode);E) CTR, counter mode (Counter mode);F) OFB, output feedback mode (Output feedback Mode);G) CFB, Cipher Feedback mode (Cipher feedback mode);H) GCM, Galois counter mode (Galois Counter mode).In other words, in other preferred embodiment, main password unit 1410 is configured to reality Apply cryptographic function, especially one or more of AES mode above-mentioned.

In other preferred embodiment, the cryptographic function that is previously mentioned, especially AES mode can be by means of at least One manipulation register 1461a configuration.Preferably, this can for example be accomplished by the following way: computing device 110 passes through the One data/address bus 150 accesses at least one manipulation register 1461a in a manner of writing and/or read, referring to arrow 1461a'.

In other preferred embodiment, data buffer 1471a is preferably again at least one register Form setting, mode for example, at least can be temporarily stored for implementing first password function by main password unit 1410 Input data.Preferably, it is provided with local (lokaler) parallel data bus line or parallel data connection dv1, so as to by data It is transmitted in main password unit 1410 from data buffer 1471a.Preferably, input data can be passed through by computing device 110 It is written in data buffer 1471a by the first data/address bus 150, referring to arrow 1471a'.As long as the reality of first password function That applies requirement such as input data fills up (filling), then this can preferably be implemented by computing device 10, such as counts in CMAC So-called 10^n in the case where calculation for last grouping (Block) is filled up.

It is further preferred that computing device 110 can be by writing corresponding control data in manipulation register 1461a To control: which of multiple possible cryptographic functions (such as CMAC, AES encryption, AES decryption, etc.) should pass through main password Unit 1410 is implemented.It is particularly preferred that once control data are already written in manipulation register 1461a accordingly, it can also be with Automatically begin through implementation of the main password unit 1410 to cryptographic function.

It is further preferred that in order to by main password unit 1410 implement cryptographic function, can choose cryptographic key and Optionally select and the associated corresponding context of cryptographic key.This can advantageously according to selected cryptographic function (such as Pass through the predetermined control data in manipulation register 1461a) Lai Jinhang.

Optionally, it is provided with key storage device 1430, the key storage device has access and two priority classes dress Set 1431.Multiple cryptographic keys can be stored in key storage device 1430 and can optionally be stored close with the multiple password The associated context of key.Three group key data 1432 in total are illustratively enumerated in Fig. 4, wherein every group key data are for example With at least one cryptographic key, affiliated context (" cryptographic key context ") or rule (" strategy ") and optionally with institute The link variable of meaning.Link variable (English: chaining variable, CV) can be preferably used to, and temporarily, at least deposit The intermediate result or initialization vector (IV) of cryptographic function are stored up, such as at so-called " linking scheme (chained mode) " In grouping ciphertext (Blockchiffre).It can preferably for example be selected under the control of priority control apparatus 1431 It selects: which group key data 1432 is used to implement by main password unit 1410 determining cryptographic function.For example, two priority classes Device 1431 can for example pass through multichannel according to the content of manipulation register 1461a thus to control context selector 1433( Splitter is multiplexed to realize), referring to data connection dv2, dv21.Ensure as a result, in other preferred embodiment: making Use with cryptographic key and when necessary the link variable to match with selected cryptographic key context.

In other words, in preferred embodiment, key storage device 1430 realize multiple cryptographic key contexts it Between, the transformation of the context of hardware supported.Herein preferably it is possible that implementing in each of multiple cryptographic key contexts Special purpose system operation, especially cryptographic operation, such as AES operation.This be preferably independent of other cryptographic key contexts and preferably with its He concurrently carries out at cryptographic key context.Thus be advantageously able to realize: code data processing is by data processing equipment 100 not With security domain between quick dynamic (namely being carried out in the runing time of data processing equipment 100) transformation be possible 's.

It is equally conceivable according to the cryptographic function of the standard different from AES in other embodiment.

For example, key storage device 1430 is configured to, password function possible for each of main password unit 1410 Corresponding cryptographic key can be provided, and optionally as expected cryptographic function provides the added value to this when necessary (Zusatzwerte), all link variables as described above and/or other intermediate results etc..

It is particularly preferred that tissue of the key storage device 1430 in the form of so-called cryptographic key context can be realized to multiple The efficient management of cryptographic key and affiliated optional data, such as link variable.Still optionally further, every group key data can With with regular data or at least one variable, characterization can be predetermined for the implementation of data processing, especially cryptographic function Regular (" key policy: key strategy ").In particularly preferred embodiment, a group key data therefore have to Few a cryptographic key, optional additional data, such as using link variable and regular data as form.

In other preferred embodiment, cryptographic key context can not only pass through computing device 10 but also can be with It is selected by hardware security module 130, wherein preferably, hardware security module 130 has to be selected about cryptographic key context Higher priority.In preferred embodiment, above and below the key of access or the determination of determining cryptographic key context The selection of text can be controlled by already mentioned access and priority control apparatus 1431.For example, access and two priority classes dress Set 1431 can according to (Abh ngigkeit) manipulate register (Kontrollregister) or control register 1461a(can It is predetermined by computing device 110 and/or hardware security module 130), 1461b(especially can only pass through hardware security module 130 It is predetermined) implement the selection of determining cryptographic key context.

In other preferred embodiment, cryptographic key and/or affiliated regular data can preferably only It is only written in key storage device 1430 by hardware security module 13, referring to data connection dv4, dv41.It such as can be with by Fig. 4 As finding out, at least one register can be optionally set thus as intermediate store or buffer 1462.

Fig. 6 schematically shows the data as example can be used for storing especially cryptographic key by key storage device 1430 Structure.Data structure has for receiving the first of optional link variable to be segmented CV, second point for receiving cryptographic key Section KEY and for receive optional regular data third be segmented POL.

In other preferred embodiment, the link variable CV of cryptographic key context is used especially for below into one Walk two kinds of applicable cases a), b) of description.

A) initialization for the implementation that cryptographic function, especially AES are operated, wherein the initialization, which preferably can pass through to calculate, to be filled 110 are set to carry out,

B) for the support of (chained) the AES operation of link.

According to other preferred embodiment, can the initialization a) that mentions of the upper surface of the implementation for cryptographic function can Using following aspect.For some AES operation types or operation, at least one initialization value, such as AES counter mode are used In Counter Value and/or the initialization vector in CBC mode or CMAC mode.In preferred embodiment, mentioned To initialization value can be beneficial to help the buffer realized preferably in the form of at least one register 1463 and provide, Referring also to data connection dv5.For this purpose, computing device 110 can for example be write corresponding data by the first data/address bus 150 In buffer 1463.Buffer 1463 preferably connects dv51 by parallel data and connect with multiplexer 1434, the multiplexer It can also be referred to as CV selector, this is because the multiplexer realizes that buffer 1462(passes through data connection dv41), 1463 The different input datas of (by data connection dv51) are selected for storage in key storage device 1430.

It is further preferred that computing device 110 can be write in corresponding manipulation register 1461a by that will control data To trigger the transmission of corresponding initialization value.Optionally, which can be supervised by access and priority control apparatus 1431 Control or control.

According to other preferred embodiment, can for it is above-mentioned for linked AES operation (such as with In its length be more than for example, about 16 bytes can the data of predetermined maximum length or CBC, CMAC of message) support can apply Following aspect.Link variable CV(Fig. 6) it can be advantageously used for storing intermediate result for subsequent AES operation.It is especially excellent Selection of land, the original that can be realized by implementations described above based on the context transformation between multiple cryptographic key contexts Reason, it is even if being advantageously also required to the dynamic mapping of another cryptographic key context under following such AES operational circumstances, i.e., described Such AES operation is not over, but (von denen) for example just has a median in AES operation. In such a case, it is possible to which corresponding intermediate result is stored in link variable CV.It is then possible to carry out cryptographic key context Transformation, so as to realize implementation of the cryptographic function on another cryptographic key context.When necessary, previous place can be switched back to later The cryptographic key context of reason, wherein pick up (aufgegriffen) and be further processed the centre stored in link variable CV As a result.Therefore embodiments noted above is implemented advantageously in what between different cryptographic key contexts, complete hardware was supported Transformation, not may require that the interaction of 130 side of hardware security module especially.

In other preferred embodiment, it is also contemplated that, the principle of cryptographic key context transformation is additionally It is extended by hardware security module 130 or corresponding software.Thus advantageously it can be stated that link variable CV can pass through hardware Security module 130 is read in, for example, using other data buffer 1464 the case where under read in, the other data are slow Rush device preferably has at least one register again.Link variable CV is from key storage device 1430 to hardware security module 130 Transmission therefore can for example be carried out using data connection dv6, dv61 and the second data/address bus 150a.Thus, it is possible to It is enough to realize, at least one cryptographic key context by hardware security module 130 in a software form (such as by computing unit The computer program control hardware security module 130 implemented on 110) it temporarily, at least stores link variable CV or includes wherein Intermediate result and continue corresponding AES operation at another moment on corresponding cryptographic key context, mode is, will be with soft The intermediate result of part form temporarily, at least intermediate storage is re-loaded on the related key of key storage device 1430 In link variable CV hereafter.

In other preferred embodiment, crypto module 1400a is advantageously configured to, and is supported at least about 30 different cryptographic key contexts, wherein each cryptographic key context is preferably by the data illustratively described in Fig. 6 Structure (illustratively there is optional link variable CV, cryptographic key KEY and optional regular data POL) characterization.In addition Embodiment in the case of, the cryptographic key context that is previously mentioned can particularly advantageously simultaneously or it is pseudo- simultaneously (psedosimultan) it is used by crypto module 1400a, namely does not need especially to match again by other component 110,130 Set corresponding cryptographic key context.

In other preferred embodiment, cryptographic key or entire data structure CV, KEY, POL are stored in easily The property lost memory, especially in working storage (RAM) so that in data processing equipment 100 or crypto module 1400a resets or this In the case that the electric flux supply of at least one of a little components is interrupted, occur about the excellent of the key or data structure being previously mentioned Select complete loss of data.

It is particularly preferred that being related to (zum Gegenstand haben) cryptographic key KEY and/or link variable CV to key The write access of transmission in storage device 1430 is merely capable of implementing by hardware security module 130, such as is using the second number Implement in the case where according to bus 150a, thus further increases the safety of crypto module 1400a.It especially thus prevents: attack Person is using compromise for computing device 110 in the case where making full use of the first data/address bus 150, for example (kompromittierter) cryptographic key of forgery is transferred in key storage device 1430 in the case where software.

In other preferred embodiment it can be stated that (particularly by different from hardware security module 130 Component) to the read access of key storage device 1430 provide can be predetermined fixed value, rather than cryptographic key context or deposited The actual content of at least one Elements C V, KEY, POL of the data structure of storage.

It is provided in other preferred embodiment, (especially individually) hardware security module 130 is to link value CV Read access, it is thus being described above, software support upper more particularly to realize referring to data connection dv6, dv61,150a Hereafter convert.

It is provided in other preferred embodiment, not only from 110 side of computing device (referring to data connection dv2) And it is possible for selecting cryptographic key context from 130 side of hardware security module (referring to data connection dv7), wherein is preferably passed through Access and priority control apparatus 1431 are prioritized.

It is particularly preferred that selected cryptographic key context can be used for each password function in other embodiment Can, the cryptographic function can be implemented by main password unit 1410 and/or processing unit 1420, especially comparing unit.

It is provided in other preferred embodiment, cryptographic function is passed through into the knot that main password unit 1410 is implemented Fruit is at least temporarily stored in output data buffer 1471b.Preferably, output data buffer 1471b is configured to post Storage or register memory.

Optionally, first password function can also be transferred to processing unit by the result that main password unit 1410 is implemented 1420, especially comparing unit, referring to data connection dv3.Preferably, data connection dv3 is parallel data connection, as in number According to such in the case of connection dv2, dv21.

It, for example can be with according to the processing unit 1420 of Fig. 4, especially comparing unit in preferred embodiment Unit 1420 according to fig. 2 constructs comparablely, i.e., for implementing for example to compare.

In preferred embodiment, processing unit 1420, especially comparing unit have CMAC(based on ciphertext Message authentication code, German: verschl ü sselungsbasierter Nachrichtenauthentifizierungscode (message authentication code based on encryption)) storage unit 1422 and have comparing unit 1424.In these embodiments, Therefore the functional of processing unit 1420, especially comparing unit can also be used as " CMAC compares " to describe.

Illustratively, CMAC storage unit 1422 is configured to, and temporarily, at least intermediate storage is by means of main password mould The CMAC value that block 1410 obtains, referring to data connection dv3.

It is further preferred that comparing unit 1424 is configured to, the first CMAC value of (trunkierten) will be intercepted With such as pass through main crypto module 1410 obtain and calculated twoth CMAC of the intermediate storage in CMAC storage unit 1422 Value is compared.Preferably, comparing unit 1424 is configured first before such comparison.The configuration can be for example including letter Breath, the information correspond to the bit of the 2nd CMAC value calculated, the first CMAC value intercepted.

In other preferred embodiment, such as when main crypto module 1410 is over the 2nd CMAC value (this for example can be by computing device 110 by signalling (signalisiert), such as by means of " last grouping when calculating (Block) " signalling) and when CMAC value calculated is already written in CMAC storage unit 1422, it can push The beginning compared by comparing unit 1424.

In other preferred embodiment, it is slow that data are storable in by comparing 1424 comparison result of unit It rushes in device 1465, the data buffer is preferably constructed in register.

According to a kind of preferred embodiment, for comparing proposition following scheme by means of the implementation of comparing unit 1424.With Length initialization process unit 1420, especially comparing unit or the comparison list of initial bits position and the first CMAC value intercepted Member 1424.Preferably, computing device 110 is configured to, and before implementing to compare by means of comparing unit 1424, will be intercepted The first CMAC value copy to the data buffer 1466(that is arranged thus its preferably and be implemented as register) in, referring to data Connect dv8.It is particularly preferred that by the first CMAC value intercepted be aligned at byte boundary (" byte-by-byte in alignment (bytewise aligned) ") it is stored in data buffer 1466.As long as needing (as long as not having existed for example in this way The alignment at corresponding byte boundary), this can be realized as necessary by computing device 110.According to reality described above The configuration for applying mode can be extremely simple and be efficiently implemented by computing device 110, such as by means of simple memory access (memory copy), the memory access preferably even can with hardware supported be carried out.

For being compared by means of the implementation of comparing unit 1424, following scheme is proposed according to other preferred embodiment. Comparing unit 1424 is initialised by means of the bit-masks stored in optional other data buffer 1477.Preferred Embodiment in the case of, will such bit corresponding with the bit of the first CMAC value intercepted in bit-masks Set (value " 1 "), and remaining bit is resetted or not set (value " 0 ").In these embodiments, computing device 110 correspondingly according to bit-masks over its whole length according to CMAC value calculated such as example to pass through main crypto module The value obtained in this way is stored in data to extend the first intercepted CMAC value by 1410 bit widths provided In buffer 1466.In these embodiments, king-sized flexibility can be realized and relatively less complicated by hard The realization of part.

In other preferred embodiment, it is provided with interrupt requests control unit (English: interrupt Controller or interrupt control unit(interrupt control unit interrupts control unit)) 1440, the interruption is asked Control unit is asked to can be realized: during data processing equipment 100, especially crypto module 1400a operation, to passing through interrupt requests (English: interrupts(interrupt)) can signalling or the event that can characterize reacted.In preferred embodiment situation Under, at least one of following event can be considered by interrupt requests control unit 1440, and optionally to other units, Such as at least one of following event described in 130 signalling of hardware security module, referring to data connection 1442: completing password function Energy, the implementation of such as AES operation (such as passing through main password unit 1410), completion cryptographic function compare through the processing unit 1420, the especially implementation of comparing unit (such as comparison intercepted and CMAC value calculated).Main password unit 1410 can For example to carry out interrupt requests as signalling by means of signal 1410a, and processing unit 1420, especially comparing unit can be with Such as carry out interrupt requests as signalling by means of signal 1420a.It is particularly preferred that in the presence of for hardware security module 130 and/or computing device 110(Fig. 1) signalling interrupt requests exclusive data connection 1442.It is further preferred that signalling It can also design configurablely, such as by means of software-controllable design.In other preferred embodiment situation Under, interrupt requests control unit 1440 is correspondingly general in Fig. 4 with the configuration of itself and/or status register Do not describe for the sake of looking at.

In other preferred embodiment, regular monitoring unit 1450 is set.The rule monitoring unit Be configured to examine: cryptographic function for example promoted by computing device 110, by the implementation of main password unit 1410 be It is no to meet one or more of rules, the regular data that one or more of rules pass through currently valid cryptographic key context POL(Fig. 6) predetermined or permission.If this is such case, cryptographic function is discharged by regular monitoring unit 1450 and is passed through The implementation of main password unit 1410, referring to the arrow of the slave unit 1450 not marked in more detail in Fig. 4 to unit 1410.It is no Then, cryptographic function can be blocked or be prevented by regular monitoring unit 1450 by the implementation of main password unit 1410.In addition Preferred embodiment in the case of, the corresponding state of regular monitoring unit 1450 or main password unit 1410, which can store, to be posted Storage for example manipulates in register 1461a.In other preferred embodiment, it can also so imagine rule, make Analysis from no thoroughfare main password unit 1410 to data buffer 1471b output password function as a result, connecting referring to data Meet dv9 and symbolistic switch dv9a.

In other preferred embodiment, pass through the register or buffering at least partly described above Device is realized in crypto module 1400a or its component 1410,1420,1430,1440,1450 and data processing equipment 100(Fig. 1) Other component 110,130 between interface.

Other advantageous embodiment is described below, the embodiment is related in hardware security module 130 and password Interface between module 1400a.

Preferably, at least one manipulation register or control register can be set, it preferably only can be by hard Part security module 130 accesses, see, for example, appended drawing reference 1461b.The control register for example can be used for, for subsequent cryptographic Function passes through the implementation of crypto module 1400a, and the selection of cryptographic key context can be realized by means of hardware security module 130.

It is further preferred that register 1462 can be set, to pacify cryptographic key and/or link value CV from hardware Full module 130 is transmitted in key storage device 1430 and/or link value CV is transmitted to hardware from key storage device 1430 In security module 130.

It is further preferred that other register 1464 can be set, the other register can only pass through Hardware security module 130 is read, such as the purpose for reading link value CV from key storage device 1430.Thus, it is possible to Advantageously context is supported to convert by hardware security module 130 in the case where software support.

Other advantageous embodiment is described below, the embodiment is related in computing device 110 and crypto module Interface between 1400a.

It is preferably provided with manipulation register or control register 1461a, the accessible manipulation of computing device 110 Register or control register, referring to data connection 150,1461a '.Optionally, hardware is also possible to by the data connection 130 couples of control register 1461a of security module access.

In addition it is possible to use controlling register 1461a to select cryptographic key context, the cryptographic key context can be used for Implement cryptographic function by crypto module 1400a.In order to select corresponding cryptographic key context, such as computing device 110 that can incite somebody to action Corresponding control data are write in control register 1461a.

In addition it is possible to use controlling register 1461a to select one or more cryptographic functions, the cryptographic function should lead to Cross crypto module 1400a or its main password unit 1410 and/or processing unit 1420, especially comparing unit is implemented, such as on The different AES operational modes that face has repeatedly described.

In addition it is possible to use control register 1461a for temporarily, at least store crypto module 1400a or its at least one The internal state or operating status of a component 1410,1420.

Further, it is preferable to the other register 1463 for the value that can be used for inputting link variable CV can be set, such as As the intermediate store for the value of link variable to be transferred to key storage device 1430 from computing device 110.

Further, it is preferable to which other register 1471a can be set, the other register, which can be used for inputting, to be used for Implemented the input data of (multiple) cryptographic function by means of main password unit 1410.Preferably, correspondingly, computing device 110 can write corresponding input data in register 1471a, referring to data connection 1471a'

Further, it is preferable to which other register 1471b can be set, it is close that the other register can be used for exporting master The output data of code unit 1410.Computing device 110 can for example access other register 1471b in a manner of reading, so as to Load output data.As have been described above, in some embodiments it can be stated that only existing accordingly Just output data is write in register 1471b in the case where rule.

In the following, be illustratively described other aspect and embodiment, be related to using data processing equipment 100 or its Guarded communication in the case where crypto module 140,1400,1400a.

In some embodiments, initial phase can be set for guarded communication.In initial phase, The cryptographic key context for being used for one or more secure communication domains can be transferred to crypto module 1400a by hardware security module 130 In, wherein corresponding cryptographic key and/or optional additional data, such as link value CV or optional rule are for example provided POL。

Once such as by computing device 110 or distributing to the communication interface (not shown) of the computing device by means of communication Channel receives message, then computing device 110 can select the received message of the institute corresponding cryptographic key context, such as by means of Help write corresponding control data in register 1461b.The corresponding of unit 1424 can be compared in a manner of comparable Configuration and by received message be input in buffer 1471a and by received message the CMAC value intercepted It is input in buffer 1466.For this purpose, in other embodiment, it may be desirable to, it will by computing device 110 The received message of institute is divided into useful data part (payload) and the part CMAC.Then, in other preferred embodiment party In the case of formula, such as by writing corresponding control data in control register 1461a, computing device 10 can push involved And cryptographic function (such as CMAC value is formed for the received message of institute) pass through crypto module 1400a or main password unit 1410 Implementation.After implementation, comparing unit 1424 can by the CMAC value formed during implementation with received message institute The CMAC value of interception is compared.

It, can be by comparison result, when necessary together with cryptographic key context or mark in other preferred embodiment The value of knowledge cryptographic key context, optionally there are also status codes (it for example characterizes the comparison successfully compared or failed) to write register In 1465 and then it is read in by computing device 110.In other preferred embodiment, comparison result is mentioned For can be by interrupt requests 1420a come signalling, the interrupt requests can especially be transmitted to computing device by unit 1440 110, referring to data connection 1442.

Such as message can be transmitted and (not shown to other units by data processing equipment 100 or its computing device 110 wherein In the case of other embodiment out), it is possible to implement following steps.Preferably, computing device 110 can be according to for that will send out The message sent waits for the security domain of selection to select cryptographic key context, so as to realize through crypto module 1400a to matching CMAC value is sought.Then, in other embodiment, computing device 110 can be transferred to message to be sent In input buffer 1471a, and triggering corresponding AES operation (is present exemplary to exist in input buffer 1471a Message or corresponding data seek CMAC value), such as by will corresponding control data write in control register 1461a come It carries out.

In other embodiment, (message to be sent is sought to present exemplary implementing AES operation CMAC value) after, striked CMAC value can be stored in output buffer 1471b, this advantageously again can be in Disconnected request 1410a carrys out signalling.

Thus, in other embodiment, computing device 110 can format the message to be sent (especially In the case where addition striked CMAC value as described above) and the message to be sent is handed into communication interface To send.

Furthermore conceivable to be in other preferred embodiment, relatively long cryptographic function passes through password The implementation of module is can be interrupted by one or more other, for example relatively short cryptographic functions.This advantageous by Cryptographic key context described above is supported or hardware supported, such as passes through crypto module 1400a and/or hardware supported And software support when necessary, such as utilize the portion by computing device 110 using hardware security module 130 The software-based control divided.

Also conceivable in other advantageous embodiment to be, computing device 110 has multiple calculating cores, The calculating core can be concured in a manner of being illustratively described above with crypto module 1400a respectively.Such as it can Imagination, each of multiple calculating cores maintain the different communication process in such as two different security domains simultaneously And thus using the different cryptographic key contexts supported by crypto module 1400a.

In other advantageous embodiment, the function provided by crypto module 1400a can be advantageously scaled Energy property, mode is other similar or similar crypto module (not shown) to be arranged and for example by means of the second data Bus 150a and/or at least one separated other data/address bus (not shown) will be described other similar or similar close Code module is connected in hardware security module 130.

Fig. 5 schematically shows the simplified flowchart of method according to a kind of embodiment.In optional first step 300 In, such as by the way that corresponding control data are transmitted or write in one or more registers of crypto module, control device 110 (Fig. 1) configures crypto module 140,1400,1400a.In next second step 310, crypto module implements at least one First password function, such as the input data according to provided by (auf) form CMAC value.

Especially in terms of the implementation of cryptographic function, it is advantageously able to realize data processing according to the principle of the embodiment The flexible and efficient operation of device 100.It can be advantageously used for pair according to the data processing equipment of the embodiment Data, for example the received or message to be sent carry out efficient cryptoguard and/or inspection, such as by being formed or being examined Corresponding CMAC value etc. carries out.Particularly advantageously, even if high for data processing equipment 100 or its computing device 110 Communication load in the case where also form relatively low load only for hardware security module 130, this is because cryptographic function The major part of implementation can efficiently pass through at least one crypto module 140,1400,1400a adapter tube.Particularly advantageously, In other preferred embodiment, the practical calculating of cryptographic function can effectively not joined in hardware security module 130 It is carried out in the case where, and does not damage the integrality of domain (secrecy and safety (Security und Safety)) in the case. It can advantageously provide for herein, hardware security module 130 substantially implements configuration task, however does not implement cryptographic function itself Effectively implement.

Compared to traditional data processing equipment, obtained by the embodiment significant in terms of flexibility and efficiency It improves, wherein additionally advantageously also can discretely meet the requirement to security domain (ISO26266) with secure domain.

Another advantage of present embodiment is, can be used for implementing cryptographic function and (such as calculates fingerprint or CMAC value etc. Deng) (such as length of message, the length of fingerprint, freshness counter, verifying/generation, etc.) and preferably by calculating dress Setting the information that 110 can manage directly can be transferred to crypto module by computing device 110, especially not by related data Or information be transferred to hardware security module 130 first in the case where carry out.

All goal systems for data processing equipment, such as can be advantageously imagined according to the principle of the embodiment Equipment is controlled, cryptographic function is used in the goal systems.Particularly advantageously it can be used for according to the principle of the embodiment Equipment is controlled, the communication of the safety with many correspondences is implemented.

19页详细技术资料下载
上一篇:一种医用注射器针头装配设备
下一篇:一种基于CNFET的三值SRAM-PUF电路

网友询问留言

已有0条留言

还没有人留言评论。精彩留言会获得点赞!

精彩留言,会给你点赞!

技术分类