Font Size: a A A

Design Of TPM Security Chip Based On MIPS Processor

Posted on:2017-10-04Degree:MasterType:Thesis
Country:ChinaCandidate:J Q LiFull Text:PDF
GTID:2348330488959897Subject:Integrated circuit engineering
Abstract/Summary:PDF Full Text Request
Computer not only makes many convenience to our live, but also bring about many problems about security. In terms of personal privacy, information stored in computers and mobile-phones can be got very easily. In terms of property, criminals can get our password through internet. Problems of computer security can even make hidden troubles to national defense. We generally use software to solve the problem of computer security, which has some malpractices. TPM security chip is an efficient solution for the problem of computer security. It not only improves security, but also has high speed of execution. TPM is generally in the form of SOC. The design of this thesis is a SOC with a MIPS processor as the core of the system, and a AMBA bus with some other modules specified by the specification of TPM.The modules completed in this thesis include MIPS processor, DES encryption algorithm, AES encryption algorithm, and SHA-1 algorithm.In this thesis, the architecture of MIPS processor is based on successful experience of some existing products and the pipline is divided legitimately. The mechanisms to deal with exception, adventure and interrupt are added in architecture. Finally, the processor's function is verificated with assembler.DES and AES are currently popular encryption algorithms, which we choose as the symmetric encryption engine of TPM. In this thesis, the core of DES and AES are designed based on the algorithms of DES and AES. The work mode of the two modules is CFB.SHA-1 algorithm is one of the security hash algorithms. In the thesis, the SHA-1 algorithm core is designed as the hash engine. whose interface accords with the AHB bus specification. Finally, the module's function and timing are verificated.All modules included in this paper are designed with Verilog, and verified with AMBA VIP. All modules functions are correct.
Keywords/Search Tags:Trusted Computing, TPM, SOC, MIPS, AES, DES, SHA
PDF Full Text Request
Related items