Font Size: a A A

TPM Design Based On SoC Methodology

Posted on:2008-08-29Degree:MasterType:Thesis
Country:ChinaCandidate:J SunFull Text:PDF
GTID:2178360212976086Subject:Circuits and Systems
Abstract/Summary:PDF Full Text Request
Along with the popularization of the Internet, Information Security is becoming more and more important. People recently realized that the classical computing platform was unable to protect critical information assets. Accordingly, new trusted computing platforms are under hot discussion. This thesis focuses on the Trusted Platform Module (TPM), the core element of Trusted Computing. Based on the SoC design methodology, a system level TPM architecture was present. Meanwhile, the author also proposed several cryptographic IP cores, such as RSA, RNG, HMAC/SHA-1 and 3DES, in which the overall architecture and the 3DES IP design were directly under the author's charge and hence were elaborated in detail.At the beginning, the author discussed the SoC design methodology which mainly consists of three parts: IC design, IP design and reuse, and software-hardware cooperation. The embedded processor M*Core M310 and the related bus system employed in the TPM were also discussed. Based on this, according to the TPM specification, the author designed the TPM hardware architecture and firmware. The hardware architecture contains modules division, memory address allocation, signals...
Keywords/Search Tags:SoC methodology, TPM, M*Core, Crypto Algorithm, 3DES, Simulation Verification
PDF Full Text Request
Related items