Network Security Internet Technology Development Database Servers Mobile Phone Android Software Apple Software Computer Software News IT Information

In addition to Weibo, there is also WeChat

Please pay attention

WeChat public account

Shulou

What is the RTL encryption method?

2025-01-19 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Internet Technology >

Share

Shulou(Shulou.com)06/01 Report--

This article mainly explains "what is the RTL encryption method". Interested friends may wish to have a look at it. The method introduced in this paper is simple, fast and practical. Now let the editor take you to learn "what is the RTL encryption method"?

Some IP vendor often need to encrypt RTL in order to protect themselves, or some companies need to encrypt RTL in order to prevent robbery, theft and AE. In order to meet the needs of customers, EDA companies provide encryption methods suitable for their own tools, in addition to the following two encryption mechanisms IEEE1800 and IEEE 1735, it seems that IEEE 1735 is more used in the industry at present, and this is also the encryption mechanism recommended by IEEE-IEEE Std 1735 ™- 2014: "IEEE Recommended Practice for Encryption and Management of Electronic Design Intellectual Property (IP)"

The standard mechanism IEEE1800, which lets you protect Verilog files using the IEEE Verilog standard and VHDL files using the IEEE VHDL standard.

The new mechanism IEEE 1735, which provides versioning for the encryption of pragma definitions and use models.

For IP Vendor or multiple EDA tools that will be used within the company, it is strongly recommended to use 1735 encryption, otherwise you need to add a set to each, which may lead to the risk of version misalignment. The advantage of 1735 is that it can be encrypted with either a user-defined key or a public key from three EDA companies. The public keys of the three EDA companies are:

For example, encrypt RTL with M's tool and use C's tool to read:

Command: vcom + protect=r.vhdlp r.vhd encrypts the RTL with the C home public key on the left to the right:

You can also use C's tools to encrypt and M's tools to read:

In addition to using a public key, you can also use a user-defined key, taking the C home tool as an example:

To generate a private key, the default key length is 512 bits, and the key length can be defined as 256-4096 bits. The longer the key, the higher the security. Execute the following command to generate two files: key.pub and key.prv.xmprotect-messages-rsakeygenerate-keylength 512-keyname key format conversion, use the UNIX command uuencode to convert the binary key into base64 format: uuencode-m key.pub configure encryption parameters, assign the second converted key to key_public_key, the recommended data_method is AES128-CBC and AES256-CBC. .`salary version = 1

`protect data_method = "AES128-CBC"

`protect key_keyowner = "Cadence Design Systems.", key_method = "rsa", key_keyname = "cds_rsa_key", key_public_key =

The encrypted RTL is provided to the user together with the key.prv.

The user can point the path where key.prv is located to the environment variable NCPROTECT_KEYDB.

As for each EDA company's own encryption method is relatively simple, and does not need a key, such as C family can be the following command: ncprotect-autoprotect-synthesis output_netlist:cleartext-synthesis viewers:debugall encrypted IP can not be accessed through the following ways: t cl, SimVision, and programming interfaces, including PLI/VPI, VHPI, and C interface.Schematic generators or state machine extraction.Warning and error messages from protected regions are either suppressed or generic messages are issued. For the digital implementation side, elaborate is followed by GTECH. If engineers want debug, they have no choice but to pick GTECH. After synthesis, the netlist should not be encrypted. So far, Prunr tools do not support encrypted netlist. In addition, some IP Vendor do not bother to encrypt and throw a GTECH directly to the user. It is strongly recommended that if it is necessary, please provide a matching set of GTECH for each EDA company, otherwise there must be something wrong with the donkey's head and horse's mouth, which is purely Jiao Zhongqing's fucking pot. At this point, I believe you have a deeper understanding of "what is the RTL encryption method?" you might as well do it in practice. Here is the website, more related content can enter the relevant channels to inquire, follow us, continue to learn!

Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.

Views: 0

*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.

Share To

Internet Technology

Wechat

© 2024 shulou.com SLNews company. All rights reserved.

12
Report