Technological Review About Microcontroller Configured For External Memory Decryption

2082 words - 9 pages

American University of Sharjah – Computer Engineering College
Presented by: Larbi Yazid b00052497 under the supervision of Dr Tarik Ozkul
Academic year: 2013-2014

This article will address the publication "MICROCONTROLLER CONFIGURED FOR EXTERNAL MEMORY DECRYPTION" in technological and systematic perspective. First, there will be a brief description of the structure and functioning of the microcontroller. Then, we'll try to answer some questions that can pass through the mind when reading the publication. At the end the Article could also offer suggestions or other perspectives for future ...view middle of the document...

We begin with the Program Counter which may receive a signal from the operating system or another device, the Program Counter will transmit a signal to the Address Alignment Module which is in charge of two functions: the first is to calculate the Offset Pointer that will point to the selected instruction in the cache containing the decrypted data, this instruction will be loaded into the instruction register; and the second is to forward the address of the block to fetch to the Address Generator.
On its side, Address Generator may put the address in the address bus regardless of its size, and then communicates the reading time to the first cache that will receive the encrypted data.
Once the data is in the cache, they pass throw the Decryption Engine synchronized with a clock faster than the clock that synchronizes the instruction register and the Program Counter.
In the end, the decrypted data is loaded into the second cache, and the instruction pointed by the Pointer Offset is loaded into the instruction register, and the cycle can be restarted.

Detailed study of the system.
During our reading of the article "Microcontroller configured for external memory decryption", some questions had risen to the surface, and we have tried to clarify some points, and to provide further details referring to other papers that have treated the same subject or a topic of the same area of ​​research.
1. How do the nodes communicate between themselves?
Regarding the paper “Peer-to-peer communications in ami with source-tree routing”
(CA 2755331 C), there are two classes of nodes according to the processing and the memory’s size: full functionality nodes and Reduced functionality nodes, as the structure is built in form of tree, rout nodes store only the coordinates of neighboring nodes, and therefore the routing is a peer-to-peer communication.
2. How does the decryption engine function?
We will provide details about the functioning of the decryption engine according to the publication entitled "Encryption and decryption device” U.S. 20120069997 A1.
Decryption uses a secret key, and calculated from data in clear, with the help of the following elements: Memory for saving temporary data and interface that retrieves the encrypted data.
Decryption goes through four levels or layers:
* First, calculating the intermediate data using a secret key after a round key and stored in memory.
* In the second plane, an encryption of the data i (1 <i <N) is performed, where N is the total number of data.
* The third level comprises applying a conversion arithmetic operation to mix the second last intermediate data (Nth) with the following one (N+1th) and stores the result.
* The fourth level is the partial encryption of data to have a data in clear, by performing an inverse conversion of the (N +1th) intermediate data operation.

3. How does the system detect errors, control the transmission and ensure the data coherence?

Other Essays Like Technological Review About Microcontroller Configured for External Memory Decryption

Department of Defense (Dod) Ready Essay

2319 words - 10 pages specifically configured for external access, such as applications accessible outside the Network, email, etc. Dial-up access, remote PC connection applications such as Skype, logmein, PC Anywhere, gotomypc, etc., are not allowed. All requests for VPN access into the Network shall be approved by the User’s supervisor and the User’s Department Head. 6. Removable Media Users shall only use Removable Media that has been supplied by the Firm. Any

Crypography Essay

605 words - 3 pages credit and debit card data of customers easily. Firewall is a technological barrier preventing any unauthorized or malice communication between networks. On the session level protection, Stateful Firewall is suggested to use in this case as keeps track of the state of network connections travelling across, like TCP streams, UDP communication. For instance, firewall intercepts the SYN from an external host and send back a SYN/ACK without passing


663 words - 3 pages configure the firewall properly. When Bibliofind wanted to store their data they should have had a firewall as it's an important step in processing, log-ons, loging data, transferring data, and ensuring that the data is secure and the destination is trusted. A firewall isn't just a wall for a company like Biblio. It's a security blanket for secured, controlled, and audited tranactions. If the firewall is configured and maintained properly, it can

Embedded System and Bio-informatics

2238 words - 9 pages . X. PIC controller PIC controller is one of the versatile device by which the interfacing and working is easier. As the name implies the programmable interface controller is exclusively designed for peripheral interfacing. Features • It has a 16 bit flash memory. • It is 1-Iakh times erasable and writable. • Code protection is available. • Data retention is about 75 years. XI. Probable problems Problem 1

Microprocessor Interfacing

589 words - 3 pages three examples each of internal and external peripheral devices as referenced to the HCS12 microcontroller and not an entire PC. (2 points) The internal peripherals consist of a 16-bit central processing unit, a 128 KB of flash EEPROM, and a 4 KB of RAM. The external peripherals can consist of a keyboard, monitor, and a matrix keypad. 2. Given “the requirements of each signal’s destination must match the capabilities of the

Mba in Mis

4097 words - 17 pages .         Let's address that issue of the truth table.  Here is a truth table for you to fill in.  (Print this web page if you want to work on it.) X | Y | P | Q | 0 | 0 |   |   | 0 | 1 |   |   | 1 | 0 |   |   | 1 | 1 |   |   |         Let's review what you know about this circuit.  We can focus on what happens when X= 0, and Y = 0, the first entry in the truth table above. * If X = 0, then P = 1.  We know that if either input to a NAND

Auto Speed Control

3069 words - 13 pages SPEED LIMIT ZONE we would like to convey our sincere thanks to the staff of mechanical department for giving us the wonderful opportunity to carry out our project. We would also like to express our gratitude to Prof. Sandeep Joshi and Prof. Nimisha Motghare for providing us with all the details about the project. We would like to thank the H.O.D. Prof. Chandrababu and all teaching and non teaching staff of the college for their guidance

Ethical Hacking

5637 words - 23 pages students for review, or to be printed for classroom distribution. ● ● ● ● Lab Requirements The hands-on activities in this book help you apply what you have learned about conducting security or penetration tests. The following are the minimum system requirements for completing all activities: ● Computers that boot to Windows Vista, with Windows Firewall and any third-party firewall software disabled Access to the Internet, with

Embedded Systems

5354 words - 22 pages to design a set of custom integrated circuits-one for each of their new calculator models. The 4004 were Intel's response. Rather than design custom hardware for each calculator, Intel proposed a general-purpose circuit that could be used throughout the entire line of calculators. This general purpose processor was designed to read and execute a set of instructions software stored in an external memory chip. Intel's idea was that the software

Cryptography & Online Bankcard Transactions

1796 words - 8 pages about any network, particularly the Internet. VII. Secret Key Cryptography With secret key cryptography, a single key is used for both encryption and decryption. The sender uses the key (or some set of rules) to encrypt the plaintext and sends the ciphertext to the receiver. The receiver applies the same key (or ruleset) to decrypt the message and recover the plaintext. Because a single key is used for both functions, secret key

Applications of Rfid

1677 words - 7 pages center of road depends on where the tag is attached on the vehicle. The tag contains unique identification number in which its data read by the RFID reader will be taken by microcontroller (8051) that will process the data for authentication of authorized user and compares it with the data in the computer database. In case the ID has been blacklisted on local authorities database, it can be automatically detected and the gate should not open and

Related Papers

Micrcontroller Essay

3555 words - 15 pages ] Programs Microcontroller programs must fit in the available on-chip program memory, since it would be costly to provide a system with external, expandable, memory. Compilers and assemblers are used to convert high-level language and assembler language codes into a compact machine code for storage in the microcontroller's memory. Depending on the device, the program memory may be permanent, read-only memory that can only be programmed at the factory

Gmr Applications Essay

1891 words - 8 pages process the situation and to result desired outputs from system inputs. For any microcontroller-based structure in addition a chip programmer is needed to transfer the program into EEPROM code memory of microcontroller chosen by designer. The best scheme to minimize the size of hardware and even the program to be executed is to use an AVR microcontroller. This way there will be no need to external ADC and there are so many other advantages in such

Electronics Essay

5193 words - 21 pages point for the signal voltage at TP1 (+) and TP2 (-). The signalvoltage is also being fed into op-amp B which is configured as a comparator that gets its referencevoltage at the inverting input from potentiometer R4 (Trip Level) and is also available at TP3 (+) and TP4(-). The output of op-amp B goes out to the ALR pin through a 1 kΩ resistor providing a TTL-compatiblesignal to a microcontroller. This output also connects to a red LED on the gas

Active Directory And Dns Design Essay

2525 words - 11 pages and Cisco UCS Blade servers. Each of the VLAN has mix of Unix and Microsoft Servers. Most Microsoft servers are virtualized and staged on Microsoft Hyper-v with appropriate VLAN tags configured for communication between servers and Storage arrays. CLT is engaging SKV, a Microsoft Premier Consulting firm to perform DNS Designing and Configuration which involves configuring DNS servers in three Active Directory Domains and establish communication