Dummy bus access, Dummy bus access timing figure 9–3 – Mitsubishi Motors DS5000TK User Manual

Page 77

Advertising
background image

CE1

ALE

BA14–0

BD7–0

XXXXh

YYYYh

QQQQh

RRRRh

SINGLE CYCLE INSTRUCTION

SINGLE CYCLE INSTRUCTION

ENCRYPTED MEMORY ACCESS WITH DUMMY FETCHES

Either XXXX or YYYY is real but encrpted, the other is pseudo–random.
Either QQQQ or RRRR is real but encrypted, the other is pseudo–random.
Either Byte1 or Byte2 is used, the other is a dummy fetch and is not used. Both are encrypted.
Either Byte3 or Byte4 is used, the other is a dummy fetch and is not used. Both are encrypted.

BYTE1 IN

BYTE2 IN

BYTE3 IN

BYTE4 IN

USER’S GUIDE

050396 76/173

77

Dummy Bus Access

The Secure Microcontroller makes its memory contents
obscure through encryption. Additional steps are also to
prevent analysis of the bus activity by 8051–familiar
hackers. Both the DS5000FP and DS5002FP insert
dummy memory operations when possible. In the 8051
architecture, there are typically two identical memory
accesses per instruction cycle, but most operations so
nothing with the second program fetch. In the Secure
Microcontroller, a pseudo–random address is gener-
ated for the dummy cycle and this random memory
address is actually fetched, but the dummy data is dis-
carded. The order of the real and dummy accesses are

switched according to a pseudo–random process. This
is repeatable so that the execution always appears the
same. During these pseudo–random cycles, the RAM is
to all appearance read. Thus by repeatedly switching
between real and dummy access, it is impossible to dis-
tinguish a dummy cycle from a real one. In analyzing
bus activity, a large percentage of the memory fetches
will be garbage that has no meaning. The dummy
accesses are always performed on a DS5002FP, but
are only used on a DS5000FP when encryption is
enabled. Naturally, dummy accesses are always read
operations since the dummy address might contain
valid data.

DUMMY BUS ACCESS TIMING Figure 9–3

CE1

ALE

BA14–0

BD7–0

PC

PC

PC+1

PC+1

CODE IN

CODE IN

CODE IN

CODE IN

SINGLE CYCLE INSTRUCTION

SINGLE CYCLE INSTRUCTION

NON–ENCRYPTED MEMORY ACCESS

Advertising
This manual is related to the following products: