MOTOROLA MPC180TS, MPC180TD Technical data

查询MPC180供应商
Advance Information
MPC180TS/D Rev. 0.1, 2/2003
MPC180 Security Processor Technical Summary
This document provides an overview of the MPC180 security processor, including a brief development history, target applications, key features, typical system architecture, as well as an MPC180 architectural overview.
1 Development History
The MPC180 is the first in the Smart Networks platform’s S1 family of security processors developed for the commercial networking market. It is derived from security technologies Motorola has developed over the past 30 years, primarily for government applications. The third-generation execution units (EUs) in the MPC180 have been previously used in products for wireless base stations and secure wire-line communication.
2 Typical Applications
The MPC180 is suited for applications such as the following:
SOHO and low-end routers
xDSL access equipment
ISDN access equipment
Wireless base stations
Broadband access
WAP gateways
DSLAMS
Customer premise equipment (CPE)
3 Features
The MPC180 is a flexible and powerful addition to any networking system currently using Motorola’s MPC8xx or MPC826x family of PowerQUICC™ communication processors. The MPC180 is designed to off-load computationally intensive security functions such as key generation and exchange, authentication, and bulk data encryption.
The MPC180 is optimized to process all of the algorithms associated with IPSec, IKE, WTLS/WAP and SSL/TLS. In addition, the MPC180 is the only security processor on the
market capable of executing the elliptic curve cryptography that is especially important for secure wireless communications.
MPC180 features include the following:
Public key execution unit (PKEU), which supports the following: — RSA and Diffie-Hellman
– Programmable field size 80- to 2048-bits – 1024-bit signature time of 32ms – 10 IKE handshakes/second
— Elliptic Curve operations in either F 2 m or F p
– Programmable field size from 55- to 511-bits – 155-bit signature time of 11ms – 30 IKE handshakes/second
Data encryption standard execution units (DEUs) — DES and 3DES algorithm acceleration
– Two key (K1, K2, K1) or Three key (K1, K2, K3) — ECB and CBC modes for both DES and 3DES — 15 Mbps 3DES-HMAC-SHA-1 (memory to memory)
Message authentication unit (MAU) — SHA-1 with 160-bit message digest — MD5 with 128-bit message digest — HMAC with either algorithm
ARC four execution unit (AFEU) — Implements a stream cipher compatible with the RC4 algorithm — 40- to 128-bit programmable key — 20 Mbps ARC Four performance (memory to memory)
Random Number Generator (RNG) — Supplies up to 160 bit strings at up to 5 Mbps data rate
Input Buffer (4kbits)
Output Buffer (4kbits)
Glueless interface to MPC8xx system or MPC826x local bus (50MHz and 66MHz operation)
DMA hardware handshaking signals for use with the MPC826x
1.8v Vdd, 3.3v I/O
100pin LQFP package
HIP4 0.25µm process
4 Typical System Architecture
The MPC180 works well in most load/store, memory-mapped systems. An external processor may execute application code from its ROM and RAM, using RAM and optional non-volatile memory (such as EEPROM) for data storage. Figure 4-1 shows an example of the MPC180 in an MPC8xx system, and Figure 4-2 shows the MPC180 connected to the local bus of the MPC826x. In these examples, the MPC180
2 MPC180 Security Processor Technical Summary MOTOROLA
resides in the memory map of the processor; therefore, when an application requires cryptographic functions, it reads and writes to the appropriate memory location in the security processor.
EEPROM MPC180
MPC860
System Bus
SDRAM
I/O or Network
Interface
Figure 4-1. MPC8xx System Example
EEPROM
SDRAM
DIMMs
60x Bus
MPC8260
SDRAM
I/O or Network
Interface
Figure 4-2. MPC826x System Example
MPC180
Local Bus
SDRAM
5 Architectural Overview
The MPC180 has a slave interface to the MPC8xx system bus and MPC8260 local bus and maps into the host processor’s memory space. Each encryption algorithm is mapped to a unique address space. To perform encryption operations, the host reads and writes to the MPC180 to setup the execution unit and, then, transfers data to the execution unit directly or through the external bus interface.
In FIFO mode, the MPC180 accepts data into the 4-Kbit input buffer and returns burst data through the output buffer. In this way, the host can automatically transfer bulk data through a given EU. This minimizes host management overhead and increases overall system throughput. Once the host configures the external bus interface (EBI), it receives an interrupt only after all data has been transferred or processed by the MPC180.
MOTOROLA MPC180 Security Processor Technical Summary 3
Loading...
+ 5 hidden pages