Instructions
Most instructions are contained within a single, parameterless machine word.
Some instructions take a machine word as argument and are so considered double-word instructions.
They are recognized by the form “instr
+ arg
”.
Regarding Opcodes
An instruction's operation code, or opcode, is the machine word uniquely identifying the instruction. For reasons of efficient arithmetization, certain properties of the instruction are encoded in the opcode. Concretely, interpreting the field element in standard representation:
- for all double-word instructions, the least significant bit is 1.
- for all instructions shrinking the operational stack, the second-to-least significant bit is 1.
- for all u32 instructions , the third-to-least significant bit is 1.
The first property is used by instruction skiz.
The second property helps guarantee that operational stack underflow cannot happen.
It is used by several instructions through instruction group stack_shrinks_and_top_3_unconstrained
.
The third property allows efficient arithmetization of the running product for the Permutation Argument between Processor Table and U32 Table.
OpStack Manipulation
Instruction | Opcode | old OpStack | new OpStack | Description |
---|---|---|---|---|
pop | 2 | _ a | _ | Pops top element from stack. |
push + a | 1 | _ | _ a | Pushes a onto the stack. |
divine | 8 | _ | _ a | Pushes a non-deterministic element a to the stack. Interface for secret input. |
dup + i | 9 | e.g., _ e d c b a | e.g., _ e d c b a d | Duplicates the element i positions away from the top, assuming 0 <= i < 16 . |
swap + i | 17 | e.g., _ e d c b a | e.g., _ e a c b d | Swaps the i th stack element with the top of the stack, assuming 0 < i < 16 . |
Instruction divine
(together with divine_sibling
) make TritonVM a virtual machine that can execute non-deterministic programs.
As programs go, this concept is somewhat unusual and benefits from additional explanation.
The name of the instruction is the verb (not the adjective) meaning “to discover by intuition or insight.”
From the perspective of the program, the instruction divine
makes some element a
magically appear on the stack.
It is not at all specified what a
is, but generally speaking, a
has to be exactly correct, else execution fails.
Hence, from the perspective of the program, it just non-deterministically guesses the correct value of a
in a moment of divine clarity.
Looking at the entire system, consisting of the VM, the program, and all inputs – both public and secret – execution is deterministic:
the value a
was supplied as a secret input.
Control Flow
Instruction | Opcode | old OpStack | new OpStack | old ip | new ip | old JumpStack | new JumpStack | Description |
---|---|---|---|---|---|---|---|---|
nop | 16 | _ | _ | _ | _ + 1 | _ | _ | Do nothing |
skiz | 10 | _ a | _ | _ | _ + s | _ | _ | Skip next instruction if a is zero. s ∈ {1, 2, 3} depends on a and whether the next instruction takes an argument. |
call + d | 25 | _ | _ | o | d | _ | _ (o+2, d) | Push (o+2,d) to the jump stack, and jump to absolute address d |
return | 24 | _ | _ | _ | o | _ (o, d) | _ | Pop one pair off the jump stack and jump to that pair's return address (which is the first element). |
recurse | 32 | _ | _ | _ | d | _ (o, d) | _ (o, d) | Peek at the top pair of the jump stack and jump to that pair's destination address (which is the second element). |
assert | 18 | _ a | _ | _ | _ + 1 | _ | _ | Pops a if a == 1 , else crashes the virtual machine. |
halt | 0 | _ | _ | _ | _ + 1 | _ | _ | Solves the halting problem (if the instruction is reached). Indicates graceful shutdown of the VM. |
Memory Access
Instruction | Opcode | old OpStack | new OpStack | old ramv | new ramv | Description |
---|---|---|---|---|---|---|
read_mem | 40 | _ p | _ p v | v | v | Reads value v from RAM at address p and pushes v onto the OpStack. |
write_mem | 26 | _ p v | _ p | _ | v | Writes OpStack's top-most value v to RAM at the address p , popping v . |
Hashing
Instruction | Opcode | old OpStack | new OpStack | Description |
---|---|---|---|---|
hash | 48 | _jihgfedcba | _yxwvu00000 | Overwrites the stack's 10 top-most elements with their hash digest (length 5) and 5 zeros. |
divine_sibling | 56 | _ iedcba***** | e.g., _ (i div 2)edcbazyxwv | Helps traversing a Merkle tree during authentication path verification. See extended description below. |
assert_vector | 64 | _ | _ | Assert equality of st(i) to st(i+5) for 0 <= i < 4 . Crashes the VM if any pair is unequal. |
absorb_init | 72 | _jihgfedcba | _jihgfedcba | Resets the Sponge's state and absorbs the stack's ten top-most elements. |
absorb | 80 | _jihgfedcba | _jihgfedcba | Absorbs the stack's ten top-most elements into the Sponge state. |
squeeze | 88 | _jihgfedcba | _zyxwvutsrq | Squeezes the Sponge, overwriting the stack's ten top-most elements |
The instruction hash
works as follows.
The stack's 10 top-most elements (jihgfedcba
) are reversed and concatenated with six zeros, resulting in abcdefghij000000
.
The permutation xlix
is applied to abcdefghij000000
, resulting in αβγδεζηθικuvwxyz
.
The first five elements of this result, i.e., αβγδε
, are reversed and written to the stack, overwriting st5
through st9
.
The top elements of the stack st0
through st4
are set to zero.
For example, the old stack was _ jihgfedcba
and the new stack is _ εδγβα 00000
.
The instruction divine_sibling
works as follows.
The 11th element of the stack i
is taken as the node index for a Merkle tree that is claimed to include data whose digest is the content of stack registers st5
through st9
, i.e., edcba
.
The sibling digest of edcba
is zyxwv
and is read from the input interface of secret data.
The least-significant bit of i
indicates whether edcba
is the digest of a left leaf or a right leaf of the Merkle tree's base level.
Depending on this least significant bit of i
, divine_sibling
either
- (
i
= 0 mod 2, i.e., current node is left sibling) movesedcba
into registersst0
throughst4
and moveszyxwv
into registersst5
throughst9
, or - (
i
= 1 mod 2, i.e., current node is right sibling) does not change registersst5
throughst9
and moveszyxwv
into registersst0
throughst4
.
The 11th element of the operational stack i
is shifted by 1 bit to the right, i.e., the least-significant bit is dropped.
In conjunction with instruction hash
and assert_vector
, the instruction divine_sibling
allows to efficiently verify a Merkle authentication path.
The instructions absorb_init
, absorb
, and squeeze
are the interface for using the permutation xlix
in a Sponge construction.
The capacity is never accessible to the program that's being executed by Triton VM.
At any given time, at most one Sponge state exists.
Only instruction absorb_init
resets the state of the Sponge, and only the three Sponge instructions influence the Sponge's state.
Notably, executing instruction hash
does not modify the Sponge's state.
When using the Sponge instructions, it is the programmer's responsibility to take care of proper input padding:
Triton VM cannot know the number of elements that will be absorbed.
Base Field Arithmetic on Stack
Instruction | Opcode | old OpStack | new OpStack | Description |
---|---|---|---|---|
add | 34 | _ b a | _ c | Computes the sum (c ) of the top two elements of the stack (b and a ) over the field. |
mul | 42 | _ b a | _ c | Computes the product (c ) of the top two elements of the stack (b and a ) over the field. |
invert | 96 | _ a | _ b | Computes the multiplicative inverse (over the field) of the top of the stack. Crashes the VM if the top of the stack is 0. |
eq | 50 | _ b a | _ (a == b) | Tests the top two stack elements for equality. |
Bitwise Arithmetic on Stack
Instruction | Opcode | old OpStack | new OpStack | Description |
---|---|---|---|---|
split | 4 | _ a | _ hi lo | Decomposes the top of the stack into the lower 32 bits and the upper 32 bits. |
lt | 6 | _ b a | _ a<b | “Less than” of the stack's two top-most elements. Crashes the VM if a or b is not u32. |
and | 14 | _ b a | _ a&b | Bitwise and of the stack's two top-most elements. Crashes the VM if a or b is not u32. |
xor | 22 | _ b a | _ a^b | Bitwise exclusive or of the stack's two top-most elements. Crashes the VM if a or b is not u32. |
log_2_floor | 12 | _ a | _ ⌊log₂(a)⌋ | The number of bits in a minus 1, i.e., . Crashes the VM if a is 0 or not u32. |
pow | 30 | _ e b | _ b**e | The top of the stack to the power of the stack's runner up. Crashes the VM if a or b is not u32. The result might be no u32 – care advised. |
div | 20 | _ d n | _ q r | Division with remainder of numerator n by denominator d . Guarantees the properties n == q·d + r and r < d . Crashes the VM if n or d is not u32 or if d is 0. |
pop_count | 28 | _ a | _ w | Computes the hamming weight or “population count” of a . Crashes the VM if a is not u32. |
Extension Field Arithmetic on Stack
Instruction | Opcode | old OpStack | new OpStack | Description |
---|---|---|---|---|
xxadd | 104 | _ z y x b c a | _ z y x w v u | Adds the two extension field elements encoded by field elements z y x and b c a , overwriting the top-most extension field element with the result. |
xxmul | 112 | _ z y x b c a | _ z y x w v u | Multiplies the two extension field elements encoded by field elements z y x and b c a , overwriting the top-most extension field element with the result. |
xinvert | 120 | _ z y x | _ w v u | Inverts the extension field element encoded by field elements z y x in-place. Crashes the VM if the extension field element is 0. |
xbmul | 58 | _ z y x a | _ w v u | Scalar multiplication of the extension field element encoded by field elements z y x with field element a . Overwrites z y x with the result. |
Input/Output
Instruction | Opcode | old OpStack | new OpStack | Description |
---|---|---|---|---|
read_io | 128 | _ | _ a | Reads a B-Field element from standard input and pushes it to the stack. |
write_io | 66 | _ a | _ | Pops a from the stack and writes it to standard output. |