In a secure processor (10), the instruction code including an instruction code stored in the area (14) where the encrypted instruction code is stored in a non-rewritable format is authenticated using a specific key (15) which is specific to the core (11) where the instruction code is executed or an authenticated key by a specific key to perform an encryption processing for the input and output data between the core and the outside.