Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method for early alarming by-path attack in safety chip

A security chip, early warning technology, applied in the field of information security

Inactive Publication Date: 2009-03-11
NAT UNIV OF DEFENSE TECH
View PDF0 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, there is no public technical report on how to perform early warning according to the characteristics of side-channel attacks in the security chip

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for early alarming by-path attack in safety chip
  • Method for early alarming by-path attack in safety chip
  • Method for early alarming by-path attack in safety chip

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0084] figure 1 The overall flow chart for early warning of bypass attacks in the security chip mainly includes the following steps:

[0085] 1. Design side channel attack early warning module, the specific design method is:

[0086] 1.1 Design the reset suppression unit, which uses the system reset signal as input to generate an internal reset signal for the bypass attack early warning module, and ensures that the security chip is reset only once during the period from power-on to power-off;

[0087] 1.2 Design the counting unit, which takes the interconnection bus signal (including address line, data line and control line) of the security chip as input, that is, monitors the interconnection bus in the chip, and counts the number of private key encryption and decryption operations performed by the security chip within a certain period of time;

[0088] 1.3 Design an early warning unit to determine the current probability of the chip being subjected to a side channel attack a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method for conducting early alarming against side-channel attack in a security chip. The technical problem to be solved is the early alarming against the side-channel attack in the security chip. The technical proposal aims at designing a side-channel attack early alarming module comprising a reset inhibition unit, a counting unit, an alarming unit and a spot protection and restoration unit; the side-channel attack early alarming module is integrated into the security chip and still in active status after being electrically reset on the security chip; and a ratio of the security chip suffering from the side-channel attack is periodically calculated and output. The method can determine the ratio of the security chip suffering from the side-channel attack, and is suitable for various side-channel attacks. And the side-channel attack early alarming module per se has very high security performance.

Description

technical field [0001] The invention belongs to the field of information security, and in particular relates to a method for early warning of bypass attacks in a security chip. Background technique [0002] With the improvement of social informatization, security chips represented by smart cards have been widely used in various fields. The main functions of the security chip include: safe storage of data, data encryption and decryption, digital signature and authentication, and identity authentication. The realization of the above functions depends on modern cryptographic algorithms, including public key cryptographic algorithms, block cipher algorithms, and stream cipher algorithms. Public key cryptographic algorithms are mainly used for digital signature and authentication to realize identity authentication, such as RSA (Rivest-Shamir-Adlemen) and ECC (Elliptic Curve Crypto-system: elliptic curve cryptographic algorithm); block cipher algorithms are used for data encrypti...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/00G06F21/57
Inventor 王志英童元满陆洪毅任江春王蕾戴葵龚锐石伟阮坚马俊
Owner NAT UNIV OF DEFENSE TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products