Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Crypto chip system for resisting physical invasion and side-channel attack and implementation method thereof

A side-channel attack and cryptographic chip technology, which is applied in the field of cryptographic chip systems against physical intrusion and side-channel attacks, can solve problems such as unsuitable public key cryptography, cryptographic chip security measures that are difficult to meet computing security, and do not provide security.

Inactive Publication Date: 2012-03-28
GUANGZHOU UNIVERSITY +1
View PDF3 Cites 40 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This mode of operation is suitable for symmetric cryptographic algorithms against SCA, but not for public key cryptography
In addition, the security premise of this mode of operation is equivalent to using each key only once, which may have serious key distribution and management problems for practical applications
[0016] Although the aforementioned PUF can effectively increase the complexity of physical intrusion attacks, for SCA, PUF does not provide additional security
[0017] To sum up, the current encryption chip security measures are difficult to meet the two implicit premises of computing security mentioned above, that is, it is difficult to meet:

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Crypto chip system for resisting physical invasion and side-channel attack and implementation method thereof
  • Crypto chip system for resisting physical invasion and side-channel attack and implementation method thereof
  • Crypto chip system for resisting physical invasion and side-channel attack and implementation method thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0095] The cryptographic chip system of this embodiment resisting physical intrusion and bypass attack, such as figure 1 As shown, it includes a dynamic key management module DKMM that limits the number of uses of each key and performs key update management, and also includes

[0096] DKMM non-volatile memory module specially used to save auxiliary information required by DKMM;

[0097] Evaluate the SCA security of DKMM to set the maximum allowable use times of its keys, and the DKMM trust management party to prevent tampering and replay of DKMM non-volatile memory content.

[0098] The DKMM includes a physical unclonable key module KPUF, a symmetric cryptographic algorithm execution engine, a public key cryptographic algorithm execution engine, a HASH execution engine, a random number generation module, a symmetric key use count register group, a private key use count register group, The cryptographic engine controls the state machine, and the sensitive circuits of the KPUF ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a crypto chip system for resisting physical invasion and side-channel attack and an implementation method thereof. The system comprises a dynamic key management module, a nonvolatile memory module and a trust management end. The invention also discloses an implementation method for the system, which comprises the following steps: (1) initializing, (2) key calling counting and starting; (3) key generation and recovery; (4) closing; and (5) opening. The key is dynamically extracted from a physically no-cloning key module, the trust management end is introduced, and the steps in the implementation method are combined, so that the nonvolatile memory of the chip has the capacity for resisting physical invasion and attack. The application number of times of each key is counted to implement forced updating after reaching the specified value, so that the side-channel attacker can not collect the same key to adequately reveal the sample, and thus, the side-channel attack becomes invalid.

Description

technical field [0001] The invention relates to the security field of cipher chips in information security, in particular to a cipher chip system resisting physical intrusion and bypass attack and a realization method thereof. Background technique [0002] With the development of science and technology, cryptographic chips have been widely used in various fields such as finance, telecommunications, government departments, public utilities, transportation, energy, medical care, national defense and the military. As the core of security technology, cryptographic chips are known as the information security industry The "trust origin" of the chain. [0003] The cryptographic algorithm used on the cryptographic chip can generally achieve computational security in traditional theoretical analysis, that is, it is computationally infeasible to break the cryptographic algorithm through theoretical calculation. Theoretical computing security implies two premises: [0004] a) Keys ar...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/00G06F21/55
Inventor 邹候文唐韶华唐春明董军武苏胡双
Owner GUANGZHOU UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products