Efficient secure chip power consumption attack test method
A power consumption attack and security chip technology, which is applied in the field of chip information security, can solve the problems of low accuracy of simulation attack methods, unsuitable for verifying security chip anti-power consumption analysis characteristics, and low reliability of results, etc.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0041] The present invention will be further described below in conjunction with the accompanying drawings and specific embodiments.
[0042] Such as figure 1 Shown is the overall framework of the security chip power consumption attack testing method of the present invention. There are three core parts in the security chip power consumption attack test method: a function simulation module, a power consumption simulation module and a power consumption analysis module. The basic process is to first synthesize the RTL code of the algorithm through the DC (Design Compiler, DC) tool to generate a circuit netlist file, and then load the test vectors necessary for the netlist such as plaintext and clock, and the standard cell library and timing parameters used by the netlist Simulate through VCS together to generate functional simulation waveforms. Functional simulation waveforms need to be converted into VCD files required for power simulation analysis. Then set the simulation en...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com