Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Clock frequency error injection attack resisting defense circuit of security chip

A technology of error injection attack and clock frequency, which is applied in the protection of internal/peripheral computer components, etc., can solve the problems of security chips not suitable for low power consumption, complex clock frequency detection circuit, and large chip area occupied, and achieve fast detection speed , simple structure, reduced area and power consumption

Active Publication Date: 2016-11-09
HEFEI UNIV OF TECH
View PDF3 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Currently commonly used clock frequency detection circuits are relatively complex, requiring reference clocks, frequency dividers, counters, comparators, etc., and some logic operations are cumbersome, resulting in large power consumption and large chip area, and are not suitable for low-power security chips.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Clock frequency error injection attack resisting defense circuit of security chip
  • Clock frequency error injection attack resisting defense circuit of security chip
  • Clock frequency error injection attack resisting defense circuit of security chip

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0036] In this embodiment, a defense circuit against clock frequency error injection attack of a security chip is used to detect the frequency of the clock CLK, such as figure 1 As shown, including detection module 10 and detection module 20:

[0037] The detection module 10 includes: a first NMOS transistor M1, a second NMOS transistor M2, a first transmission gate TG1, a second transmission gate TG2, a third transmission gate TG3, and a fourth transmission gate TG4; and the area of ​​the first NOMS transistor M1 is larger than The second NOMS transistor M2 mainly realizes charging the NMOS capacitor when the clock is at a high level, and discharging the NMOS capacitor when the clock is at a low level;

[0038] The source and drain of the first NMOS transistor are connected in parallel with one end of the first transmission gate TG1, and the gate of the first NMOS transistor is connected in parallel with the other end of the first transmission gate TG1 and then connected in s...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a clock frequency error injection attack resisting defense circuit of a security chip. The defense circuit is characterized by comprising a detection module and a judgment module; the detection module comprises a first NMOS transistor M1, a second NMOS transistor M2, a first transmission gate TG1, a second transmission gate TG2, a third transmission gate TG3 and a fourth transmission gate TG4, and the judgment module comprises a first Schmitt trigger A1, a second Schmitt trigger A2, a first D trigger D1, a second D trigger D2 and an XNOR gate XNOR. By means of the defense circuit, the clock frequency can be limited within a security frequency range, and thus clock frequency error injection attacks can be effectively prevented.

Description

technical field [0001] The invention relates to the field of hardware information security, in particular to a security chip defense circuit against clock frequency error injection attack. Background technique [0002] In the field of information security applications, security chips based on specific cryptographic algorithms can provide confidentiality and integrity protection for sensitive information. At the same time, the important role of security chips in information security protection makes them vulnerable to various attacks and is facing more and more serious security challenges. These attacks mainly include: static attack and dynamic attack, the former includes invasive attack and semi-invasive attack, such as micro-probe attack technology, laser scanning technology; the latter includes non-intrusive attack, such as power analysis, software attack and error Injection attack method. For the method of dynamic attack, anti-attack measures are proposed in four aspect...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/71
CPCG06F21/71
Inventor 尹勇生汪涛陈红梅邓红辉黄超蹇茂琛
Owner HEFEI UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products