Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Chip Encryption Method

一种加密方法、芯片的技术,应用在仪器、电数字数据处理、内部/外围计算机组件保护等方向,达到增加成本及难度、操作安全可靠、保证秘钥唯一性的效果

Active Publication Date: 2018-05-15
GUANGZHOU ZHONO ELECTRONICS TECH CO LTD
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] Therefore, the biggest problem in the existing technology is that if the cracker cracks any of the parent chips, he will easily obtain the secret key and application using the parent chip, that is, crack the batch of chips

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Chip Encryption Method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] Below, in conjunction with accompanying drawing and specific embodiment, the present invention is described further:

[0026] refer to figure 1 , a chip encryption method is provided in the present embodiment, the method includes the following steps:

[0027] Step S1, obtaining the fuse value (fuse value) and trim value (trim value) of each chip, and setting an algorithm. The fuse value and trimming value can be obtained through testing or calculation by external equipment, and the algorithm can be designed according to actual needs. For example, the fuse value and trimming value can be obtained through testing equipment. The test equipment is an existing equipment, so its function and working principle will not be described in detail in this embodiment.

[0028] In step S2, the fuse value and trim value are used as algorithm parameters, and the algorithm is used to calculate the secret key of each chip, wherein the secret key of each chip is unique. Since the chip ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a chip encryption method, which comprises the following steps: obtaining the fuse value and trimming value of each chip, and setting an algorithm; using the fuse value and trimming value as algorithm parameters, and using the algorithm to calculate the value of each chip The secret key, the secret key of each chip is unique; the fuse value, trimming value and secret key of each chip are written into the corresponding chip. In the chip encryption method of the present invention, since the fuse value and trimming value of each chip are naturally unique, it can ensure that the same matrix is ​​used in different applications or the same application. The keys are completely different. Even if an attacker cracks a chip, he can only get the key and application of the chip, and can only copy the single chip. If he wants to crack in batches, he must crack each chip in the batch of chips separately. Greatly increasing the cost and difficulty of the cracker, it loses the meaning of cracking. In this way, the intellectual property rights of users are protected to the greatest extent.

Description

technical field [0001] The invention relates to the technical field of security chips, in particular to a chip encryption method. Background technique [0002] With the improvement of SOC design level and technological progress, cryptographic security chips have developed into embedded systems with complete functions and complex hardware and software structures, but at the same time, cryptographic security chips generally have security problems. Attackers can read, analyze, and dissect information such as keys, such as ultra-high or ultra-low clock frequency attacks, physical detection attacks, energy attacks, side-channel attacks, DPA attacks, etc., which seriously threaten cryptographic security. Chip security. [0003] Existing chips usually adopt a fixed encryption algorithm and secret key, or only use the ID number of the chip for encryption. In actual mass production, crackers only need to crack the same parent chip or modify the ID number through software modificati...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/76
CPCG06F21/76G06F21/602G06F21/72
Inventor 段维虎王波毛宏程
Owner GUANGZHOU ZHONO ELECTRONICS TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products