Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Defense reverse engineering encryption method based on Camellia algorithm

An encryption method and reverse engineering technology, applied in the field of defense reverse engineering encryption based on Camellia algorithm, can solve the problems of hardware intellectual property obfuscation protection, hardware intellectual property security threats, etc.

Active Publication Date: 2018-11-06
COLLEGE OF SCI & TECH NINGBO UNIV
View PDF2 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The current Camellia algorithm usually uses hardware circuits to realize its algorithm functions. It mainly encrypts the security issues of software systems, and rarely involves the obfuscation protection of hardware intellectual property rights (data in integrated circuits). created the conditions
As a means of hardware intellectual property theft, reverse engineering dissects the cryptographic chip through technical means, then takes pictures layer by layer, extracts the data information of the circuit, organizes the extracted data information, and adjusts the circuit according to the new process. Simulate and modify the adjusted circuit to complete the embezzlement of the original cryptographic chip, which poses a great threat to the security of hardware intellectual property rights and poses a huge challenge to the development of the integrated circuit industry

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0028] Embodiment: a kind of defense reverse engineering encryption method based on Camellia algorithm comprises the following steps:

[0029] ① Add an input port for inputting the 4-digit binary authorization key Key in the Camellia algorithm, and the Camellia algorithm is implemented with a hardware circuit structure;

[0030] ② Construct a confusing finite state machine for loading into the Camellia algorithm, the specific process is:

[0031] ②-1 Record the number of confused states of the confused finite state machine to be constructed as G, and G satisfies the condition: G+N=2 n , n is a positive integer and n is greater than or equal to the bit width of the binary code of the effective state of the original finite state machine in the Camellia algorithm, N is the number of effective states of the original finite state machine in the Camellia algorithm, and N is a constant 11;

[0032] ②-2 Calculate the decimal numbers corresponding to the binary codes of the N effectiv...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a defense reverse engineering encryption method based on a Camellia algorithm. A confused finite state machine is built and then loaded into the Camellia algorithm, then an authorization key which is the same as a 4-bit binary authorization key set in the confused finite state machine is input into the Camellia algorithm, so that the confused finite state machine in the Camellia algorithm outputs a 64-bit binary number Ot, and three times of iterative encryption operations are performed on to-be-encrypted data of a to-be-encrypted circuit on the basis of the 64-bit binary number Ot to obtain encrypted data. The defense reverse engineering encryption method based on the Camellia algorithm provided by the invention has the advantages that when an attacker extracts encrypted data in the circuit through reverse engineering, since the attacker does not know the correct authorization key and the 64-bit binary number Ot corresponding to the correct authorization key, errors in the decryption process can be caused, and therefore incorrect data can be decrypted, so that attacks such as reverse engineering can be effectively prevented, and the protection strength of the hardware intellectual property is improved.

Description

technical field [0001] The invention relates to an encryption method based on the Camellia algorithm, in particular to a defense reverse engineering encryption method based on the Camellia algorithm. Background technique [0002] With the development of VLSI and information technology, software / hardware systems have been widely used, which greatly facilitates people's lives and also brings legitimate economic benefits to designers, but incidents of intellectual property theft occur from time to time. Among many protection technologies, security obfuscation is one of the effective ways to protect intellectual property rights. The concept of obfuscation was first proposed in the field of software code obfuscation, and has practical applications in software protection, digital watermarking and other fields. Code obfuscation uses the logic of the program itself to protect internal important information and key algorithms, ensuring that the interests of system developers and use...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04L9/00
CPCH04L9/002H04L9/0861H04L9/0863H04L9/0869H04L2209/12
Inventor 杜世民杨润萍殷金曙钟志光
Owner COLLEGE OF SCI & TECH NINGBO UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products