Summary of the invention
The object of the present invention is to provide a kind of believable integrated security processing platform.
The technical solution that realizes the object of the invention is: a kind of believable integrated security processing platform includes in an integrated circuit (IC) chip:
A central processing unit is used for process information;
One group of interface circuits is used for being connected with sensor external or controller, realizes the multi-path digital of outside or the collection of analog signal, and external equipment is sent control signal;
An encrypting module that is made of FPGA (Field Programmable Gate Array) PLD is realized communication information is carried out the hardware enciphering/deciphering, can upgrade cryptographic algorithm voluntarily by the user simultaneously;
A communication coding device that is made of FPGA (Field Programmable Gate Array) PLD is realized communication information is carried out hardware encoding, can upgrade encoding scheme voluntarily by the user simultaneously;
A data memory and a program storage are used for the user storage handling procedure and provide process information needed memory space;
A download interface, the program that is used for the user is downloaded, and FPGA (Field Programmable Gate Array) is carried out logic download;
Described central processing unit is connected with a group of interface circuits, encrypting module, program storage and data storage respectively, encrypting module links to each other with the communication coding device, outside primary signal is seen off after the information via communication coding device after the encryption is delivered to radio transmission apparatus by on the external sensor access interface circuit; The needed handling procedure of central processing unit is stored in the program storage, and the needed memory space of these program running is provided by data storage.
The present invention compared with prior art, its remarkable advantage: (1) improves the grade of security information.Information gathering, processing, encryption, communication coding are integrated in the chip.Can not obtain the plaintext and the ciphertext of communication so simultaneously, because here information is from the input of raw sensor, in general input information is disorderly and unsystematic the needs just can obtain valid data after the central processing unit processing, the angle that cracks from information is if the valid data that obtain determining from raw sensory information also are suitable difficulties, and actual identical input information also not necessarily can obtain identical data through identical routine processes.Need filtering, sampling, segmentation, compression just can obtain effective voice data as voice messaging, under the situation of having known handling procedure, also be difficult to obtain identical valid data from input information.Meanwhile valid data are not exported away in the present invention, but valid data (encrypting module is called expressly) are directly encrypted at chip, radio transmission apparatus is just given in coding back (encrypting module is called ciphertext).For the cryptographic algorithm of a compliant, if 1% difference is expressly arranged, then ciphertext can not find similitude substantially.Therefore, in theory, under the condition of not knowing the intermediate treatment process, the contact that only wants to find out from the ciphertext of the raw information of input and output them is impossible.
(2) the present invention adopts the hardware of FPGA (Field Programmable Gate Array) to realize encrypting module, at first is to adopt hardware encipher/deciphering, and encrypt/decrypt speed is fast, is difficult for cracking; Next adopts FPGA (Field Programmable Gate Array) to realize, can formulate cryptographic algorithm as required voluntarily by the user; Each user adopts separately independently cryptographic algorithm on same platform, also is safe between each user; The user can regularly or aperiodically upgrade cryptographic algorithm according to the security needs of self; Key also adopts former principle of secrecy to generate and manage simultaneously.Further increased the difficulty that cracks.
(3) the present invention adopts the hardware of FPGA (Field Programmable Gate Array) to realize encrypting module and communication coding device, the user can design cryptographic algorithm and communication coding scheme voluntarily, and write FPGA (Field Programmable Gate Array) and download is very easily, and the personnel that relate to like this can be seldom, and safety has also just improved comparatively speaking.
(4) the present invention is integrated into a plurality of individual chips in the original system in the chip, can prevent from like this to obtain intermediate data by the lead-in wire of chip chamber, strengthens and cracks difficulty.The analytical method of sheet also can only obtain the circuit of hard logic even employing rubs, and FPGA (Field Programmable Gate Array) partly is to adopt charge storage mode to realize logic, and electric charge disappears behind the sheet that rubs, and also just can't obtain circuit.
(5) the present invention is integrated into a plurality of individual chips in the original system in the chip, can significantly reduce volume, the weight of system like this; The more important thing is the line that has reduced between the chip, reduced the solder joint raising reliability that can reduce cost.Construction cycle is short, uses flexibly.
Embodiment
Below in conjunction with accompanying drawing the present invention is described in further detail.
The present invention is integrated in all modules among Fig. 1 in the integrated circuit, and encrypting module and coding module are to be realized by FPGA (Field Programmable Gate Array) (PLD), can improve the fail safe of information so greatly, encrypting module is to realize that by hardware the algorithm of Jia Miing can upgrade according to user's needs simultaneously fully.This platform can be described as general, can provide the disposal ability of information processing, the various algorithms of enciphering/deciphering for numerous moving target (vehicle, mobile phone etc.), for communication coding provides various schemes.All use the system of this platform to have independently message handling program separately, encryption/decryption algorithm, and the communication coding scheme also is safe each other.In this platform process of use, be cracked if suspect the cryptographic algorithm of oneself, then can upgrade the cryptographic algorithm of oneself at any time, or the renewal cryptographic algorithm on regular (irregularly) ground, do not need to change simultaneously any hardware.Here said credible to be based on all message handling programs be that user oneself writes, and cryptographic algorithm is also by user oneself definition in the chip, and the communication coding scheme also is that user oneself works out, and does not exist by other people and leaves the back door possibility.
In conjunction with Fig. 1, a kind of believable integrated security processing platform of the present invention comprises:
A central processing unit 3 is used for process information, can be programmed voluntarily by the user;
A group of interface circuits 2 is used for being connected with sensor external or controller; The collection of realization information and to the control of equipment;
An encrypting module 4 that is made of FPGA is realized the hardware encipher to information, can allow the user upgrade cryptographic algorithm voluntarily simultaneously;
A communication coding device 5 that is made of FPGA is realized communication information is carried out hardware encoding, can allow the user upgrade encoding scheme voluntarily simultaneously;
A program storage 7 and a data memory 6 are used for the user storage handling procedure and provide process information needed memory space;
A download interface 8, the program that is used for the user is downloaded, and FPGA (Field Programmable Gate Array) is carried out logic download.
Central processing unit 3 is centers of safe handling platform of the present invention, and central processing unit is connected with interface circuit 2 by one group of I/O interface; Central processing unit is connected with data storage 7 with program storage 6 by internal bus; Central processing unit links to each other with encrypting module by inner Avalon bus.Encrypting module 4 links to each other with communication coding device 5 by FPGA (Field Programmable Gate Array).
Security platform of the present invention is the center with central processing unit 3, link to each other with circuit such as a group of interface circuits 2, encrypting module 4, program storage 6, data storage 7, download interface 8 respectively, outside original primary signal by external sensor in the interface circuit access platform, after in platform, handling by the 3 pairs of raw informations of central processing unit, valid data being encrypted, is at last it to be carried out communication coding to deliver to behind the radio transmission apparatus to see off again.Central processing unit 3 needed handling procedures with powerful information processing capability are stored in the program storage 6, are provided by data storage 7 at the needed memory space of these program running.The present invention is to be to be integrated in the very lagre scale integrated circuit (VLSIC) with central processing unit, encrypting module, communication coding device, program storage, data storage, I/O interface.Reduce the number of chip, reduced the line between the chip, also just stopped the possibility that intermediate data is stolen.Be that CPLD etc. are hard-wired by FPGA (Field Programmable Gate Array) such as FPGA with encrypting module, communication coding module simultaneously.Can guarantee that so on the one hand cryptographic algorithm and encoding scheme finished by hardware fully; But the user upgrades cryptographic algorithm and encoding scheme according to requirement programming voluntarily on the other hand.The user is write handling procedure by process information, is downloaded in the program storage 6 by download interface 8; The user is downloaded in the encrypting module 4 by download interface 8 for encrypting the cryptographic algorithm FPGA (Field Programmable Gate Array) of design; The user is downloaded in the communication coding module 7 by download interface 8 for the encoding scheme secure programmable logic of communication coding modular design.
It is own credible the present invention is based on the handling procedure that the user independently writes, the cryptographic algorithm of autonomous Design, the communication coding scheme of autonomous Design.
The present invention does not carry out any change to original key generation, key management mechanism, can not be lower than the security intensity of original system so at least.
A kind of believable integrated security processing platform using method of the present invention is as follows:
Concerning design a complete moving target the information processing communication system, can design as usual, analyze all possible input information, output information, communication information, because the disposal ability of platform of the present invention is powerful, all (or user think necessary) information all may be connected on the platform by the input/output interface of this platform, and not according to only the information relevant with communication being connected with platform in the original system.That is to say that the information of access platform not only has the information relevant with communication, also have and the irrelevant information of communication; As everyone knows, input information is many more, complicated more, uncertain more with the relation of communication, and is also just big more for the difficulty that cracks like this.
After input, the output output information of system are determined, just these information are handled, the user is according to the actual needs coding on central processing unit independently of oneself, the method of coding is the same with the programming of other processor, the general high-level language (as C) that adopts is write, in case of necessity also can be with collecting.Information to input, output is analyzed, is handled, and can adopt some unique mode to carry out on processing mode, with tightening security property.Not all here input, output information are all relevant with radio communication, central processing unit can provide disposal ability for the information processing of moving target inside, can reduce the quantity of processor so on the one hand, with the irrelevant information adding of communication, also increased the difficulty that the assailant cracks more on the other hand.The user can definite voluntarily as required which information will carry out communication, after the information via processing that needs communication, just delivers to encrypting module as valid data.
In general the information of outside input is directly to utilize, all must handle and just can become valid data through central processing unit, and information is various property, processing method also is a diversity, the present invention will handle all information of input by the programming of user's row by the central processing unit of inside, if so assailant's all information of having obtained input also can't generate just the same valid data; And these valid data also and indefinite a needs all see off by RTTY, have only the valid data that will send just need deliver in the encrypting module, as long as the assailant does not obtain the program in the processor, only starting with from input raw information is to obtain valid data to be encrypted (being called expressly at this).Plaintext attack is the most effective aspect security attack, and one of emphasis of the present invention just is to allow the assailant can't obtain expressly, and its method is expressly to transmit by the chip internal bus.
The cryptographic algorithm that designing user is own, be generated as the JEDEC file of standard after describing by hardware description language (as VHDL etc.), download in the respective modules through download interface, at this moment encrypting module, communication coding module have just generated automatically to hardware logic and have finished encryption function and communication coding function again.When the design cryptographic algorithm, can adopt DES, aes algorithm, or its improvement algorithm, because DES, aes algorithm are to adopt the method for displacement, wheel, bit box to encrypt, this method is very easily for adopting hardware logic to realize, takies logic gate number and few.This method of while needs only carries out a bit changing just can generating a different algorithm easily to data in the position of replacing, the bit box, and security intensity can not destroy yet.Certainly for asymmetric key cipher algorithm (RSA, Rabin, E1Gamal, ECC etc.), because its complexity adopts hardware to realize acquiring a certain degree of difficulty, and it is more to take logic gate number, has also required higher mathematical ability during improvement.Can believe that along with development of integrated circuits it also is feasible adopting the low-cost realization of FPGA (Field Programmable Gate Array) RSA Algorithm.Even if one of emphasis of the present invention just is the assailant and adopts the chip anatomy also can't obtain cryptographic algorithm, because programmable logic device (GAL) inside is whether to store electric charge in the employing floating gate to decide logical relation, as long as chip is opened electric charge will disappear, the assailant can't obtain inner logical relation.
Designing user is formulated the communication coding scheme voluntarily, be generated as the JEDEC file of standard after describing by hardware description language (as VHDL etc.), download in the respective modules through download interface again, at this moment the communication coding module has just generated automatically to hardware logic and has finished the communication coding function, goes out through radio transmitting at last.
Any security password is safe in a period of time just, and cryptographic algorithm is also being updated and developed, and the encrypting module of this platform can carry out according to user's needs regularly or aperiodically upgrading cryptographic algorithm, does not need to upgrade hardware unit.
Safe handling platform of the present invention is general, as long as there is the colony of processing and encryption communication demand all can use, each communication colony formulates oneself independently information processing method, encryption, decipherment algorithm, communication coding scheme separately, each comfortable this platform coding, write logic, finish the communication of having only own colony inside to carry out.Be to maintain secrecy mutually between each colony.
Provide a simple example below processing procedure of the present invention is described, and its security advantages.
The design of the secure voice intercom system of a moving target supposes that this system has only an input---voice-input device microphone, an output---voice-output device loud speaker, a communication information transmitted---voice messaging.When setting up system input, output are connected with the interface of platform of the present invention, the voice signal that receives and send can be analog quantity, also can be digital quantity, if analog quantity can adopt the A/D converter in the sheet to become digital quantity.The course of work and the security advantages of platform of the present invention are described for the sake of simplicity, here only describe by phonetic entry and go out to encrypting back radio transmitting.The first, the numeral that obtains voice from input interface is an information; Second, the user has central processing unit to programme voluntarily, to the voice signal of input sample, filtering, compression, for tightening security property may adopt unique processing mode, select uncurrent frequency as sample frequency, formulate filtering, compression scheme according to the actual requirements; The 3rd, the user designs cryptographic algorithm voluntarily, by downloading in the FPGA (Field Programmable Gate Array) of this platform after hardware description language (as the VHDL etc.) programming, realizes hardware encipher; The 4th, the user formulates the communication coding scheme voluntarily, by downloading in the FPGA (Field Programmable Gate Array) of this platform after hardware description language (as the VHDL etc.) programming, realizes the hardware communication coding; The 5th, with final encryption coded message send on the outer radio transmission apparatus of this platform, send.Analyze the fail safe of native system below, possibility 1, the assailant can only obtain RI radio intelligence, in this case as long as the cryptographic algorithm that the user designs voluntarily reaches the requirement safety of regulation, compare with the system that does not adopt platform of the present invention, can not be lower than its security intensity; Possibility 2, the assailant has obtained original speech information and RI radio intelligence (just a plain code is attacked) simultaneously, because this platform is from the original speech information to the RI radio intelligence, sampling, filtering, compression, encryption, a plurality of links of coding have been passed through, and each link all is that the user defines voluntarily, also can't crack under the prior art condition; Compare with the system that does not adopt platform of the present invention, each link of original system partly or entirely is disclosed, theoretically necessarily than original system high safety.Possibility 3, the assailant has obtained complete system and has repeatedly specified plaintext attack, because this platform is a plurality of links that will handle to be integrated in and can't to obtain intermediate data in the chip, at this moment attack and be equal to plaintext attack, and the sampling of this platform, filtering, speech processes is to define voluntarily because the randomness in handling, data after same plaintext (raw tone) is handled also are not necessarily just the same, 1% difference (people's ear can't be differentiated) is arranged in this way through overcompression, must there be similitude after the encryption, just repeatedly specify plaintext attack can not obtain identical ciphertext, this attack can not be successful.Possibility 4, the assailant has obtained complete system and has carried out destructive dissection and analysis, the present sheet that rubs is dissected the hard logic that can obtain chip internal, also can get plug-in, because programming device is to rely on the electric charge in the floating gate to determine logic, electric charge just disappears in case chip is opened, and is to restore original logic therefore.Even there is higher technology dissection and analysis to go out logic later on, also just can only crack this, the user can solve by regularly can irregularly upgrading cryptographic algorithm.And original system can only be changed hardware and could solve.Possibility 5, the assailant has obtained complete system and has gone forward side by side to commit theft and listen, and platform is general, and each customer group is the Design Treatment process voluntarily, and the design cryptographic algorithm is formulated encoding scheme.Each platform also only intercepts the information of this group, and the user can solve by regularly can irregularly upgrading cryptographic algorithm.And original system can only be changed hardware and could solve.Possibility 6 spy occurred among the personnel of participation design system, and platform is general, and each customer group is the Design Treatment process voluntarily, and the design cryptographic algorithm is formulated encoding scheme.The spy has to the present stage information of this group, and the user can solve by regularly can irregularly upgrading cryptographic algorithm.And original system can only be changed hardware and could solve.Here not considering the problem of secret key safety, mainly is all to have identical problem in all safety systems, solution to safety system all the same.