CN109740214A - The method and apparatus for overturning counter model building - Google Patents

The method and apparatus for overturning counter model building Download PDF

Info

Publication number
CN109740214A
CN109740214A CN201811581405.3A CN201811581405A CN109740214A CN 109740214 A CN109740214 A CN 109740214A CN 201811581405 A CN201811581405 A CN 201811581405A CN 109740214 A CN109740214 A CN 109740214A
Authority
CN
China
Prior art keywords
model
emulation
hierarchical
overturning
power consumption
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201811581405.3A
Other languages
Chinese (zh)
Other versions
CN109740214B (en
Inventor
李煜光
魏凡星
路晔绵
詹鹏翼
潘娟
国炜
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Academy of Information and Communications Technology CAICT
Original Assignee
China Academy of Information and Communications Technology CAICT
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Academy of Information and Communications Technology CAICT filed Critical China Academy of Information and Communications Technology CAICT
Priority to CN201811581405.3A priority Critical patent/CN109740214B/en
Publication of CN109740214A publication Critical patent/CN109740214A/en
Application granted granted Critical
Publication of CN109740214B publication Critical patent/CN109740214B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Design And Manufacture Of Integrated Circuits (AREA)
  • Storage Device Security (AREA)

Abstract

The present invention provides a kind of method and apparatus of overturning counter model building, this method comprises: carrying out emulation level category of model to the logical simulation tool for analyzing power consumption leakage in encryption equipment;Emulation hierarchical model is divided into impulse- free robustness model and model containing burr;Determine that emulation hierarchical model for impulse- free robustness model, then according to the corresponding emulation hierarchical model of circuit types of encryption equipment, obtains final emulation hierarchical model;Emulation data in final emulation hierarchical model are exported as into VCD file;Energizing signal in the VCD file is analyzed, overturning counter model is obtained.A kind of method and apparatus of overturning counter model building provided by the invention, by emulate needed for model hierarchy, burr information is portrayed and in conjunction with actual encrypted circuitry type, it constructs obtained overturning and counts leak model, so that specific aim is stronger and more efficient when implementing practical side channel power consumption analysis.

Description

The method and apparatus for overturning counter model building
Technical field
The present invention relates to information security field more particularly to a kind of method and apparatus of overturning counter model building.
Background technique
With the rapid development of Information technology, the effect of information security becomes ever more important.However whether Encryption Algorithm Hardware realization or software realization, all can be by various security threats, wherein side Multiple Channel Analysis is existing threat encryption One of the important means of device security.
In order to improve the high efficiency of side information analysis, scholars propose various leakage models, such as: prior art One: Hamming molality type, power consumption when suitable for describing bus low power or constant description encryption equipment original state.In attacker When can not obtain complete net meter file or can not judge the data change state before and after data/address bus, Hamming molality can be used Type.
The disadvantage is that: when using Hamming molality type, it is believed that the Hamming of power consumption and handled data that encryption equipment generates Heavy phase is closed.But in most cases, the size of the power consumption is also related to the previous state of current value, i.e., with the change of data Change amount is related.If data initial state is constant, the current state of data is directly proportional to variable quantity at this time, and Hamming molality type is effective at this time. However work as initial state not timing, the current state of data is unrelated with variable quantity, is invalid, therefore Hamming using Hamming molality type at this time The applicable condition of molality type is limited.
Prior art 2: the 2004 years Hamming distance models proposed.Hamming distance model is suitable for portraying the function in bus Consumption, including address bus and data/address bus etc..
The disadvantage is that: in original design known to attacker or netlist when the data of a part of continuous processing, it can be used Hamming distance model portrays the power consumption leakage information of the part.There are a large amount of burrs in combinational circuit, even if attacker Net meter file is obtained in advance, often can not also obtain correct median, therefore Hamming distance model is not suitable for combination electricity The power consumption leakage of road is portrayed.
Therefore, how to find one kind and be applicable not only to register or bus, and be suitable for the power consumption of hardware encryption circuit Model is revealed, it is most important to the Accuracy and high efficiency for improving the leakage analysis of side channel power consumption.
Summary of the invention
Side Multiple Channel Analysis is mainly waited using encryption equipment at runtime, the side channel information leakage of generation, and then to encryption Equipment is attacked.These side channel informations include power consumption information, electromagnetic radiation information etc..It, can for different applicable scenes By power leakage model be divided into theoretical leak model and emulation leak model, the difference of the two be construct leak model when whether Using the original design of Encryption Algorithm and it is emulated.When constructing theoretical leak model, it is only necessary to treat point of attack equipment Class has preliminary understanding.And when constructing emulation leak model, after the classification for understanding encryption equipment, it is also necessary to use emulation tool Encryption Algorithm is emulated.Emulation leak model is relative to the advantages of theoretical leak model, with actual encrypted equipment Power consumption leakage feature is more nearly, and higher using validity when emulation leak model progress side Multiple Channel Analysis.
Therefore in order to which simple and efficiently building simulated power dissipation reveals model, the present invention provides a kind of overturning counter models The method and apparatus of building.
In a first aspect, the present invention provides a kind of methods of overturning counter model building, which comprises
Emulation level category of model is carried out to the logical simulation tool for analyzing power consumption leakage in encryption equipment;
The emulation hierarchical model is divided into impulse- free robustness model and model containing burr;
Determine that the emulation hierarchical model is impulse- free robustness model, then according to the corresponding simulation layer of circuit types of encryption equipment Secondary model obtains final emulation hierarchical model;
Emulation data in the final emulation hierarchical model are exported as into VCD file;
Energizing signal in the VCD file is analyzed, overturning counter model is obtained.
Second aspect, the present invention provides a kind of device of overturning counter model building, described device includes:
Category of model module, for carrying out simulation layer to the logical simulation tool for analyzing power consumption leakage in encryption equipment Secondary category of model;
Burr model determining module, for the emulation hierarchical model to be divided into impulse- free robustness model and model containing burr;
Circuit types selecting module, for determining that the emulation hierarchical model is impulse- free robustness model, then according to encryption equipment The corresponding emulation hierarchical model of circuit types, obtain final emulation hierarchical model;
VCD file obtains module, for the emulation data in the final emulation hierarchical model to be exported as VCD text Part;
Counter model determining module is overturn, for analyzing energizing signal in the VCD file, overturning is obtained and counts Model.
It is provided by the invention it is a kind of overturning counter model building method and apparatus, by emulate needed for model hierarchy, Burr information is portrayed and in conjunction with actual encrypted circuitry type, the overturning that constructs counts leak model, So that specific aim is stronger and more efficient when implementing practical side channel power consumption analysis.
For above and other objects, features and advantages of the invention can be clearer and more comprehensible, preferred embodiment is cited below particularly, And cooperate institute's accompanying drawings, it is described in detail below.
Detailed description of the invention
In order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, to embodiment or will show below There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this Some embodiments of invention for those of ordinary skill in the art without creative efforts, can be with It obtains other drawings based on these drawings.
Fig. 1 is the method flow schematic diagram of overturning counter model building provided in an embodiment of the present invention;
Fig. 2 is the device block diagram of overturning counter model building provided in an embodiment of the present invention;
Fig. 3 is the overall structure diagram of overturning counter model building provided in an embodiment of the present invention;
Fig. 4 is the category of model stage schematic diagram of Fig. 3;
Fig. 5 is the model choice phase schematic diagram of Fig. 3;
Fig. 6 is the model construction stage schematic diagram of Fig. 3;
Fig. 7 is the model implementation phase schematic diagram of Fig. 3.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete Site preparation description, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.It is based on Embodiment in the present invention, it is obtained by those of ordinary skill in the art without making creative efforts every other Embodiment shall fall within the protection scope of the present invention.
With the rapid development of Information technology, the effect of information security becomes ever more important.Existing information security field In core technology first is that cryptography.It is various in communication system up to the various agreements of applications of computer network layer Hardware device, cryptography all play a very important role.It is close with public key that existing Encryption Algorithm is broadly divided into symmetric cryptography Two classes of code, wherein symmetric cryptography includes the Encryption Algorithm such as AES, 3-DES and SMS4.Symmetric cryptography due to its higher safety with Succinct implementation process, is widely used in various kinds of equipment.The implementation of cryptographic algorithm includes software and hardware realization, software It realizes due to its good customizability, is applied in the equipment such as smart card, embedded;And hardware realization is quickly added due to it Speed is decrypted, is applied in all kinds of special encryption chips, including FPGA, ASIC etc..However whether the hardware of Encryption Algorithm is real Existing or software realization, all can be by various security threats, and wherein side Multiple Channel Analysis is existing threat encryption equipment safety One of the important means of property.
Attacker is when implementing attack to encryption equipment using side Multiple Channel Analysis technology, it is necessary first to use electromagnetic probe etc. Special equipment detects the side channel information of encryption equipment, and side channel information is acquired and saved using oscillograph, it These information are analyzed using a variety of side Multiple Channel Analysis methods afterwards, are finally reached the mesh for restoring correct code key in encryption equipment 's.When attacker obtains the correct code key of encryption equipment, all secret informations for encrypting equipment can all be leaked, thoroughly broken The safety of bad encryption equipment.Later in order to improve the high efficiency of side information analysis, scholars propose various leakage models, but It is that existing leakage model exists suitable for the leakage analysis of the power consumption of register or bus, for the power consumption side of combinational circuit part Multiple Channel Analysis data are inaccurate.To solve the above-mentioned problems, the method for a kind of overturning counter model building provided by the invention And device.As shown, Fig. 1 is the method flow schematic diagram of overturning counter model building provided in an embodiment of the present invention.Fig. 1 In, this method comprises:
Step 101, emulation hierarchical model point is carried out to the logical simulation tool for analyzing power consumption leakage in encryption equipment Class.
Specifically, logical simulation tool needed for building power consumption leakage model includes ISIM, ModelSim etc..According to analysis The difference of emulation tool selected by person, emulation classification are different.
Step 102, emulation hierarchical model is divided into impulse- free robustness model and model containing burr.
Specifically, judging whether to count the burr information in circuit signal, emulation hierarchical model is divided into this Impulse- free robustness model and model containing burr, wherein burr information refers in circuit since the non-purpose that signal delivery lag generates is jumped Become, burr information is garbage for the normal operation of circuit, but be can be used as when doing side Multiple Channel Analysis to circuit Useful information is utilized.
Step 103, determine that emulation hierarchical model is impulse- free robustness model, then it is corresponding imitative according to the circuit types of encryption equipment True hierarchical model obtains final emulation hierarchical model.
Specifically, after judging determine emulation hierarchical model for impulse- free robustness model, further according to encrypt equipment circuit types, Hierarchical model further division, the emulation hierarchical model finally determined will be emulated.Wherein, the circuit types packet of equipment is encrypted It includes: SLCD (simple logical circuit design, simple logic circuit design) or CLCD (complex logical Circuit design, complex logic circuit design), SLCD corresponds to the translation post-simulation types of models in impulse- free robustness model, CLCD corresponds to the behavior simulation types of models in impulse- free robustness model.
Step 104, the emulation data in final emulation hierarchical model are exported as into VCD file.
Specifically, related circuit data in hierarchical model will be finally emulated, and burr information data, the emulation number such as signal overturning According to as simulation result, VCD file is exported as.Wherein, VCD file is for describing all signal intensities in circuit.According to circuit Input is different, and the signal overturning situation of different number can embody in VCD file, inputs asynchronous signal by statistics and overturns Quantity, the available corresponding relationship between circuit input and signal rollover number.
Step 105, upset information in VCD file is analyzed, obtains overturning counter model.
Specifically, analyzing the signal for overturning jump in VCD file, overturning counter model is obtained, which counts Model is exactly the final power consumption leakage model of the embodiment of the present invention.
The embodiment of the present invention is by emulating required model hierarchy, being portrayed burr information and combined actual encrypted The type of circuitry, the overturning constructed counts leak model, so that being directed to when implementing practical side channel power consumption analysis Property is stronger and more efficient.
Content based on the above embodiment, as a kind of alternative embodiment: emulation hierarchical model includes: behavior simulation mould Type, translation post-simulation model, mapping post-simulation model and wiring post-simulation model.
Specifically, needing when implementing to verilog design by three key steps: translation, mapping, wiring, These steps are universal method in the industry.It should be noted that behavior simulation is in verilog design in embodiments of the present invention It is executed before translation.Translation post-simulation, mapping post-simulation, wiring post-simulation execute after translation, mapping, Route step respectively.
The embodiment of the present invention is by classifying to emulation hierarchical model, so that subsequent obtained leakage model is more quasi- Really.
Content based on the above embodiment, as a kind of alternative embodiment: further include:
Determine that emulation hierarchical model is model containing burr, then using wiring post-simulation model as final emulation level mould Type.
Specifically, in embodiments of the present invention, mapping post-simulation model and wiring post-simulation model belong to model containing burr. Emulation hierarchical model is determined after judging as model containing burr, then directly selected wiring post-simulation model is as final simulation layer Secondary model.Because while it is long the time required to wiring post-simulation model construction model, but it is routed the resulting model of post-simulation Precision highest.
The embodiment of the present invention is routed post-simulation model according to the statistical conditions to burr information, for model selection containing burr As final emulation hierarchical model, so that the model accuracy of construction reaches highest.
Content based on the above embodiment, as a kind of alternative embodiment: circuit types includes: SLCD or CLCD.
Specifically, in Verilog design, using signal, input signal and output signal on line as the base of jump calculating This unit.Each element is expressed as BLU in original design, and the input quantity of BLU is limited.If some signal without Method is indicated by the output of a BLU, then multiple BLU and additional output signal is needed to indicate.
It defines CLCD circuit and SLCD circuit: enabling BLU (In, O) and indicate the BLU with n inputs and an output. Wherein, I indicates that Input, O indicate Output, and n is natural number.Y (y ∈ Y) indicates to be located at ASSIGN statement in Verilog design Variable afterwards, and Y is the set comprising all y.At this point,WhereinExpression is arbitrarily patrolled It collects operation x and y is a binary variable.SLCD and CLCD can be expressed as follows at this time:
If the circuit of encryption equipment belongs to SLCD, selected text translation post-simulation model is as impulse- free robustness model;If encryption is set Standby circuit belongs to CLCD, then housing choice behavior simulation model is as impulse- free robustness model.
The embodiment of the present invention selects corresponding emulation hierarchical model by the confirmation to encryption circuitry type, And then determine overturning counter model used in the secondary side Multiple Channel Analysis, improve the high efficiency of the overturning counter model of acquisition and accurate Property.
Content based on the above embodiment, as a kind of alternative embodiment: energizing signal in VCD file is analyzed, Overturning counter model is obtained, later further include:
The side Multiple Channel Analysis of power consumption is carried out to actual measurement power consumption profile according to overturning meter model.
Specifically, after the overturning counter model for obtaining revealing analysis for power consumption, using correlation power consumption analysis or mutually The methods of information power consumption analysis carries out the side Multiple Channel Analysis of power consumption to actual measurement power consumption profile.The embodiment of the present invention is not to the side of power consumption The method of Multiple Channel Analysis makees specific limit.
The embodiment of the present invention is used for the power consumption point to actual measurement power consumption profile after obtaining overturning counter model, by the model Analysis, so that specific aim is stronger and more efficient in practical side Multiple Channel Analysis.
According to another aspect of the present invention, the embodiment of the present invention also provides a kind of device of overturning counter model building, Referring to fig. 2, Fig. 2 is the device block diagram of overturning counter model building provided in an embodiment of the present invention.The device is used for aforementioned each The formation of overturning counter model building is carried out in embodiment.Therefore, the side of counter model building is overturn in foregoing embodiments Description and definition in method, can be used for the understanding of each execution module in the embodiment of the present invention.
As shown, the device includes:
Category of model module 201, for imitating the logical simulation tool for analyzing power consumption leakage in encryption equipment True hierarchical model classification;
Burr model determining module 202 is divided into impulse- free robustness model and model containing burr for that will emulate hierarchical model;
Circuit types selecting module 203, for determining that emulation hierarchical model is impulse- free robustness model, then according to encryption equipment The corresponding emulation hierarchical model of circuit types, obtains final emulation hierarchical model;
VCD file obtains module 204, for the emulation data in final emulation hierarchical model to be exported as VCD file;
Counter model determining module 205 is overturn, for analyzing energizing signal in VCD file, overturning is obtained and counts Model.
The embodiment of the present invention is by emulating required model hierarchy, being portrayed burr information and combined actual encrypted The type of circuitry, the overturning constructed counts leak model, so that being directed to when implementing practical side channel power consumption analysis Property is stronger and more efficient.
Content based on the above embodiment, as a kind of alternative embodiment: emulation hierarchical model includes: behavior simulation mould Type, translation post-simulation model, mapping post-simulation model and wiring post-simulation model.
The embodiment of the present invention is by classifying to emulation hierarchical model, so that subsequent obtained leakage model is more accurate
Content based on the above embodiment, as a kind of alternative embodiment: further include:
It is routed post-simulation model determining module, for determining that emulation hierarchical model is model containing burr, then will be imitated after wiring True mode is as final emulation hierarchical model.
The embodiment of the present invention is routed post-simulation model according to the statistical conditions to burr information, for model selection containing burr As final emulation hierarchical model, so that the model accuracy of construction reaches highest.
Content based on the above embodiment, as a kind of alternative embodiment: circuit types includes: SLCD or CLCD.
The embodiment of the present invention selects corresponding emulation hierarchical model by the confirmation to encryption circuitry type, And then determine overturning counter model used in the secondary side Multiple Channel Analysis, improve the high efficiency of the overturning counter model of acquisition and accurate Property.
Content based on the above embodiment, as a kind of alternative embodiment: further include:
Power consumption analysis module, model carries out the side Multiple Channel Analysis of power consumption to actual measurement power consumption profile based on according to overturning.
The embodiment of the present invention is used for the power consumption point to actual measurement power consumption profile after obtaining overturning counter model, by the model Analysis, so that specific aim is stronger and more efficient in practical side Multiple Channel Analysis.
Content based on the above embodiment, as a kind of alternative embodiment: the embodiment of the present invention provides a kind of overturning counting The organization plan of model construction, as shown in figure 3, Fig. 3 is the whole knot of overturning counter model building provided in an embodiment of the present invention Structure schematic diagram.
In the whole design figure of the embodiment of the present invention, it is most of mainly to contain four: category of model stage, model selection Stage, model construction stage and model implementation phase.Wherein, sorted model is passed to model and selects rank by the category of model stage Model after selection is passed to the model construction stage by section, model choice phase, and the model construction stage obtains overturning meter by calculating Exponential model carries out side channel power consumption analysis by overturning counter model in model implementation phase later.
Fig. 4 gives category of model stage basic procedure, includes two parts in figure: emulation level confirmation stage and burr Information requirement confirmation stage.Operation is as follows:
Building model outfit is logical simulation common tool, comprising: ISIM, ModelSim etc..According to analyst institute The difference of the emulation tool of choosing, emulation classification are different.Such as after ISIM can be divided into behavior simulation, translation post-simulation, mapping Four kinds of post-simulation of emulation and wiring.If analyst needs to count burr information, can continue will to emulate level be divided into it is hairless Thorn emulation is emulated with containing burr.The category of model stage exports the emulation level category of model that emulation tool is supported.
Fig. 5 gives model choice phase basic procedure, includes two parts: circuit types confirmation stage and model in figure Confirmation stage.Operation is as follows:
The model choice phase is passed to after available category of model, circuit types confirmation stage confirmation encryption circuitry category In SLCD or CLCD.Overturning meter needed for the model validation stage selects the secondary side Multiple Channel Analysis according to the type of encryption circuitry Exponential model type.If encryption circuitry belongs to SLCD, counter model is overturn after selected text translation as impulse- free robustness model, if plus Close circuitry belongs to CLCD, then housing choice behavior overturns counter model as impulse- free robustness model.Model choice phase final output Overturning counter model used in the secondary side Multiple Channel Analysis.
Fig. 6 gives model construction stage basic procedure, includes three parts in figure: logical simulation stage, emulation data Export stage and model calculation stages.Operation is as follows:
1) the logical simulation stage according to use logical simulation tool to original circuit design carry out logical simulation.
2) simulation result is exported as VCD file by the emulation data export stage.
3) model calculation stages analyze VCD file, and obtain by calculating resulting overturning counter model.
After completing above three step, accurate overturning counter model corresponding to the circuit design can be obtained, supply Following model implementation phase uses.
Fig. 7 gives the basic procedure of model implementation phase.Operation is as follows:
Model implementation phase uses building stage resulting overturning counter model, passes through correlation power consumption analysis or mutual information The methods of power consumption analysis carries out side Multiple Channel Analysis to actual measurement power consumption profile.
Specific embodiment is applied in the present invention, and principle and implementation of the present invention are described, above embodiments Explanation be merely used to help understand method and its core concept of the invention;At the same time, for those skilled in the art, According to the thought of the present invention, there will be changes in the specific implementation manner and application range, in conclusion in this specification Appearance should not be construed as limiting the invention.

Claims (10)

1. a kind of method of overturning counter model building, which is characterized in that the described method includes:
Emulation level category of model is carried out to the logical simulation tool for analyzing power consumption leakage in encryption equipment;
The emulation hierarchical model is divided into impulse- free robustness model and model containing burr;
Determine that the emulation hierarchical model is impulse- free robustness model, then according to the corresponding emulation level mould of circuit types of encryption equipment Type obtains final emulation hierarchical model;
Emulation data in the final emulation hierarchical model are exported as into VCD file;
Energizing signal in the VCD file is analyzed, overturning counter model is obtained.
2. the method according to claim 1, wherein the emulation hierarchical model includes: behavior simulation model, turns over Translate post-simulation model, mapping post-simulation model and wiring post-simulation model.
3. according to the method described in claim 2, it is characterized by further comprising:
Determine that the emulation hierarchical model is model containing burr, then using the wiring post-simulation model as final emulation level Model.
4. the method according to claim 1, wherein the circuit types includes: SLCD or CLCD.
5. the method according to claim 1, wherein described analyze energizing signal in the VCD file, Overturning counter model is obtained, later further include:
The side Multiple Channel Analysis of power consumption is carried out to actual measurement power consumption profile according to the overturning meter model.
6. a kind of device of overturning counter model building, which is characterized in that described device includes:
Category of model module, for carrying out emulation level mould to the logical simulation tool for analyzing power consumption leakage in encryption equipment Type classification;
Burr model determining module, for the emulation hierarchical model to be divided into impulse- free robustness model and model containing burr;
Circuit types selecting module, for determining that the emulation hierarchical model is impulse- free robustness model, then according to the electricity of encryption equipment The corresponding emulation hierarchical model of road type, obtains final emulation hierarchical model;
VCD file obtains module, for the emulation data in the final emulation hierarchical model to be exported as VCD file;
Counter model determining module is overturn, for analyzing energizing signal in the VCD file, obtains overturning count module Type.
7. device according to claim 6, which is characterized in that the emulation hierarchical model includes: behavior simulation model, turns over Translate post-simulation model, mapping post-simulation model and wiring post-simulation model.
8. device according to claim 7, which is characterized in that further include:
It is routed post-simulation model determining module, for determining that the emulation hierarchical model is model containing burr, then by the wiring Post-simulation model is as final emulation hierarchical model.
9. device according to claim 6, which is characterized in that the circuit types includes: SLCD or CLCD.
10. device according to claim 6, which is characterized in that further include:
Power consumption analysis module, for carrying out the side Multiple Channel Analysis of power consumption to actual measurement power consumption profile according to the overturning counter model.
CN201811581405.3A 2018-12-24 2018-12-24 Method and device for constructing turnover counting model Active CN109740214B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811581405.3A CN109740214B (en) 2018-12-24 2018-12-24 Method and device for constructing turnover counting model

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811581405.3A CN109740214B (en) 2018-12-24 2018-12-24 Method and device for constructing turnover counting model

Publications (2)

Publication Number Publication Date
CN109740214A true CN109740214A (en) 2019-05-10
CN109740214B CN109740214B (en) 2023-10-13

Family

ID=66359621

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811581405.3A Active CN109740214B (en) 2018-12-24 2018-12-24 Method and device for constructing turnover counting model

Country Status (1)

Country Link
CN (1) CN109740214B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2023207440A1 (en) * 2022-04-24 2023-11-02 浙江大学 Vcd vector compression method and apparatus based on circuit flipping behavior

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140143883A1 (en) * 2011-09-06 2014-05-22 Cisco Technology Inc. Preventing Data Extraction by Side-Channel Attack
CN105808800A (en) * 2014-12-30 2016-07-27 中国舰船研究设计中心 Leakage radiation simulation and prediction method for electronic equipment cabinet
US20170270307A1 (en) * 2014-11-25 2017-09-21 Institut Mines-Telecom Methods for recovering secret data of a cryptographic device and for evaluating the security of such a device

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140143883A1 (en) * 2011-09-06 2014-05-22 Cisco Technology Inc. Preventing Data Extraction by Side-Channel Attack
US20170270307A1 (en) * 2014-11-25 2017-09-21 Institut Mines-Telecom Methods for recovering secret data of a cryptographic device and for evaluating the security of such a device
CN105808800A (en) * 2014-12-30 2016-07-27 中国舰船研究设计中心 Leakage radiation simulation and prediction method for electronic equipment cabinet

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
MANGARD S等: "Successfully attacking masked AES hardware implementations", PROC OF THE 7TH INTERNATIONAL WORKSHOP ON CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS *
张帅伟: "一种针对分组密码 S 盒的组合侧信道攻击方法", 计算机应用研究 *
陈开颜;赵强;张鹏;邓高明;: "数据加密标准旁路攻击差分功耗仿真分析", 计算机测量与控制 *

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2023207440A1 (en) * 2022-04-24 2023-11-02 浙江大学 Vcd vector compression method and apparatus based on circuit flipping behavior

Also Published As

Publication number Publication date
CN109740214B (en) 2023-10-13

Similar Documents

Publication Publication Date Title
Majzoobi et al. Techniques for design and implementation of secure reconfigurable PUFs
Buhan et al. Sok: Design tools for side-channel-aware implementations
CN103679008B (en) A kind of efficient secure chip power consumption attack test method
CN104660466B (en) A kind of safety detecting method and system
CN103530474A (en) AES (advanced encryption standard) algorithm circuit oriented method for testing differential power attack
CN110096907A (en) A kind of hardware Trojan horse detection method based on Information Flow Security verifying
CN108052838B (en) Leakage positioning system and method for chip encryption design
Naveenkumar et al. Design and Evaluation of XOR Arbiter Physical Unclonable Function and its Implementation on FPGA in Hardware Security Applications
CN109740214A (en) The method and apparatus for overturning counter model building
CN106850203B (en) The security assessment method and device of cryptographic algorithm
Kamadi et al. Implementation of TRNG with SHA-3 for hardware security
Shan et al. A side-channel analysis resistant reconfigurable cryptographic coprocessor supporting multiple block cipher algorithms
Aigner et al. Side channel analysis resistant design flow
Ma et al. EMSim: A Fast Layout Level Electromagnetic Emanation Simulation Framework for High Accuracy Pre-Silicon Verification
Bossuet et al. Emulating side channel attacks on gem5: lessons learned
Yao et al. Verification of power-based side-channel leakage through simulation
Abdelmalek et al. EPC Class 1 GEN 2 UHF RFID tag emulator for robustness evaluation and improvement
CN102325021A (en) A kind of DPA fail safe evaluation and test and countercheck and device thereof
US11520960B1 (en) Register transfer level based side channel leakage assessment
Kumar et al. Analysis of side-channel attack AES hardware trojan benchmarks against countermeasures
Sosa et al. Simulation of electromagnetic emanation of cryptographic ics: Tools, methods, problems
Zhou et al. PUF implementation and application for securing IoT devices
Chen et al. SPUF design based on Camellia encryption algorithm
CN103984886B (en) Based on the fingerprint embedding method that subregion is fixing
Kabin Horizontal address-bit SCA attacks against ECC and appropriate countermeasures

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant