CN204537190U - The high smart card being highly resistant to DPA and attacking of security performance - Google Patents

The high smart card being highly resistant to DPA and attacking of security performance Download PDF

Info

Publication number
CN204537190U
CN204537190U CN201520081844.3U CN201520081844U CN204537190U CN 204537190 U CN204537190 U CN 204537190U CN 201520081844 U CN201520081844 U CN 201520081844U CN 204537190 U CN204537190 U CN 204537190U
Authority
CN
China
Prior art keywords
input end
output terminal
type flip
flip flop
dpa
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201520081844.3U
Other languages
Chinese (zh)
Inventor
黄友华
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Chengdu Hongshan Technology Co Ltd
Original Assignee
Chengdu Hongshan Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chengdu Hongshan Technology Co Ltd filed Critical Chengdu Hongshan Technology Co Ltd
Priority to CN201520081844.3U priority Critical patent/CN204537190U/en
Application granted granted Critical
Publication of CN204537190U publication Critical patent/CN204537190U/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Storage Device Security (AREA)

Abstract

The utility model discloses the high smart card being highly resistant to DPA and attacking of a kind of security performance, it comprises embedded microprocessor, tandom number generator and the random number between microprocessor and tandom number generator consume circuit, the output terminal that random number consumes the amplifier of circuit connects the input end of comparer and the input end of voltage controlled oscillator simultaneously, the output terminal of comparer is connected with the input end of shift register with the second d type flip flop simultaneously, the output terminal of shift register is connected with the input end of code translator, the output terminal of code translator is connected with the input end of voltage controlled oscillator, the output terminal of voltage controlled oscillator is connected with the input end of frequency divider, output terminal one end of frequency divider is connected with the input end of the first d type flip flop, and the other end is connected with the trigger end of first, second d type flip flop simultaneously, the output terminal of first, second d type flip flop is connected with the input end of XOR gate.The utility model can resist the attack of DPA, and security performance is high.

Description

The high smart card being highly resistant to DPA and attacking of security performance
Technical field
The utility model relates to a kind of smart card, is specifically related to the high smart card being highly resistant to DPA and attacking of a kind of security performance.
Background technology
Smart card has characteristic that is light and safety, and the applications such as the safety control that the Secure Payments on network, network connect and Electronic Signature are played an important role.China has the secret information that many information security application systems are come needed for memory system running by smart card, and the computing power elevator system safety utilizing smart card to have, smart card just progressively replaces magnetic card and is widely used in finance and other related industries.Along with the development of the attack method to smart card, particularly deliver along with many novel attack smart card techniques are in recent years disclosed, the safety of smart card faces huge challenge.Wherein, differential power consumption analysis (Differential Power Analysis, DPA) be exactly a kind of effectively Attacks method, it mainly extracts the information relevant with key by statistical method, implementation procedure more complicated, DPA to the successful attack of inline cryptographic algorithm relevant in smart card by wide coverage.Smart card be a kind of can the open platform architecture of down load application program after hair fastener, so in order to prevent pseudo-card and protection holder, smart card must have high security and high reliability.
Utility model content
The utility model overcomes the deficiencies in the prior art, provides a kind of security performance the high smart card being highly resistant to DPA and attacking, the high attack being highly resistant to DPA of the security performance of this smart card.
For solving above-mentioned technical matters, the utility model by the following technical solutions:
The high smart card being highly resistant to DPA and attacking of a kind of security performance, the tandom number generator that it comprises embedded microprocessor and is connected with embedded microprocessor, it is characterized in that: be connected with random number between described microprocessor and tandom number generator and consume circuit, described random number consumes circuit and comprises amplifier, comparer, shift register, code translator, voltage controlled oscillator, frequency divider and first, second d type flip flop, wherein the output terminal of amplifier connects the input end of comparer and the input end of voltage controlled oscillator simultaneously, the output terminal of comparer is connected with the input end of shift register with the second d type flip flop simultaneously, the output terminal of shift register is connected with the input end of code translator, the output terminal of code translator is connected with the input end of voltage controlled oscillator, the output terminal of voltage controlled oscillator is connected with the input end of frequency divider, output terminal one end of frequency divider is connected with the input end of the first d type flip flop, and the other end is connected with the trigger end of first, second d type flip flop simultaneously, the output terminal of first, second d type flip flop is connected with the input end of XOR gate.
Further technical scheme is:
The input end of described amplifier connects between the resistances, the other end ground connection of a resistance.
DPA for smart card attacks, when mainly to utilize on card embedded microprocessor running, the execution of certain specific instruction or data access institute consumed power, on supply-voltage source show the useful information that specific current spectrum provides.Therefore can cause extra current drain by additional extra circuit, thus change current spectrum is attacked to reach anti-DPA.Simultaneously extra current consuming circuit by the mode adopting random number random, must produce random number current sinking, to reach the unpredictable property of chip power consumption, makes it can not be analyzed with statistics.Consume in circuit in this random number, when the noise voltage of resistance noise generation is after amplifier, comparer, produce " 1 " or " 0 " digital signal, stored in shift register, value in such register is the random number that produces of similar chaos formula RNG, this random number, after code translator coding, controls the discharge and recharge number of tri-state discharge and recharge impact damper, finally reaches the object controlling current drain with random number.
Compared with prior art, the beneficial effects of the utility model are: circuit of the present utility model adds a random number and consumes circuit, reaches the object controlling current drain with random number, effectively can resist the attack of DPA, improve its security.
Accompanying drawing explanation
Below in conjunction with the drawings and specific embodiments, the utility model is described in further detail.
Fig. 1 is the structural representation of smart card of the present utility model.
Fig. 2 is the circuit diagram that random number of the present utility model consumes circuit.
Embodiment
Below in conjunction with accompanying drawing, the utility model is further described.Embodiment of the present utility model includes but not limited to the following example.
Embodiment
The high smart card being highly resistant to DPA and attacking of a kind of security performance as shown in Figure 1, the tandom number generator that it comprises embedded microprocessor and is connected with embedded microprocessor, be connected with random number between microprocessor and tandom number generator and consume circuit, random number consumes circuit and comprises amplifier, comparer, shift register, code translator, voltage controlled oscillator, frequency divider and first, second d type flip flop, wherein the output terminal of amplifier connects the input end of comparer and the input end of voltage controlled oscillator simultaneously, the output terminal of comparer is connected with the input end of shift register with the second d type flip flop simultaneously, the output terminal of shift register is connected with the input end of code translator, the output terminal of code translator is connected with the input end of voltage controlled oscillator, the output terminal of voltage controlled oscillator is connected with the input end of frequency divider, output terminal one end of frequency divider is connected with the input end of the first d type flip flop, and the other end is connected with the trigger end of first, second d type flip flop simultaneously, the output terminal of first, second d type flip flop is connected with the input end of XOR gate.The input end of amplifier connects between the resistances, the other end ground connection of a resistance.
Whole random number consumes circuit and comprises amplifier, comparer, shift register, code translator, voltage controlled oscillator, frequency divider and first, second d type flip flop, when the noise voltage of resistance noise generation is after amplifier, comparer, produce " 1 " or " 0 " digital signal, stored in shift register, value in such register is the random number that produces of similar chaos formula RNG, this random number is after code translator coding, control the discharge and recharge number of tri-state discharge and recharge impact damper, finally reach the object controlling current drain with random number.
According to the above embodiments, well the utility model can be completed.
Be embodiment of the present utility model as mentioned above.The utility model is not limited to above-mentioned embodiment, and anyone should learn the structure change made under enlightenment of the present utility model, and every have identical or close technical scheme with the utility model, all falls within protection domain of the present utility model.

Claims (2)

1. the high smart card being highly resistant to DPA and attacking of security performance, the tandom number generator that it comprises embedded microprocessor and is connected with embedded microprocessor, it is characterized in that: be connected with random number between described microprocessor and tandom number generator and consume circuit, described random number consumes circuit and comprises amplifier, comparer, shift register, code translator, voltage controlled oscillator, frequency divider and first, second d type flip flop, wherein the output terminal of amplifier connects the input end of comparer and the input end of voltage controlled oscillator simultaneously, the output terminal of comparer is connected with the input end of shift register with the second d type flip flop simultaneously, the output terminal of shift register is connected with the input end of code translator, the output terminal of code translator is connected with the input end of voltage controlled oscillator, the output terminal of voltage controlled oscillator is connected with the input end of frequency divider, output terminal one end of frequency divider is connected with the input end of the first d type flip flop, and the other end is connected with the trigger end of first, second d type flip flop simultaneously, the output terminal of first, second d type flip flop is connected with the input end of XOR gate.
2. the high smart card being highly resistant to DPA and attacking of security performance according to claim 1, is characterized in that: the input end of described amplifier connects between the resistances, the other end ground connection of a resistance.
CN201520081844.3U 2015-02-05 2015-02-05 The high smart card being highly resistant to DPA and attacking of security performance Expired - Fee Related CN204537190U (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201520081844.3U CN204537190U (en) 2015-02-05 2015-02-05 The high smart card being highly resistant to DPA and attacking of security performance

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201520081844.3U CN204537190U (en) 2015-02-05 2015-02-05 The high smart card being highly resistant to DPA and attacking of security performance

Publications (1)

Publication Number Publication Date
CN204537190U true CN204537190U (en) 2015-08-05

Family

ID=53751163

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201520081844.3U Expired - Fee Related CN204537190U (en) 2015-02-05 2015-02-05 The high smart card being highly resistant to DPA and attacking of security performance

Country Status (1)

Country Link
CN (1) CN204537190U (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104616054A (en) * 2015-02-05 2015-05-13 成都市宏山科技有限公司 Intelligent card with high security

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104616054A (en) * 2015-02-05 2015-05-13 成都市宏山科技有限公司 Intelligent card with high security

Similar Documents

Publication Publication Date Title
Bi et al. Tunnel FET current mode logic for DPA-resilient circuit designs
CN105227176B (en) A kind of mixed type PUF circuits
Choi et al. Symmetric adiabatic logic circuits against differential power analysis
CN104168264A (en) Low-cost high-security physical unclonable function
CN102880840A (en) Current type physical unclonable function circuit for defending attack
Liu et al. Sequence triggered hardware trojan in neural network accelerator
CN106385316B (en) PUF is fuzzy to extract circuit and method
CN104459519A (en) Chip safety testing method and device
CN204537190U (en) The high smart card being highly resistant to DPA and attacking of security performance
CN104616054A (en) Intelligent card with high security
CN107994980A (en) It is a kind of using the out of order technology of clock and the anti-DPA attack methods of chaos trigger
CN102110206B (en) Method for defending attack and device with attack defending function
Nguyen et al. Extraction of device fingerprints using built-in erase-suspend operation of flash memory devices
Gao et al. A novel approximate computing based security primitive for the Internet of Things
KR101332376B1 (en) logic circuit for prevention DPA using of Hamming Weight Model, and smart card included it
WO2023035689A1 (en) True random number generator based on digital feedback self-calibration system on chip
Yu et al. ResNet‐based Trojan detection methodology for protected ICs
Yu Hardware trojan attacks on voltage scaling‐based side‐channel attack countermeasure
Cao et al. An authentication strategy based on spatiotemporal chaos for software copyright protection
Meshram et al. Security in embedded systems: Vulnerabilities pigeonholing of attacks and countermeasures
CN101436929B (en) Dot computation method capable of resisting simple current drain aggression
CN105513641B (en) A kind of safety protective circuit
CN104657680A (en) In-chip template attack resisting data transmission method
CN105656629A (en) Secure non-adjacent form realization method in chip
Li et al. FPGA implementation of AES algorithm resistant power analysis attacks

Legal Events

Date Code Title Description
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20150805

Termination date: 20160205