CN107577964A - An Electromagnetic Information Hiding Method Based on Random Sequence Interference and Gate Circuit Path Constraints - Google Patents
An Electromagnetic Information Hiding Method Based on Random Sequence Interference and Gate Circuit Path Constraints Download PDFInfo
- Publication number
- CN107577964A CN107577964A CN201710798830.7A CN201710798830A CN107577964A CN 107577964 A CN107577964 A CN 107577964A CN 201710798830 A CN201710798830 A CN 201710798830A CN 107577964 A CN107577964 A CN 107577964A
- Authority
- CN
- China
- Prior art keywords
- electromagnetic information
- random
- random sequence
- frequency
- gate circuit
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 14
- 238000011161 development Methods 0.000 claims description 5
- 239000006185 dispersion Substances 0.000 claims description 5
- 239000012141 concentrate Substances 0.000 abstract description 2
- 238000005728 strengthening Methods 0.000 abstract 1
- 238000010586 diagram Methods 0.000 description 4
- 239000000523 sample Substances 0.000 description 4
- 238000001514 detection method Methods 0.000 description 3
- 230000005670 electromagnetic radiation Effects 0.000 description 2
- 238000005265 energy consumption Methods 0.000 description 2
- 238000005516 engineering process Methods 0.000 description 2
- 238000005259 measurement Methods 0.000 description 2
- 238000012545 processing Methods 0.000 description 2
- 230000000630 rising effect Effects 0.000 description 2
- 238000004364 calculation method Methods 0.000 description 1
- 239000008358 core component Substances 0.000 description 1
- 238000005336 cracking Methods 0.000 description 1
- 239000013078 crystal Substances 0.000 description 1
- 230000007547 defect Effects 0.000 description 1
- 230000007812 deficiency Effects 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
Landscapes
- Storage Device Security (AREA)
Abstract
Description
技术领域:Technical field:
本发明属于信息安全技术领域,涉及一种基于随机序列干扰和门电路路径约束的电磁信息隐藏方法,可用于抗旁路攻击等领域中增强密码的保密性。The invention belongs to the technical field of information security, and relates to an electromagnetic information hiding method based on random sequence interference and gate circuit path constraints, which can be used to enhance the confidentiality of passwords in fields such as anti-side channel attacks.
背景技术:Background technique:
人类社会现已经进入信息化时代,人在社会上各种活动都依赖于信息技术,从而使得信息技术设备在人类社会重新得到广泛的帮助。它给人类社会各个领域带来飞速发展的同时,也带来了许多意想不到的问题。密码芯片的保密工作就是其中最为突出的问题之一。Human society has now entered the information age, and people's various activities in society depend on information technology, so that information technology equipment can get extensive help in human society again. While it has brought rapid development to various fields of human society, it has also brought many unexpected problems. The secret work of cryptographic chips is one of the most prominent problems.
密码芯片是具有密码运算功能的集成电路芯片,它作为信息安全系统的核心部件,其安全性关乎整个信息系统的安全。从前人们普遍认为只要在数学上能够设计出足够强度的密码算法,并且制定一些安全协议就可以较好的防御各种类型的攻击。但旁路攻击理论的出现给芯片安全带来了极大的挑战。攻击者通过对密码芯片运算时所泄露的旁道信息进行收集处理和分析,能够快速高效的破解密码芯片内部的密钥等关键信息。在抗旁路攻击领域中,入侵者通过探测得到电磁信息或者能耗信息并加以分析,将大大减少破解密码的难度。因此将芯片工作时泄露的能耗、电磁信息等信息能隐藏起来在抗旁路攻击领域中有着十分重要的作用。A cryptographic chip is an integrated circuit chip with a cryptographic operation function. As the core component of an information security system, its security is related to the security of the entire information system. In the past, it was generally believed that as long as a cryptographic algorithm with sufficient strength can be designed mathematically and some security protocols can be formulated, various types of attacks can be better defended. However, the emergence of side-channel attack theory has brought great challenges to chip security. By collecting, processing and analyzing the bypass information leaked during the operation of the cryptographic chip, the attacker can quickly and efficiently decipher key information such as the key inside the cryptographic chip. In the field of anti-side-channel attacks, intruders can obtain and analyze electromagnetic information or energy consumption information through detection, which will greatly reduce the difficulty of cracking passwords. Therefore, hiding information such as energy consumption and electromagnetic information leaked during chip operation plays a very important role in the field of anti-side-channel attacks.
在现有的电磁信息隐藏的方法中,大多是通过增加时钟串扰信号的方法,加入干扰的电磁信息,使产生干扰的电磁信息和产生密码的电磁信息无法分离。例如申请公告号CN105607687A,名称为“一种抗旁路攻击的时钟串扰实现方法”的专利申请,公开了一种抗旁路攻击的电磁信息隐藏方法。对输入时钟进行相位延迟产生四个相位差为1/4个周期的时钟,以及分领数为2、3、4或者5的动态切换分频时钟,共五个时钟源,通过随机在五个时钟源中选择一路作为时钟输出,同时分频时钟在2到5分频数之间随机选择,每选择一路时钟后,此时钟持续周期数也在16个时钟到31个时钟之间随机选择,最终通过随机选择时钟源,随机每一个时钟源的持续周期产生一个相位和频率随机变换的串扰时钟,旁路攻击对功耗和电磁辐射的测量是以稳定时钟周期为基准的,对于加扰后的时钟,功耗和电磁辐射无法以同一时钟周期作为基准测量,增加旁路攻击的难度。在进行大面积电磁信息测量时,该方法能够将电磁信息隐藏起来,但是用高精度小范围探测装置,经过多次测量后并不能将密码输出管脚和芯片中密码模块工作区域的电磁信息隐藏,导致电磁信息泄露,密码容易被破解。In the existing methods of hiding electromagnetic information, most of them add disturbing electromagnetic information by adding clock crosstalk signals, so that the electromagnetic information that generates interference and the electromagnetic information that generates passwords cannot be separated. For example, application announcement number CN105607687A, a patent application titled "A Method for Implementing Clock Crosstalk Against Side-Channel Attacks", discloses an electromagnetic information hiding method against side-channel attacks. Phase delay the input clock to generate four clocks with a phase difference of 1/4 cycle, and dynamically switch frequency-divided clocks with a number of points of 2, 3, 4 or 5, a total of five clock sources, through random in five One of the clock sources is selected as the clock output, and the frequency division clock is randomly selected between 2 and 5 frequency division numbers. After each clock is selected, the number of continuous cycles of this clock is also randomly selected between 16 clocks and 31 clocks. Finally, by randomly selecting the clock source, the continuous cycle of each clock source randomly generates a crosstalk clock with random phase and frequency changes. The power consumption and electromagnetic radiation measurement of the side-channel attack is based on the stable clock cycle. For the scrambled The clock, power consumption and electromagnetic radiation cannot be measured with the same clock cycle as a benchmark, which increases the difficulty of side channel attacks. When measuring large-area electromagnetic information, this method can hide the electromagnetic information, but with a high-precision small-range detection device, the electromagnetic information of the password output pin and the working area of the password module in the chip cannot be hidden after repeated measurements , leading to the leakage of electromagnetic information, and the password is easily cracked.
发明内容:Invention content:
本发明的目的是在于克服上述现有技术存在的不足,提出了一种基于随机序列干扰和门电路路径约束的电磁信息隐藏方法,在密码输出管脚附近增加随机序列干扰和通过门电路路径约束对密码模块电磁信息进行打散,以解决现有技术中存在的小范围探测电磁信息时密码芯片电磁信息泄露严重的技术问题。The purpose of the present invention is to overcome the deficiencies in the prior art above, and propose a method for hiding electromagnetic information based on random sequence interference and gate circuit path constraints, adding random sequence interference and pass gate circuit path constraints near the password output pin The electromagnetic information of the cryptographic module is scattered to solve the technical problem of serious leakage of the electromagnetic information of the cryptographic chip when the electromagnetic information is detected in a small range in the prior art.
为实现上述目的,本发明采取的技术方案包括如下步骤:In order to achieve the above object, the technical solution taken by the present invention comprises the following steps:
(1)获取随机序列f2:(1) Obtain random sequence f2:
(1a)对FPGA的输入时钟进行分频,得到频率为密码模块触发时钟频率n倍的时钟f1,其中n≥20;(1a) frequency division is carried out to the input clock of FPGA, obtains the clock f1 that frequency is n times of the trigger clock frequency of the cryptographic module, wherein n≥20;
(1b)利用设定的移位寄存器对任一非线性函数进行运算,得到伪随机数t,移位寄存器所能得到的最大数值值是2n;(1b) Use the set shift register to perform operations on any nonlinear function to obtain a pseudo-random number t, and the maximum numerical value that can be obtained by the shift register is 2n;
(1c)采用与时钟f1相同的频率对伪随机数t进行更新,得到随时间变化的随机数t’;(1c) Use the same frequency as the clock f1 to update the pseudo-random number t to obtain a random number t' that changes with time;
(1d)采用随机数t’对时钟f1进行分频,得到输出频率随机的输出序列f2;(1d) Use random number t' to divide clock f1 to obtain output sequence f2 with random output frequency;
(2)利用随机序列f2对密码输出管脚附近的电磁信息进行干扰:(2) Use the random sequence f2 to interfere with the electromagnetic information near the password output pin:
将频率随机的输出序列f2作为FPGA输出源,查看芯片密码输出管脚pin的位置,并将频率随机的输出序列f2的输出管脚设定在管脚pin临近的管脚处,使密码输出管脚泄露的电磁信息和随机序列f2的电磁信息相互混叠,实现对密码输出管脚pin附近电磁信息的隐藏;Use the output sequence f2 with random frequency as the FPGA output source, check the position of the chip password output pin, and set the output pin of the output sequence f2 with random frequency at the pin adjacent to the pin pin, so that the password output pin The electromagnetic information leaked by the pin and the electromagnetic information of the random sequence f2 are aliased with each other to realize the hiding of the electromagnetic information near the password output pin pin;
(3)对密码模块电磁信息进行打散:用户使用FPGA开发软件,对FPGA芯片工作时内部门电路路径进行约束,将原来工作区域中集中进行密码运算的门电路分散到逻辑阵列的边角处,实现对芯片表面原本集中的电磁信息的分散。(3) Disperse the electromagnetic information of the cryptographic module: the user uses FPGA development software to restrict the internal gate circuit path when the FPGA chip is working, and disperse the gate circuits that focus on cryptographic operations in the original working area to the corners of the logic array , to realize the dispersion of the electromagnetic information originally concentrated on the chip surface.
本发明与现有技术相比,具有以下优点:Compared with the prior art, the present invention has the following advantages:
1.本发明在芯片密码输出管脚附近输出频率随机的输出序列,使密码输出管脚泄露的电磁信息和随机序列f2的电磁信息相互混叠,实现对密码输出管脚附近的小范围电磁信息进行干扰,避免了现有技术中密码输出管脚的小范围内泄露电磁信息的缺陷,有效地提高密码芯片的安全性。1. The present invention outputs an output sequence with a random frequency near the password output pin of the chip, so that the electromagnetic information leaked by the password output pin and the electromagnetic information of the random sequence f2 are aliased with each other, and the small-scale electromagnetic information near the password output pin is realized. The interference avoids the defect of leaking electromagnetic information in a small range of the password output pin in the prior art, and effectively improves the security of the password chip.
2.本发明通过对FPGA芯片工作时内部门电路路径进行约束,将原来工作区域中集中进行密码运算的部分分散到逻辑阵列的边角处,实现对芯片表面原本集中电磁信息的分散,避免了现有技术中芯片表面密码模块工作区域在小范围内泄露的电磁信息,进一步提高了密码芯片的安全性。2. By constraining the internal gate circuit path when the FPGA chip is working, the present invention disperses the part of the original work area where the cryptographic calculation is concentrated to the corners of the logic array, so as to realize the dispersion of the original concentrated electromagnetic information on the chip surface and avoid In the prior art, the electromagnetic information leaked in a small area in the working area of the cryptographic module on the surface of the chip further improves the security of the cryptographic chip.
附图说明Description of drawings
图1为本发明适用的电磁信息隐藏系统的结构示意图;Fig. 1 is a structural schematic diagram of an electromagnetic information hiding system applicable to the present invention;
图2为本发明的实现流程图。Fig. 2 is the realization flowchart of the present invention.
图3密码模块输出序列和未作任何处理的电磁信息参照图Figure 3 The output sequence of the cryptographic module and the reference diagram of the electromagnetic information without any processing
图4密码模块输出序列和密码模块加入随机序列的电磁信息参照图Figure 4 The output sequence of the cryptographic module and the electromagnetic information reference diagram of the random sequence added by the cryptographic module
图5未进行门电路路径约束密码模块工作区域电磁信息和门电路路径进行约束后密码模块工作区域的电磁信息参照图Figure 5 Reference diagram of electromagnetic information in the working area of the cryptographic module without gate circuit path constraints and electromagnetic information in the working area of the cryptographic module after the gate circuit path is constrained
具体实施方式Detailed ways
以下结合附图和具体实施例,对本发明进行进一步详细说明:Below in conjunction with accompanying drawing and specific embodiment, the present invention is described in further detail:
参照图1,本发明适用的电磁信息隐藏系统包括随机序列干扰模块和密码模块电磁信息打散部分;随机序列干扰模块由两个分频器和一个随机数生成器组成,分频器1首先对FPGA输入时钟进行分频,随机数生成器产生随时间变化的伪随机数,分频器2通过随机数生成器得到的伪随机数对分频器1得到的输出时钟进行分频。密码模块电磁信息打散部分,对FPGA芯片工作时内部门电路路径进行约束,将原来工作区域中集中进行密码运算的门电路分散到逻辑阵列的边角处。With reference to Fig. 1, the applicable electromagnetic information hiding system of the present invention comprises random sequence jamming module and code module electromagnetic information break up part; Random sequence jamming module is made up of two frequency dividers and a random number generator, and frequency divider 1 first to The frequency of the FPGA input clock is divided, and the random number generator generates a pseudo-random number that changes with time. The frequency divider 2 divides the frequency of the output clock obtained by the frequency divider 1 through the pseudo-random number obtained by the random number generator. The electromagnetic information dispersal part of the cryptographic module restricts the internal gate circuit path when the FPGA chip is working, and disperses the gate circuits that focus on cryptographic operations in the original working area to the corners of the logic array.
参照图2,基于随机序列干扰和门电路约束的电磁信息隐藏方法,包括如下步骤:Referring to Figure 2, the electromagnetic information hiding method based on random sequence interference and gate circuit constraints includes the following steps:
步骤1:获取随机序列f2:Step 1: Get random sequence f2:
步骤1a:对FPGA的输入时钟进行分频,得到频率为密码模块触发时钟频率n倍的时钟f1,其中n≥20;Step 1a: Divide the frequency of the input clock of the FPGA to obtain a clock f1 whose frequency is n times the frequency of the trigger clock of the cryptographic module, where n≥20;
本实施案例基于Xilinx FPGA开发版实现,利用Xilinx FPGA可编程器件,客户可以更快地设计和验证他们的电路,搭建电磁观察平台,电磁探头、示波器,引入FPGA开发版的晶振时钟为clk,clk=50MHz,采用上升沿触发将clk分频得到f1,该f1频率为密码模块触发时钟频率n倍,n≥20,n的取值和下述移位寄存器的位数有关,n的值越小,寄存器的位数越少,伪随机数的随机性差,导致随机序列f2随机性差,本实施案例取n=64,密码模块触发时钟频率为5KHz,使用磁场近场探头,分辨率10mm,密码模块输出序列和电磁信息参照图3,上半部分为密码模块的电磁信息,下半部分为密码模块输出序列,发现在密码模块的输出序列0-1变化时电磁有明显的脉冲,电磁信息和密码模块输入序列相互对应;This implementation case is based on the Xilinx FPGA development version. Using Xilinx FPGA programmable devices, customers can design and verify their circuits faster, build electromagnetic observation platforms, electromagnetic probes, oscilloscopes, and introduce the crystal oscillator clock of the FPGA development version as clk, clk =50MHz, use rising edge trigger to divide clk frequency to obtain f1, the frequency of f1 is n times of the trigger clock frequency of the cryptographic module, n≥20, the value of n is related to the number of bits of the following shift register, the smaller the value of n , the fewer the number of bits in the register, the less random the pseudo-random number will be, resulting in poor randomness of the random sequence f2. In this implementation case, n=64, the trigger clock frequency of the cryptographic module is 5KHz, using a magnetic field near-field probe with a resolution of 10mm, and the cryptographic module Refer to Figure 3 for the output sequence and electromagnetic information. The upper part is the electromagnetic information of the cryptographic module, and the lower part is the output sequence of the cryptographic module. It is found that when the output sequence of the cryptographic module changes from 0 to 1, the electromagnetic has obvious pulses, electromagnetic information and passwords. Module input sequences correspond to each other;
步骤1b:利用设定的移位寄存器对任一非线性函数进行运算,得到伪随机数t,移位寄存器所能得到的最大数值值是2n;Step 1b: Use the set shift register to perform operations on any nonlinear function to obtain a pseudo-random number t, and the maximum value that can be obtained by the shift register is 2n;
设定7位移位寄存器ff,27=2×64,利用7位寄存器ff生成伪随机数t,先对7位寄存器ff赋初值ff=7’b1010011,采用移位的最低位线性运算的方式得到伪随机数t,采用f1上升沿触发对t进行更新:Set the 7-bit shift register ff, 2 7 =2×64, use the 7-bit register ff to generate a pseudo-random number t, first assign the initial value ff=7'b1010011 to the 7-bit register ff, and use the lowest bit linear operation of the shift The pseudo-random number t is obtained by the method, and the rising edge of f 1 is used to trigger the update of t:
t=ff[6]:将ff[6]值赋给tt=ff[6]: Assign ff[6] value to t
ff[6]=(ff[0]^ff[1])^(ff[2]^~ff[3])^(ff[4]^~ff[5]):ff[6]通过前面6位非线性运算得到ff[6]=(ff[0]^ff[1])^(ff[2]^~ff[3])^(ff[4]^~ff[5]): ff[6] passes the previous 6 bit nonlinear operation to get
ff[5]=ff[4]:ff[4]赋给ff[5]ff[5]=ff[4]: ff[4] is assigned to ff[5]
ff[4]=ff[3]:ff[3]赋给ff[4]ff[4]=ff[3]: ff[3] is assigned to ff[4]
ff[3]=ff[2]:ff[2]赋给ff[3]ff[3]=ff[2]: ff[2] is assigned to ff[3]
ff[2]=ff[1]:ff[1]赋给ff[2]ff[2]=ff[1]: ff[1] is assigned to ff[2]
ff[1]=ff[0]:ff[0]赋给ff[1]ff[1]=ff[0]: ff[0] is assigned to ff[1]
ff[0]=ff[6]:ff[6]赋给ff[0]ff[0]=ff[6]: ff[6] is assigned to ff[0]
步骤1c:采用与时钟f1相同的频率对伪随机数t进行更新,得到随时间变化的随机数t’;Step 1c: Use the same frequency as the clock f1 to update the pseudo-random number t to obtain a random number t' that changes with time;
步骤1d:采用随机数t’对时钟f1进行分频,得到输出序列宽度随机的输出序列f2,使用磁场近场探头,分辨率10mm,密码模块输出序列和电磁信息参照图4,上半部分为密码模块加入随机序列的电磁信息,下半部分为密码模块输出序列,观察得到:加入随机序列的电磁信息隐藏了密码模块输出序列的电磁信息;Step 1d: use the random number t' to divide the frequency of the clock f1 to obtain the output sequence f2 with a random output sequence width, use a magnetic field near-field probe with a resolution of 10mm, refer to Figure 4 for the output sequence and electromagnetic information of the cryptographic module, the upper part is The cryptographic module adds electromagnetic information of a random sequence, and the lower part is the output sequence of the cryptographic module. It is observed that the electromagnetic information added to the random sequence hides the electromagnetic information of the output sequence of the cryptographic module;
步骤2:利用随机序列f2对密码输出管脚附近的电磁信息进行干扰:Step 2: Use the random sequence f2 to interfere with the electromagnetic information near the password output pin:
将频率随机的输出序列f2作为FPGA输出源,查看芯片密码输出管脚pin的位置,并将频率随机的输出序列f2的输出管脚设定在管脚pin临近的管脚处,使密码输出管脚泄露的电磁信息和随机序列f2的电磁信息相互混叠,实现对密码输出管脚pin附近电磁信息的隐藏;Use the output sequence f2 with random frequency as the FPGA output source, check the position of the chip password output pin, and set the output pin of the output sequence f2 with random frequency at the pin adjacent to the pin pin, so that the password output pin The electromagnetic information leaked by the pin and the electromagnetic information of the random sequence f2 are aliased with each other to realize the hiding of the electromagnetic information near the password output pin pin;
步骤3:对密码模块电磁信息进行打散:用户使用Xilinx FPGA开发软件PlanAhead约束芯片工作时内部门电路路径,通过软件了解FPGA芯片内部门电路的分布情况,将原来工作区域中集中进行密码运算的部分分散到逻辑阵列的边角处,实现对原本集中电磁信息的分散,使用高精度小范围的磁场近场探头,分辨率2mm的探头探测,得到未进行门电路路径约束密码模块工作区域电磁信息和门电路路径进行约束后密码模块工作区域的电磁信息参照图5,上半部分是未进行门电路路径约束密码模块工作区域电磁信息,下半部分是门电路路径进行约束后密码模块工作区域的电磁信息,观察得到经过门电路约束后,实现了对原本集中的电磁信息的分散,确保实现密码模块在高精度小范围探测时电磁信息的隐藏。Step 3: Disperse the electromagnetic information of the cryptographic module: the user uses the Xilinx FPGA development software PlanAhead to constrain the internal circuit path of the chip when the chip is working, and understands the distribution of the internal circuit of the FPGA chip through the software, and concentrates the cryptographic operations in the original working area Part of it is scattered to the corners of the logic array to realize the dispersion of the original concentrated electromagnetic information. Using a high-precision and small-range magnetic field near-field probe with a resolution of 2mm for detection, the electromagnetic information in the working area of the cryptographic module without gate circuit path constraints is obtained. Refer to Figure 5 for the electromagnetic information of the working area of the cryptographic module after being constrained by the gate circuit path. Electromagnetic information, after being constrained by the gate circuit, realizes the dispersion of the original concentrated electromagnetic information, ensuring the hiding of electromagnetic information when the cryptographic module detects in a high-precision and small range.
上述实施例仅用具体实施说明本发明的实现方法,在此基础上可以有多种变形,这种基于本发明的结构变化均包含在本发明的保护范围之内。The above-mentioned embodiments only illustrate the realization method of the present invention by specific implementation, and there may be various modifications on this basis, and such structural changes based on the present invention are all included in the protection scope of the present invention.
Claims (2)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710798830.7A CN107577964B (en) | 2017-09-07 | 2017-09-07 | An Electromagnetic Information Hiding Method Based on Random Sequence Interference and Gate Circuit Path Constraints |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710798830.7A CN107577964B (en) | 2017-09-07 | 2017-09-07 | An Electromagnetic Information Hiding Method Based on Random Sequence Interference and Gate Circuit Path Constraints |
Publications (2)
Publication Number | Publication Date |
---|---|
CN107577964A true CN107577964A (en) | 2018-01-12 |
CN107577964B CN107577964B (en) | 2019-12-31 |
Family
ID=61031106
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710798830.7A Active CN107577964B (en) | 2017-09-07 | 2017-09-07 | An Electromagnetic Information Hiding Method Based on Random Sequence Interference and Gate Circuit Path Constraints |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107577964B (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109861818A (en) * | 2019-03-06 | 2019-06-07 | 京东方科技集团股份有限公司 | Encryption and decryption circuit, encryption and decryption device and encryption and decryption method |
CN109885960A (en) * | 2019-03-05 | 2019-06-14 | 中国人民解放军32082部队 | A kind of embedded chip hardware Trojan horse design method based on electromagnetism bypass analysis |
CN114760003A (en) * | 2022-06-14 | 2022-07-15 | 北京密码云芯科技有限公司 | Encryption protection device for electromagnetic perception attack and use method |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN201352349Y (en) * | 2008-12-18 | 2009-11-25 | 成都立鑫新技术科技有限公司 | Electronic information protector |
CN104461452A (en) * | 2013-09-17 | 2015-03-25 | 航天信息股份有限公司 | Method and device for generating true random numbers in system on chip |
CN105607687A (en) * | 2015-12-22 | 2016-05-25 | 上海爱信诺航芯电子科技有限公司 | Anti-bypass attack clock crosstalk realization method |
US20160284195A1 (en) * | 2015-03-26 | 2016-09-29 | Bell Helicopter Textron Inc. | Electrical load monitoring system |
-
2017
- 2017-09-07 CN CN201710798830.7A patent/CN107577964B/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN201352349Y (en) * | 2008-12-18 | 2009-11-25 | 成都立鑫新技术科技有限公司 | Electronic information protector |
CN104461452A (en) * | 2013-09-17 | 2015-03-25 | 航天信息股份有限公司 | Method and device for generating true random numbers in system on chip |
US20160284195A1 (en) * | 2015-03-26 | 2016-09-29 | Bell Helicopter Textron Inc. | Electrical load monitoring system |
CN105607687A (en) * | 2015-12-22 | 2016-05-25 | 上海爱信诺航芯电子科技有限公司 | Anti-bypass attack clock crosstalk realization method |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109885960A (en) * | 2019-03-05 | 2019-06-14 | 中国人民解放军32082部队 | A kind of embedded chip hardware Trojan horse design method based on electromagnetism bypass analysis |
CN109861818A (en) * | 2019-03-06 | 2019-06-07 | 京东方科技集团股份有限公司 | Encryption and decryption circuit, encryption and decryption device and encryption and decryption method |
WO2020177438A1 (en) * | 2019-03-06 | 2020-09-10 | Boe Technology Group Co., Ltd. | Circuits for data encryption and decryption, and methods thereof |
US11349650B2 (en) | 2019-03-06 | 2022-05-31 | Boe Technology Group Co., Ltd. | Circuits for data encryption and decryption, and methods thereof |
CN114760003A (en) * | 2022-06-14 | 2022-07-15 | 北京密码云芯科技有限公司 | Encryption protection device for electromagnetic perception attack and use method |
Also Published As
Publication number | Publication date |
---|---|
CN107577964B (en) | 2019-12-31 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Krautter et al. | Active fences against voltage-based side channels in multi-tenant FPGAs | |
Majzoobi et al. | Techniques for design and implementation of secure reconfigurable PUFs | |
Tebelmann et al. | Self-secured PUF: Protecting the loop PUF by masking | |
Ngo et al. | Cryptographically secure shield for security IPs protection | |
Ender et al. | The first thorough side-channel hardware trojan | |
CN107577964B (en) | An Electromagnetic Information Hiding Method Based on Random Sequence Interference and Gate Circuit Path Constraints | |
Ghosh et al. | Syn-STELLAR: An EM/power SCA-resilient AES-256 with synthesis-friendly signature attenuation | |
Durga et al. | Design and synthesis of lfsr based random number generator | |
Bellizia et al. | TEL logic style as a countermeasure against side-channel attacks: Secure cells library in 65nm CMOS and experimental results | |
Thangam et al. | A novel logic locking technique for hardware security | |
Rajski et al. | A lightweight true random number generator for root of trust applications | |
Kotipalli et al. | Asynchronous Advanced Encryption Standard Hardware with Random Noise Injection for Improved Side‐Channel Attack Resistance | |
Jain et al. | Special session: Novel attacks on logic-locking | |
Bock et al. | An offset-compensated oscillator-based random bit source for security applications | |
Garcia-Bosque et al. | Suitability of generalized GAROs on FPGAs as PUFs or TRNGs considering spatial correlations | |
Bahadur et al. | Reconfigurable side channel attack resistant true random number generator | |
Paul et al. | Rihann: Remote iot hardware authentication with intrinsic identifiers | |
Shekarian et al. | Neutralizing a design-for-hardware-trust technique | |
US9525457B1 (en) | Spread spectrum clock generation using a tapped delay line and entropy injection | |
Frustaci et al. | A high-speed and low-power DSP-based TRNG for FPGA implementations | |
Vaskova et al. | Accelerating secure circuit design with hardware implementation of diehard battery of tests of randomness | |
US20190187957A1 (en) | Compact bit generator | |
Rožić et al. | The monte carlo puf | |
Meka et al. | Metastability Influenced PUF for cryptographic key generation: a FPGA Approach | |
Nagata et al. | Protecting cryptographic integrated circuits with side-channel information |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |