CN107577964A - Electromagnetic information hidden method based on random sequence interference and gate circuit path constraint - Google Patents

Electromagnetic information hidden method based on random sequence interference and gate circuit path constraint Download PDF

Info

Publication number
CN107577964A
CN107577964A CN201710798830.7A CN201710798830A CN107577964A CN 107577964 A CN107577964 A CN 107577964A CN 201710798830 A CN201710798830 A CN 201710798830A CN 107577964 A CN107577964 A CN 107577964A
Authority
CN
China
Prior art keywords
electromagnetic information
random sequence
pin
frequency
clock
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201710798830.7A
Other languages
Chinese (zh)
Other versions
CN107577964B (en
Inventor
王智康
任振兴
王占伟
董丽华
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xidian University
Original Assignee
Xidian University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xidian University filed Critical Xidian University
Priority to CN201710798830.7A priority Critical patent/CN107577964B/en
Publication of CN107577964A publication Critical patent/CN107577964A/en
Application granted granted Critical
Publication of CN107577964B publication Critical patent/CN107577964B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Storage Device Security (AREA)

Abstract

The present invention proposes a kind of electromagnetic information hidden method based on random sequence interference and gate circuit path constraint, and serious technical problem is revealed for solving crypto chip electromagnetic information when small range present in prior art detects electromagnetic information.Realize that step is:Input clock is divided using frequency divider to obtain f1, the pseudo random number changed over time is obtained by random sequence generator, f1 is divided using pseudo random number to obtain the random sequence f2 of frequency accidental change;The electromagnetic information near password output pin is disturbed using random sequence f2, makes the mutual aliasing of electromagnetic information of the electromagnetic information and random sequence of the leakage of password output pin, can not separate;Crypto module electromagnetic information is broken up, realizes and concentrates electromagnetic information to disperse script, the electromagnetic information of crypto module can not be detected in a small range.The present invention can be used in the fields such as anti-bypass attack the confidentiality for strengthening password.

Description

Electromagnetic information hidden method based on random sequence interference and gate circuit path constraint
Technical field:
The invention belongs to field of information security technology, is related to a kind of based on random sequence interference and gate circuit path constraint Electromagnetic information hidden method, available for the confidentiality for strengthening password in the fields such as anti-bypass attack.
Background technology:
Human society now comes into the information age, and socially various activities all rely on information technology to people, so as to So that Information Technology Equipment retrieves extensive help in human society.It brings rapid development to human society every field While, also bring the problem of many unexpected.The security work of crypto chip be exactly wherein the most distinct issues it One.
Crypto chip is the IC chip for having crypto-operation function, its core as information safety system Part, its security concern the safety of whole information system.As long as in the past it has been recognized that can mathematically design enough The cryptographic algorithm of intensity, and formulate some security protocol cans and preferably defend various types of attacks.But bypass attack Theoretical appearance brings great challenge to chip secure.Attacker is by believing the lie revealed during crypto chip computing Breath is collected the key messages such as processing and analysis, the key of decryption chip internal that can be rapidly and efficiently.In anti-bypass In attack field, invader is obtained electromagnetic information or consumption information and analyzed by detection, will greatly reduce crack it is close The difficulty of code.Energy consumption, the information such as electromagnetic information revealed when therefore by chip operation can stash in anti-bypass attack field In have highly important effect.
It is the method by increasing clock crosstalk signal mostly in the method that existing electromagnetic information is hidden, adds dry The electromagnetic information disturbed, the electromagnetic information that generation is disturbed can not be separated with the electromagnetic information for producing password.Such as apply for notification number CN105607687A, the patent application of entitled " a kind of clock crosstalk implementation method of anti-bypass attack ", disclose a kind of anti- The electromagnetic information hidden method of bypass attack.It is 1/4 cycle that phase delay is carried out to input clock and produces four phase differences Clock, and point neck number are 2,3,4 or 5 switching at runtime frequency-dividing clock, totally five clock sources, by random in five clocks Select to export as clock all the way in source, while frequency-dividing clock randomly chooses between 2 to 5 divider ratios, often selects clock all the way Afterwards, this clock durations number also randomly chooses in 16 clocks between 31 clocks, eventually through random selection clock source, The durations of each random clock source produce the crosstalk clock of a phase and frequency stochastic transformation, and bypass attack is to power consumption Measurement with electromagnetic radiation is on the basis of the stabilizing clock cycle, and for the clock after scrambling, power consumption and electromagnetic radiation can not Using the same clock cycle as reference measurement, increase the difficulty of bypass attack.When carrying out the measurement of large area electromagnetic information, the party Method can stash electromagnetic information, but with high-precision small range detection device, can not will be close after repeatedly measurement The electromagnetic information of crypto module working region is hidden in code output pin and chip, causes electromagnetic information to be revealed, the easy quilt of password Crack.
The content of the invention:
The purpose of the present invention is to be to overcome above-mentioned the shortcomings of the prior art, it is proposed that one kind is done based on random sequence The electromagnetic information hidden method with gate circuit path constraint is disturbed, increases random sequence interference near password output pin and passes through Gate circuit path constraint is broken up to crypto module electromagnetic information, and electromagnetism is detected to solve small range present in prior art Crypto chip electromagnetic information reveals serious technical problem during information.
To achieve the above object, the technical scheme that the present invention takes comprises the following steps:
(1) random sequence f2 is obtained:
(1a) divides to FPGA input clock, obtains the clock that frequency triggers n times of clock frequency for crypto module F1, wherein n >=20;
(1b) carries out computing using the shift register of setting to any nonlinear function, obtains pseudo random number t, displacement is posted The getable greatest measure value of storage institute is 2n;
(1c) is used and pseudo random number t is updated with clock f1 identicals frequency, the random number changed over time t’;
(1d) is divided using random number t ' to clock f1, obtains the random output sequence f2 of output frequency;
(2) electromagnetic information near password output pin is disturbed using random sequence f2:
Using the output sequence f2 of frequency accidental as FPGA output sources, chip password output pin pin position is checked, and The output sequence f2 of frequency accidental output pin is set at the pin that pin pin closes on, reveals password output pin Electromagnetic information and random sequence f2 the mutual aliasing of electromagnetic information, realize to electromagnetic information near password output pin pin Hide;
(3) crypto module electromagnetic information is broken up:User is interior when working fpga chip using FPGA exploitation softwares Department's circuit paths enter row constraint, and the gate circuit for carrying out crypto-operation will be concentrated to be distributed to logic array in original working region Edge, realize disperseing for the electromagnetic information concentrated originally to chip surface.
The present invention compared with prior art, has advantages below:
1. the present invention random output sequence of output frequency near chip password output pin, lets out password output pin The mutual aliasing of electromagnetic information of the electromagnetic information and random sequence f2 of dew, is realized to the small range electromagnetism near password output pin Information is disturbed, avoid password output pin in the prior art a small range leakage electromagnetic information the defects of, effectively Improve the security of crypto chip.
Interior door circuit paths enter row constraint when 2. the present invention is by working fpga chip, by original working region Zhong Ji The middle part for carrying out crypto-operation is distributed to the edge of logic array, realizes and concentrates electromagnetic information to divide originally chip surface Dissipate, avoid the electromagnetic information that chip surface crypto module working region is revealed in a small range in the prior art, further carry The high security of crypto chip.
Brief description of the drawings
Fig. 1 is the structural representation that the applicable electromagnetic information of the present invention hides system;
Fig. 2 is the implementation process figure of the present invention.
Fig. 3 crypto modules output sequence and the electromagnetic information reference picture for not making any processing
Fig. 4 crypto modules output sequence and crypto module add the electromagnetic information reference picture of random sequence
Fig. 5 does not carry out gate circuit path constraint crypto module working region electromagnetic information and after gate circuit path enters row constraint The electromagnetic information reference picture of crypto module working region
Embodiment
Below in conjunction with the drawings and specific embodiments, the present invention will be described in further detail:
Reference picture 1, the applicable electromagnetic information of the present invention, which hides system, includes random sequence interference module and crypto module electricity Magnetic information breaks up part;Random sequence interference module is made up of two frequency dividers and a random number generator, and frequency divider 1 is first FPGA input clocks are divided, random number generator produces the pseudo random number changed over time, and frequency divider 2 passes through random number The pseudo random number that maker obtains divides to the output clock that frequency divider 1 obtains.Crypto module electromagnetic information breaks up part, Interior door circuit paths enter row constraint when working fpga chip, and by being concentrated in original working region, the door for carrying out crypto-operation is electric Road is distributed to the edge of logic array.
Reference picture 2, the electromagnetic information hidden method based on random sequence interference and gate circuit constraint, comprises the following steps:
Step 1:Obtain random sequence f2:
Step 1a:FPGA input clock is divided, obtain frequency for crypto module trigger n times of clock frequency when Clock f1, wherein n >=20;
The implementation case is based on Xilinx FPGA exploitation versions and realized, utilizes Xilinx FPGA programming devices, Ke Huke With the circuit for quickly designing and verifying them, electromagnetism observation platform is built, electromagnetic probe, oscillograph, introduces FPGA exploitation versions Crystal oscillator clock be clk, clk=50MHz, triggered using rising edge and divide clk to obtain f1, the f1 frequencies are touched for crypto module The value of n times, n >=20, n of clock frequency of hair is relevant with the digit of following shift registers, and n value is smaller, the digit of register Fewer, the randomness of pseudo random number is poor, causes random sequence f2 randomnesss poor, and the implementation case takes n=64, crypto module triggering Clock frequency is 5KHz, using magnetic field near field probes, resolution ratio 10mm, crypto module output sequence and electromagnetic information reference picture 3, Top half is the electromagnetic information of crypto module, and the latter half is crypto module output sequence, finds the output in crypto module Electromagnetism has obvious pulse when sequence 0-1 changes, and electromagnetic information and crypto module list entries are mutually corresponding;
Step 1b:Computing is carried out to any nonlinear function using the shift register of setting, pseudo random number t is obtained, moves The getable greatest measure value of bit register institute is 2n;
Set 7 bit shift register ff, 27=2 × 64, pseudo random number t is generated using 7 bit register ff, first 7 are posted Storage ff assigns initial value ff=7 ' b1010011, pseudo random number t is obtained by the way of the lowest order linear operation of displacement, using f1 Rising edge triggering is updated to t:
T=ff [6]:Ff [6] value is assigned to t
Ff [6]=(ff [0] ^ff [1]) ^ (ff [2] ^~ff [3]) ^ (ff [4] ^~ff [5]):Ff [6] passes through above 6 Nonlinear operation obtains
Ff [5]=ff [4]:Ff [4] is assigned to ff [5]
Ff [4]=ff [3]:Ff [3] is assigned to ff [4]
Ff [3]=ff [2]:Ff [2] is assigned to ff [3]
Ff [2]=ff [1]:Ff [1] is assigned to ff [2]
Ff [1]=ff [0]:Ff [0] is assigned to ff [1]
Ff [0]=ff [6]:Ff [6] is assigned to ff [0]
Step 1c:Pseudo random number t is updated using with clock f1 identicals frequency, what is changed over time is random Number t ';
Step 1d:Clock f1 is divided using random number t ', obtains the random output sequence f2 of output sequence width, Using magnetic field near field probes, resolution ratio 10mm, crypto module output sequence and electromagnetic information reference picture 4, top half is password Module adds the electromagnetic information of random sequence, and the latter half is crypto module output sequence, and observation obtains:Add random sequence Electromagnetic information conceals the electromagnetic information of crypto module output sequence;
Step 2:The electromagnetic information near password output pin is disturbed using random sequence f2:
Using the output sequence f2 of frequency accidental as FPGA output sources, chip password output pin pin position is checked, and The output sequence f2 of frequency accidental output pin is set at the pin that pin pin closes on, reveals password output pin Electromagnetic information and random sequence f2 the mutual aliasing of electromagnetic information, realize to electromagnetic information near password output pin pin Hide;
Step 3:Crypto module electromagnetic information is broken up:User uses Xilinx FPGA exploitation softwares PlanAhead Interior door circuit paths when constraining chip operation, the distribution situation of gate circuit inside fpga chip is understood by software, will be original Concentrate the part for carrying out crypto-operation to be distributed to the edge of logic array in working region, realize and electromagnetic information is concentrated to script It is scattered, using the magnetic field near field probes of high-precision small range, resolution ratio 2mm probe detection, do not carried out gate circuit road Footpath constrains crypto module working region electromagnetic information and the electromagnetism letter of crypto module working region after row constraint is entered in gate circuit path Reference picture 5 is ceased, top half is not carry out gate circuit path constraint crypto module working region electromagnetic information, and the latter half is door Circuit paths enter the electromagnetic information of crypto module working region after row constraint, and observation is obtained after gate circuit constrains, realized The electromagnetic information concentrated to script it is scattered, it is ensured that realize crypto module when high-precision small range detects electromagnetic information it is hidden Hide.
Above-described embodiment only with the implementation method of the specific implementation explanation present invention, can there is various deformation on this basis, This structure change based on the present invention is all contained within protection scope of the present invention.

Claims (2)

1. a kind of electromagnetic information hidden method based on random sequence interference and gate circuit path constraint, it is characterised in that including such as Lower step:
(1) random sequence f2 is obtained:
(1a) divides to FPGA input clock, obtains the clock f1 that frequency triggers n times of clock frequency for crypto module, its Middle n >=20;
(1b) carries out computing using the shift register of setting to any nonlinear function, obtains pseudo random number t, shift register The getable greatest measure value of institute is 2n;
(1c) is used and pseudo random number t is updated with clock f1 identicals frequency, the random number t ' changed over time;
(1d) is divided using random number t ' to clock f1, obtains the random output sequence f2 of output frequency;
(2) electromagnetic information near password output pin is disturbed using random sequence f2:
Using the output sequence f2 of frequency accidental as FPGA output sources, chip password output pin pin position is checked, and incite somebody to action frequency The random output sequence f2 of rate output pin is set at the pin that pin pin closes on, the electricity for revealing password output pin The mutual aliasing of magnetic information and random sequence f2 electromagnetic information, realize and electromagnetic information near password output pin pin is hidden;
(3) crypto module electromagnetic information is broken up:User is using FPGA exploitation softwares, interior door when working fpga chip Circuit paths enter row constraint, the corner that the gate circuit for carrying out crypto-operation will be concentrated to be distributed to logic array in original working region Place, realize disperseing for the electromagnetic information concentrated originally to chip surface.
2. the electromagnetic information hidden method according to claim 1 based on random sequence interference and gate circuit constraint, it is special Sign is that interior door circuit paths when working fpga chip described in step (3) enter row constraint, is specially:For Altera development boards, directly sql files are modified and set, realize interior door circuit paths when working fpga chip Constraint, for xilinx development boards, interior door circuit paths when working fpga chip are directly realized by using PlanAhead softwares Constraint.
CN201710798830.7A 2017-09-07 2017-09-07 Electromagnetic information hiding method based on random sequence interference and gate circuit path constraint Active CN107577964B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710798830.7A CN107577964B (en) 2017-09-07 2017-09-07 Electromagnetic information hiding method based on random sequence interference and gate circuit path constraint

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710798830.7A CN107577964B (en) 2017-09-07 2017-09-07 Electromagnetic information hiding method based on random sequence interference and gate circuit path constraint

Publications (2)

Publication Number Publication Date
CN107577964A true CN107577964A (en) 2018-01-12
CN107577964B CN107577964B (en) 2019-12-31

Family

ID=61031106

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710798830.7A Active CN107577964B (en) 2017-09-07 2017-09-07 Electromagnetic information hiding method based on random sequence interference and gate circuit path constraint

Country Status (1)

Country Link
CN (1) CN107577964B (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109861818A (en) * 2019-03-06 2019-06-07 京东方科技集团股份有限公司 Encryption and decryption circuit, encryption and decryption device and encryption and decryption method
CN109885960A (en) * 2019-03-05 2019-06-14 中国人民解放军32082部队 A kind of embedded chip hardware Trojan horse design method based on electromagnetism bypass analysis
CN114760003A (en) * 2022-06-14 2022-07-15 北京密码云芯科技有限公司 Encryption protection device for electromagnetic perception attack and use method

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN201352349Y (en) * 2008-12-18 2009-11-25 成都立鑫新技术科技有限公司 Electronic information protector
CN104461452A (en) * 2013-09-17 2015-03-25 航天信息股份有限公司 Method and device for generating true random numbers in system on chip
CN105607687A (en) * 2015-12-22 2016-05-25 上海爱信诺航芯电子科技有限公司 Anti-bypass attack clock crosstalk realization method
US20160284195A1 (en) * 2015-03-26 2016-09-29 Bell Helicopter Textron Inc. Electrical load monitoring system

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN201352349Y (en) * 2008-12-18 2009-11-25 成都立鑫新技术科技有限公司 Electronic information protector
CN104461452A (en) * 2013-09-17 2015-03-25 航天信息股份有限公司 Method and device for generating true random numbers in system on chip
US20160284195A1 (en) * 2015-03-26 2016-09-29 Bell Helicopter Textron Inc. Electrical load monitoring system
CN105607687A (en) * 2015-12-22 2016-05-25 上海爱信诺航芯电子科技有限公司 Anti-bypass attack clock crosstalk realization method

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109885960A (en) * 2019-03-05 2019-06-14 中国人民解放军32082部队 A kind of embedded chip hardware Trojan horse design method based on electromagnetism bypass analysis
CN109861818A (en) * 2019-03-06 2019-06-07 京东方科技集团股份有限公司 Encryption and decryption circuit, encryption and decryption device and encryption and decryption method
WO2020177438A1 (en) * 2019-03-06 2020-09-10 Boe Technology Group Co., Ltd. Circuits for data encryption and decryption, and methods thereof
US11349650B2 (en) 2019-03-06 2022-05-31 Boe Technology Group Co., Ltd. Circuits for data encryption and decryption, and methods thereof
CN114760003A (en) * 2022-06-14 2022-07-15 北京密码云芯科技有限公司 Encryption protection device for electromagnetic perception attack and use method

Also Published As

Publication number Publication date
CN107577964B (en) 2019-12-31

Similar Documents

Publication Publication Date Title
Markettos et al. The frequency injection attack on ring-oscillator-based true random number generators
Baumgarten et al. A case study in hardware Trojan design and implementation
Alkatheiri et al. An experimental study of the state-of-the-art PUFs implemented on FPGAs
CN107577964A (en) Electromagnetic information hidden method based on random sequence interference and gate circuit path constraint
Guilley et al. Security evaluation of WDDL and SecLib countermeasures against power attacks
CN107994980B (en) DPA attack resisting method adopting clock disorder technology and chaotic trigger
Luo et al. A high-performance and secure TRNG based on chaotic cellular automata topology
Wang et al. A silicon PUF based entropy pump
Yao et al. M-RO PUF: a portable pure digital RO PUF based on MUX Unit
El-Moursy et al. Chaotic clock driven cryptographic chip: Towards a DPA resistant AES processor
Sangeetha et al. Authentication of symmetric cryptosystem using anti-aging controller-based true random number generator
Shiozaki et al. Simple electromagnetic analysis attacks based on geometric leak on an ASIC implementation of ring-oscillator PUF
Zhang et al. A high reliability physically unclonable function based on multiple tunable ring oscillator
Bahadur et al. Reconfigurable side channel attack resistant true random number generator
Thangam et al. A novel logic locking technique for hardware security
Kotipalli et al. Asynchronous Advanced Encryption Standard Hardware with Random Noise Injection for Improved Side‐Channel Attack Resistance
US9525457B1 (en) Spread spectrum clock generation using a tapped delay line and entropy injection
Tupparwar et al. A hybrid true random number generator using ring oscillator and digital clock manager
Gai et al. Attacking the edge-of-things: A physical attack perspective
Kulkarni et al. A study on physical unclonable functions based security for internet of things applications
Yevseiev et al. A HARDWARE CRYPTOSYSTEM BASED ON A RANDOM NUMBER GENERATOR WITH TWO TYPES OF ENTROPY SOURCES
Meka et al. Metastability Influenced PUF for cryptographic key generation: a FPGA Approach
CN105607687A (en) Anti-bypass attack clock crosstalk realization method
CN109522605A (en) Power consumption leakage type hardware Trojan horse based on AES encryption circuit
Hazari Design and Analysis of Assured and Trusted ICs using Machine Learning and Blockchain Technology

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant