CN112152780B - SEMA attack-preventing circuit to be tested safety simulation analysis method and device - Google Patents

SEMA attack-preventing circuit to be tested safety simulation analysis method and device Download PDF

Info

Publication number
CN112152780B
CN112152780B CN202011183709.1A CN202011183709A CN112152780B CN 112152780 B CN112152780 B CN 112152780B CN 202011183709 A CN202011183709 A CN 202011183709A CN 112152780 B CN112152780 B CN 112152780B
Authority
CN
China
Prior art keywords
key
information
unit
electromagnetic radiation
simulation
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202011183709.1A
Other languages
Chinese (zh)
Other versions
CN112152780A (en
Inventor
廖裕民
陈娇丽
刘承
骆飞
刘学
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Anjili New Technology Co ltd
Original Assignee
Shenzhen Anjili New Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Anjili New Technology Co ltd filed Critical Shenzhen Anjili New Technology Co ltd
Priority to CN202011183709.1A priority Critical patent/CN112152780B/en
Publication of CN112152780A publication Critical patent/CN112152780A/en
Application granted granted Critical
Publication of CN112152780B publication Critical patent/CN112152780B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/002Countermeasures against attacks on cryptographic mechanisms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/26Testing cryptographic entity, e.g. testing integrity of encryption key or encryption algorithm

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Tests Of Electronic Circuits (AREA)

Abstract

The invention provides a SEMA attack-preventing circuit to be tested safety simulation analysis method and device, wherein the device comprises the following steps: the key signal storage unit is used for storing the key signals and the path information corresponding to the key signals; the simulation circuit unit is used for receiving the test excitation information to perform simulation test; the key signal monitoring unit is used for monitoring the key signal according to the path information corresponding to the key signal during simulation test and recording current timestamp information when the change value of the key signal changes; the electromagnetic radiation calculation unit is used for calculating electromagnetic radiation simulation data of the circuit to be tested in the whole simulation process; and the electromagnetic radiation analysis unit is used for analyzing whether the electromagnetic radiation information corresponding to the same key signal in the change time zone has correlation or not, and if so, the relevant data are derived. Through the scheme, the safety simulation test of the chip can be simulated in the chip design stage, and electromagnetic radiation attack analysis can be automatically completed.

Description

SEMA attack-preventing circuit to be tested safety simulation analysis method and device
Technical Field
The invention relates to the field of chip circuit design, in particular to a SEMA attack-preventing circuit to be tested safety simulation analysis method and device.
Background
SSD data storage has evolved into the primary storage medium for consumer device data storage and cloud storage. For SSD data storage, the meaning of data error correction is significant, especially for personal critical data and government agency related data. The SSD main control chip is used as the brain of the SSD storage device, and the safety performance of the SSD main control chip directly determines the overall final safety performance of the SSD hard disk.
Side channel attacks are the primary hacking means, and SEMA attacks are one of the most common among side channel attacks. SEMA is a way based on electromagnetic radiation attack, and a hacker can infer the operation content of the current circuit to be tested by analyzing electromagnetic radiation information of the circuit to be tested when the circuit to be tested runs a key signal. There are many algorithms and methods for defending against electromagnetic radiation attack in the prior art, but the detailed verification is performed after the design of the test chip is completed. Therefore, the design of the electromagnetic radiation attack prevention verification simulation platform capable of being fast achieved is very significant.
Disclosure of Invention
Therefore, a technical scheme for security simulation analysis of a circuit to be tested for preventing SEMA attack is provided to solve the problem that simulation defense cannot be performed against electromagnetic radiation attack in the chip design process.
In order to achieve the above object, a first aspect of the present invention provides a SEMA attack prevention circuit to be tested safety simulation analysis device, the device includes:
the key signal storage unit is used for storing the key signals and the path information corresponding to the key signals;
the simulation circuit unit is used for receiving the test excitation information to perform simulation test; the test stimulus information includes the key signal;
the key signal monitoring unit is used for monitoring the key signal according to the path information corresponding to the key signal during simulation test, recording current time stamp information when the change value of the key signal changes, and storing the current time stamp information into the change time storage unit;
the electromagnetic radiation calculation unit is used for calculating electromagnetic radiation simulation data of the circuit to be tested in the whole simulation process and storing the electromagnetic radiation simulation data in the electromagnetic radiation information storage unit;
the electromagnetic radiation analysis unit is used for calculating a change time zone according to the timestamp information stored in the change time storage unit, outputting electromagnetic radiation information corresponding to the same key signal in the change time zone according to the electromagnetic radiation simulation data in the electromagnetic radiation information storage unit, analyzing whether the electromagnetic radiation information corresponding to the same key signal in the change time zone has correlation or not, and if so, deriving relevant data;
The change time zone refers to a difference time period between time stamp information of change of a change value of a current key signal and time stamp information of change of a change value of a last key signal in the same simulation test.
Further, the apparatus further comprises:
the simulation waveform storage unit is used for storing simulation waveform data obtained by the simulation test of the simulation circuit unit;
the logic synthesis unit is used for carrying out logic synthesis operation on the circuit to be tested to obtain netlist information;
an ICC layout wiring unit for calculating electromagnetic parameter file information according to the netlist information;
the electromagnetic radiation calculation unit is used for calculating electromagnetic radiation simulation data of the circuit to be measured in the whole simulation process, and comprises the following steps: the electromagnetic radiation calculation unit is used for acquiring the simulation waveform data and the electromagnetic parameter file information so as to calculate electromagnetic radiation simulation data of the circuit to be tested in the whole simulation process.
Further, the key signal monitoring unit comprises a mark inserting unit;
the mark inserting unit is used for setting a mark signal, inserting the mark signal into path information corresponding to the key signal, and recording current time stamp information when the value of the mark signal changes; the value of the marking signal is equal to the value of the key signal in real time.
The electromagnetic radiation analysis unit is used for extracting the marking signals and calculating a change time zone corresponding to the key signals according to the time stamp information of each marking signal.
Further, the apparatus further comprises:
a random number generation unit for generating a random number;
and the simulation excitation generating unit is used for generating test excitation information according to the random numbers generated by the random number generating unit and transmitting the test excitation information to the simulation circuit unit.
Further, the key signal includes a plurality of variation values;
the electromagnetic radiation analysis unit is used for judging that the electromagnetic radiation information of the key signal at a certain change value has correlation when the difference between the electromagnetic radiation information corresponding to the key signal at the certain change value and the electromagnetic radiation information corresponding to other change values is larger than a preset error.
Further, the key signal includes test key information; the device comprises:
a key generation unit for generating the test key information;
a key recording unit for storing the test key information;
and the electromagnetic radiation analysis unit is used for judging whether the electromagnetic radiation information of each test key information in the change time zone has correlation.
Further, the key generation unit includes:
the source data storage unit is used for storing encrypted source data, and the source data comprises a source key and a hierarchical key encryption and decryption algorithm;
the source data decryption unit is used for obtaining the encrypted source data to decrypt, obtaining a decrypted source key and a decrypted hierarchical key encryption and decryption algorithm, sending the decrypted source key to the root key operation unit, and storing the decrypted hierarchical key encryption and decryption algorithm in the algorithm information storage unit;
a hierarchical information storage unit for storing hierarchical key information and user identification information;
the root key operation unit is used for acquiring the user identification information and the decrypted source key, and carrying out hash operation on the user identification information according to the decrypted source key to obtain root key information;
and the hierarchical operation decryption unit is used for acquiring the hierarchical key encryption and decryption algorithm, the hierarchical key information and the root key information, and decrypting the hierarchical key information by applying the root key information by adopting the hierarchical key encryption and decryption algorithm to obtain the test key information.
Further, the hierarchical information storage unit is further configured to store handshake request information and handshake response information;
The key generation unit includes:
the handshake decryption operation circuit is used for decrypting the test key information by adopting the test key information to obtain handshake encryption key information;
the handshake encryption operation circuit is used for receiving the handshake request information and encrypting the handshake request information by adopting the handshake encryption key information to obtain handshake encryption information;
the handshake information checking circuit is used for acquiring the handshake response information and the handshake encryption information, judging whether the handshake response information and the handshake encryption information are matched, and if yes, checking and storing the test key information in the key recording unit; otherwise, checking is not passed, and the test key information is not stored in the key recording unit.
The second aspect of the present invention also provides a SEMA attack prevention circuit to be tested safety simulation analysis method, the method is applied to the device according to the first aspect of the present invention, the method comprises the following steps:
the key signal storage unit stores key signals and path information corresponding to the key signals;
the logic synthesis unit performs logic synthesis operation on the circuit to be tested to obtain netlist information;
the simulation circuit unit receives the test excitation information to perform simulation test; the test stimulus information includes the key signal;
The key signal monitoring unit monitors the key signal according to the path information corresponding to the key signal during simulation test, records current time stamp information when the change value of the key signal changes, and stores the current time stamp information into the change time storage unit;
the electromagnetic radiation analysis unit calculates a change time zone according to the timestamp information stored in the change time storage unit, outputs electromagnetic radiation information corresponding to the same key signal in the change time zone according to the electromagnetic radiation simulation data in the electromagnetic radiation information storage unit, analyzes whether the electromagnetic radiation information corresponding to the same key signal in the change time zone has correlation or not, and derives relevant data if the electromagnetic radiation information corresponding to the same key signal in the change time zone has correlation;
the key signal comprises a plurality of change values, and the analyzing whether the electromagnetic radiation information corresponding to the same key signal in the change time zone has correlation comprises the following steps:
if the difference between the electromagnetic radiation information corresponding to the change time zone when the key signal is a certain change value and the electromagnetic radiation information corresponding to other change values in the change time zone is larger than a preset error, judging that the electromagnetic radiation information of the key signal is relevant when the key signal is the change value;
The change time zone refers to a difference time period between time stamp information of change of a change value of a current key signal and time stamp information of change of a change value of a last key signal in the same simulation test.
Further, the key signal includes test key information, the test key information is generated by a key generation unit, the key generation unit includes a source data storage unit, a source data decryption unit, a hierarchy information storage unit, a root key operation unit and a hierarchy operation decryption unit;
the method comprises the following steps:
the source data storage unit stores encrypted source data, wherein the source data comprises a source key and a hierarchical key encryption and decryption algorithm;
the source data decryption unit obtains encrypted source data to decrypt, obtains a decrypted source key and a decrypted hierarchical key encryption and decryption algorithm, sends the decrypted source key to the root key operation unit, and stores the decrypted hierarchical key encryption and decryption algorithm in the algorithm information storage unit;
the hierarchical information storage unit stores hierarchical key information and user identification information;
the root key operation unit obtains the user identification information and the decrypted source key, and carries out hash operation on the user identification information according to the decrypted source key to obtain root key information;
And the hierarchical operation decryption unit acquires the hierarchical key encryption and decryption algorithm, the hierarchical key information and the root key information, and decrypts the hierarchical key information by applying the root key information to the hierarchical key encryption and decryption algorithm to obtain the test key information.
Compared with the prior art, the SEMA attack prevention circuit to be tested safety simulation analysis method and device provided by the technical scheme comprise the following steps: the key signal storage unit is used for storing the key signals and the path information corresponding to the key signals; the simulation circuit unit is used for receiving the test excitation information to perform simulation test; the key signal monitoring unit is used for monitoring the key signal according to the path information corresponding to the key signal during simulation test and recording current timestamp information when the change value of the key signal changes; the electromagnetic radiation calculation unit is used for calculating electromagnetic radiation simulation data of the circuit to be tested in the whole simulation process; and the electromagnetic radiation analysis unit is used for analyzing whether the electromagnetic radiation information corresponding to the same key signal in the change time zone has correlation or not, and if so, the relevant data are derived. Through the scheme, the safety simulation test of the chip can be simulated in the chip design stage, and electromagnetic radiation attack analysis can be automatically completed.
Drawings
FIG. 1 is a schematic diagram of a SEMA attack-proof circuit to be tested safety simulation analysis device according to an embodiment of the present invention;
FIG. 2 is a schematic diagram of a SEMA attack-proof circuit to be tested safety simulation analysis device according to another embodiment of the present invention;
fig. 3 is a schematic diagram of a key generation unit according to an embodiment of the present invention;
fig. 4 is a schematic diagram of a key generation unit according to another embodiment of the present invention;
FIG. 5 is a flowchart of a SEMA attack prevention circuit to be tested security simulation analysis method according to an embodiment of the present invention;
FIG. 6 is a flowchart of a SEMA attack prevention circuit to be tested security simulation analysis method according to another embodiment of the present invention;
fig. 7 is a schematic diagram of a drawing unit according to an embodiment of the invention.
Reference numerals illustrate:
101. a key signal storage unit;
102. a simulation circuit unit;
103. a key signal monitoring unit; 201. a mark insertion unit;
104. an electromagnetic radiation analysis unit;
105. a random number generation unit;
106. a simulation excitation generation unit;
107. a drawing unit;
108. a key generation unit;
109. a key recording unit.
110. An electromagnetic radiation calculation unit;
111. An electromagnetic radiation information storage unit;
112. a change time storage unit;
113. a circuit to be tested;
114. a logic synthesis unit;
115. netlist information;
116. an ICC layout wiring unit;
118. electromagnetic parameter file information;
119. a simulation waveform storage unit;
301. a source data storage unit;
302. a source data decryption unit;
303. an algorithm information storage unit;
304. a hierarchy information storage unit;
305. a root key operation unit;
306. a hierarchical decryption operation unit; 3061. a first-stage decryption operation unit; 3062. a secondary decryption operation unit; 3063. a three-stage decryption operation unit;
307. a handshake decryption operation circuit; 3071. a first-stage handshake decryption operation circuit; 3072. a secondary handshake decryption operation circuit; 3073. a three-stage handshake decryption operation circuit;
308. a handshake encryption operation circuit; 3081. a primary handshake encryption operation circuit; 3082. a two-stage handshake encryption operation circuit; 3083. a three-stage handshake encryption operation circuit;
309. a handshake information checking circuit;
310. a key selection unit;
311. an algorithm selection unit; 3111. a first-order algorithm selection unit; 3112. a second-level algorithm selection unit; 3113. and a three-stage algorithm selection unit.
Detailed Description
In order to describe the technical content, constructional features, achieved objects and effects of the technical solution in detail, the following description is made in connection with the specific embodiments in conjunction with the accompanying drawings.
As shown in fig. 1, the first aspect of the present invention provides a SEMA attack prevention circuit to be tested safety simulation analysis device, which includes:
the key signal storage unit 101 is configured to store the key signal and path information corresponding to the key signal. The key signal refers to data to be monitored safely, and is a series of machine codes consisting of 0 or 1 for a computer, which can be key information or security data with higher importance. The path information refers to a set of executable paths of the key signals, and the change condition of the key signals can be timely detected by selecting proper test cases, so that the key signals are collected and analyzed.
In the present embodiment, the key signal and the path information corresponding to the key signal may be obtained by: before the simulation test starts, the circuit to be tested (such as a main control chip to be tested) is firstly subjected to one-time RTL test design, the circuit to be tested of the RTL design is used as an input file to enable the simulation analysis platform to start working, and key signals in the RTL design and path information corresponding to the signals are written into the key signal storage unit 101.
The simulation circuit unit 102 is used for receiving the test excitation information to perform simulation test; the test stimulus information includes the key signal. The test stimulus information refers to a test case, which refers to a set of test inputs, execution conditions, and expected results programmed for a particular target, to verify whether a particular software requirement is met. The simulation circuit unit 102 may be implemented by simulation circuit tools, such as a VCS simulation tool and a modelsim simulation tool.
The key signal monitoring unit 103 is configured to monitor the key signal according to the path information corresponding to the key signal during the simulation test, record current timestamp information when the change value of the key signal changes, and store the current timestamp information in the change time storage unit 112.
When the key signal is executed according to the corresponding path information, if the key signal is changed (for example, from 0 to 1), the current time stamp information is recorded, and the correlation of the key signal on each change type can be analyzed by screening the time stamp information of the key signal change in the later stage, so that whether the key signal is attacked or not is judged.
The electromagnetic radiation calculating unit 110 is configured to calculate electromagnetic radiation simulation data of the circuit to be tested in the whole simulation process, and store the electromagnetic radiation simulation data in the electromagnetic radiation information storage unit 111.
The electromagnetic radiation analysis unit 104 is configured to calculate a change time zone according to the timestamp information stored in the change time storage unit 112, output electromagnetic radiation information corresponding to the same key signal in the change time zone according to the electromagnetic radiation simulation data in the electromagnetic radiation information storage unit 111, and analyze whether there is a correlation in the electromagnetic radiation information corresponding to the same key signal in the change time zone, and if so, derive relevant data. The change time zone refers to a difference time period between the time stamp information of the change of the current key signal and the time stamp information of the previous change of the key signal.
For example, when the electromagnetic radiation information (i.e. the electromagnetic radiation value) corresponding to the variation type of a certain key signal is significantly higher or lower than that of other variation types, it can be determined that the electromagnetic radiation information corresponding to the key signal has a correlation on the variation types, that is, the key signal has a possibility of being attacked by electromagnetic radiation (a means for detecting key data through electromagnetic radiation differences) in the simulation process, and then the key signal of the variation type and the electromagnetic radiation time value corresponding to the key signal are uniformly recorded for further analysis by a technician.
Through the scheme, the safety simulation test of the chip can be simulated at the early stage of chip design, specifically, the performance of the main control chip is detected through various test cases, and the main control chip mainly comprises electromagnetic radiation detection when key signals change, so that an electromagnetic radiation attack mode is adopted for effectively early warning a hacker, and the analysis efficiency is greatly improved.
As shown in fig. 2, in some embodiments, the apparatus further comprises:
the simulation waveform storage unit 119 is used for storing simulation waveform data obtained by performing a simulation test on the simulation circuit unit 102. The simulation circuit unit 102 simulates the behavior of the circuit 113 to be tested under excitation information to obtain an RTL simulation waveform (i.e., simulation waveform data).
And the logic synthesis unit 114 is used for performing logic synthesis operation on the circuit to be tested to obtain netlist information.
The logical Synthesis (Logic Synthesis) refers to the process of converting the hdl code of the register transfer level (RTL, register Transfer Level) to a process-related gate level netlist (Gate Level Netlist). The logic synthesis unit 114 may be implemented by a DC synthesis tool, which synthesizes DC (Design Compiler) RTL codes of the circuit to be tested after the simulation circuit unit starts to operate, to generate netlist information 115. The netlist information 115 includes, but is not limited to, any one or more of the following: netlist files, SDF (standard delay files), SVF files (containing RTL to netlist mapping information), etc.
An ICC place and route unit 116 for calculating electromagnetic parameter file information 118 from the netlist information. After the simulation analysis platform starts to work, the logic synthesis unit 114 performs synthesis operation on the RTL code of the circuit to be tested, and then completes the chip back end design through the ICC layout wiring unit, so as to generate electromagnetic parameter file information 118, where the electromagnetic parameter file information 118 includes any one or more of a GDS chip layout file, an SVF file (including mapping information from RTL to netlist), an extracted chip wire and dielectric material parameter file, and an extracted chip power supply parameter file.
And an electromagnetic radiation calculating unit 110, configured to obtain the simulation waveform data and the electromagnetic parameter file information 118 in the simulation waveform storage unit 119, so as to calculate electromagnetic radiation simulation data of the circuit to be tested in the whole simulation process.
Electromagnetic radiation calculation unit 110 may be implemented with an electromagnetic radiation analysis tool, which may be ANSYS, ANSOFT, sigNoise or the like.
After the RTL simulation waveform is obtained, the electromagnetic radiation analysis tool starts electromagnetic radiation analysis, and specifically receives GDS chip layout files, SDF files, SVF files, extracted chip lead and dielectric material parameter files, extracted chip power supply parameter files, the RTL simulation waveform and standard library unit information of a foundry. And then the electromagnetic radiation analysis tool maps the simulation waveform node of the RTL to the circuit unit on the GDS layout based on the mapping information of the circuit unit on the GDS layout stored in the SVF file, then models all the wires and the mediums of the chip according to the extracted wire and medium material parameter file and the electromagnetic radiation information of the standard library unit of the foundry, finally obtains the power excitation parameters of the chip signal through the extracted chip power parameter file, thereby obtaining the electromagnetic radiation simulation data of the whole simulation process, and stores the obtained electromagnetic radiation information into the electromagnetic radiation information storage unit 111.
In certain embodiments, the apparatus further comprises: and the drawing unit 107 is used for generating a visual chart according to the electromagnetic radiation information corresponding to each key signal. Therefore, a tester can intuitively see whether the electromagnetic radiation information of each key signal has correlation or not through the generated chart, and further analyze whether the current circuit to be tested is possibly attacked by the electromagnetic radiation or not when the electromagnetic radiation information of each key signal has correlation, so that the test analysis efficiency is effectively improved.
As shown in fig. 2, in some embodiments, the key signal monitoring unit 103 includes a tag insertion unit 201; the tag inserting unit 201 is configured to set a tag signal, insert the tag signal into path information corresponding to the key signal, and record current timestamp information when a value of the tag signal changes; the value of the marking signal is equal to the value of the key signal in real time. The electromagnetic radiation analysis unit 104 is configured to extract the marking signals, and calculate a change time zone corresponding to the key signal according to timestamp information of each marking signal.
In the practical application process, the key signal monitoring unit 103 may add a key signal monitoring component to the verification platform of circuit simulation (i.e. the aforementioned "simulation circuit unit") according to the current position of the key signal, for example, for the key signal a with path_x, the monitoring component may be configured to:
wait(path_x.a==1’b1)$display_time;
Thus, the key signal a in the path_x can be printed with the current simulation time when the value of the key signal a is 1. Of course, the judgment condition in the path information may be changed to (path_ x.a = 0' b 1) $display_time, and this means that when the value of the key signal a is 0, the current simulation time is printed.
The tag insertion unit 201 is then responsible for time-stamping the key signals, and the specific components are configured as follows:
wait(path_x.a==1’b1)set flag_a=1’b1;
thus, the mark signal a is marked as 1 when the value of a of the path_x is 1, namely the value of the mark signal is equal to the value of the key signal in real time. After the excitation information to be tested is traversed, the values of all the marking signals are searched and called, so that the change condition of the values of all the key signals can be clearly known.
In certain embodiments, the apparatus further comprises:
a random number generation unit 105 for generating a random number. Preferably, the random number generation unit generates a random number at regular intervals, and the generated random number is random, so that the excitation generated by the simulation excitation generation unit is also completely random.
And a simulation excitation generating unit 106, configured to generate test excitation information according to the random number generated by the random number generating unit, and transmit the test excitation information to the simulation circuit unit 102. The random number is used as an influence factor for influencing the generation of the test excitation information, so that the randomness of the generation of the test excitation information can be ensured, and the operation process of the main control chip in each application scene is simulated. In order to ensure that the test stimulus information covers as much as possible all possible occurrences, the number of random numbers generated by the random number generating unit 105 is also sufficiently large (exceeds a preset number) in the present embodiment.
In some embodiments, the key signal includes a plurality of variation values, such as including two variation values of "0" and "1". The electromagnetic radiation analysis unit 104 is configured to determine that the electromagnetic radiation information of the key signal at a certain variation value has a correlation when the difference between the electromagnetic radiation information corresponding to the key signal at the variation value and the electromagnetic radiation information corresponding to other variation values is greater than a preset error.
For example, the key signal is test key information, the test key information is a value of 8 bits, and the electromagnetic radiation information value of the change time zone corresponding to each bit is shown in table 1
Key value 0 1 0 1 1 0 0 1
Electromagnetic radiation (uT) 3.9 8 3 8.5 7.8 3.2 2.5 9
TABLE 1 electromagnetic radiation information value table of variation time zone corresponding to each bit
As can be seen from table 1, when the bit value of the key information is 1, for example, the 2 nd bit, the 4 th bit, the 5 th bit and the 8 th bit in table 1, the corresponding electromagnetic radiation information values are obviously higher than the electromagnetic radiation information when the bit value is 0, that is, the key information can be judged to have correlation on the electromagnetic radiation information in the time zone from 0 to 1, and the tester can further analyze the possibility of electromagnetic radiation attack of the current main control chip.
For example, the preset error may be set to be 30% of the ratio of the average value of the electromagnetic radiation information values of the variation values of a certain key signal to the average value of the electromagnetic radiation information of other variation values, taking the data in table 1 as an example, when the key value in table 1 is 1, the electromagnetic radiation information appears about 8uT for many times, while the average value of the other key values is only 2.6uT, the ratio between the two appears 307.6% that is, the difference is far greater than the preset error, so that it can be considered that when the variation value of the key signal is 1 (from other values to 1), the key signal has obvious correlation on the variation value. Of course, the preset error may be set according to actual needs, for example, the difference between the two electromagnetic radiation values of the two variation types is set to be within 2uT, or the ratio between the two is set to be below 50%, or the like.
In order to enable a tester to more intuitively acquire a simulation result, as shown in fig. 7, according to each Bit value of key information and electromagnetic radiation information corresponding to the bits in the simulation process recorded in table 1, a broken line change chart is generated, wherein the horizontal axis in fig. 7 represents a key signal value (such as a key value corresponding to each Bit of the key information) and the vertical axis represents a corresponding electromagnetic radiation value. From fig. 7, it can be intuitively seen whether the change of the key value and the electromagnetic radiation have a linear correlation, if there is a correlation, it is indicated that the chip to be tested is likely to be found by a hacker in the process of performing operation so as to crack the security information, and the tester can further optimize the correlation design to improve the overall security performance of the chip.
In certain embodiments, the critical signal comprises test key information; the device comprises:
a key generation unit 108 for generating the test key information;
a key recording unit 109 for storing the test key information;
and the electromagnetic radiation analysis unit 104 is configured to acquire the test key information, and determine whether there is a correlation between the electromagnetic radiation information of each test key information in the change time zone.
The key information is used as a data encryption and decryption tool and is a key ring of chip security simulation. Therefore, in the embodiment, besides monitoring some key data, key information change is also monitored in a key mode, so that a tester can timely work when the key is attacked by electromagnetic radiation. The specific method is that the electromagnetic radiation information of each test key information is also monitored, and prompt information is output when the electromagnetic radiation information of a certain type of key information is judged to be associated. The prompt information comprises one or more of voice prompt information, image prompt information, light prompt information and video prompt information.
In order to further secure the key information used by the chip in the operation process, the present application designs a special key generation unit 108 to generate key information required for the operation. As shown in fig. 3, the key generation unit 108 according to the present application includes:
The source data storage unit 301 is configured to store encrypted source data, where the source data includes a source key and a hierarchical key encryption and decryption algorithm. In this embodiment, the source data storage unit 301 is an OTP storage unit (i.e. one-time programmable unit), so that the source data can be effectively prevented from being tampered with. In order to prevent a hacker from directly obtaining the source data from the source data storage unit 301, the source data is encrypted and then stored in the OTP storage unit in the present application, and an initial key used for encryption may be stored in other storage units, so as to improve the security of source data storage. The hierarchical key encryption and decryption algorithm is an algorithm selected when data encryption and decryption are carried out later, and specifically can comprise any one or more of an aes algorithm, a tdes algorithm and a sm4 algorithm.
The source data decryption unit 302 is configured to obtain the encrypted source data, decrypt the encrypted source data, obtain a decrypted source key and a decrypted hierarchical key encryption and decryption algorithm, send the decrypted source key to the root key operation unit, and store the decrypted hierarchical key encryption and decryption algorithm in the algorithm information storage unit 303.
The hierarchical information storage unit 304 is used for storing the hierarchical key information and the user identification information.
And the root key operation unit 305 is configured to obtain the user identification information and the decrypted source key, and perform hash operation on the user identification information according to the decrypted source key to obtain root key information. The root key information is obtained by carrying out hash operation on the user identification information through the decrypted source key, so that the consistency of the source key and the bit number of the generated root key can be ensured, meanwhile, the adopted keys are different after the chip receives different user logins, and the security is further improved. The user identification information is an ID for distinguishing different users, and may be a string of characters, for example.
And the hierarchical decryption operation unit 306 is configured to obtain the hierarchical key encryption and decryption algorithm, the hierarchical key information and the root key information, and decrypt the hierarchical key information by applying the root key information to the hierarchical key encryption and decryption algorithm, thereby obtaining the test key information. In this way, the decryption algorithm in the test key information generation process comes from the hierarchical key encryption and decryption algorithm in the algorithm information storage unit 303, and is screened by the algorithm selection unit 311. The decrypted object is hierarchical key information, the decrypted key is root key information, and the decrypted key and the root key information come from different units respectively, so that the security of the generated test key information is further improved.
In order to prevent the test key information from being intercepted and tampered during the generation process, in the present embodiment, the hierarchical information storage unit is further configured to store handshake request information and handshake response information, and the key generation unit 108 includes:
and the handshake decryption operation circuit 307 is configured to decrypt the test key information by using the test key information to obtain handshake encryption key information. The test key information is easy to intercept or tamper in the transmission process, but after the test key information is firstly used for decrypting the test key information, the difficulty of reverse cracking of a hacker is exponentially increased, so that the test key information is firstly used for decrypting the test key information before data verification is carried out, and handshake encryption key information is obtained.
And the handshake encryption operation circuit 308 is configured to receive the handshake request information, and encrypt the handshake request information with the handshake encryption key information to obtain handshake encryption information. The handshake request information may be stored in the hierarchical information storage unit 304 in advance, where the handshake request information refers to information to be verified, and may obtain handshake encryption information after being encrypted by the handshake encryption key information.
The handshake information checking circuit 309 is configured to obtain the handshake response information and the handshake encryption information, and determine whether the handshake response information and the handshake encryption information are matched, if yes, check the test key information, and store the test key information in the key recording unit; otherwise, checking is not passed, and the test key information is not stored in the key recording unit. The handshake response information refers to check standard information that is stored in the hierarchical information storage unit 304 in advance and is obtained after the handshake request information is encrypted. By comparing the handshake response information with the handshake encryption information, whether the current test key information is tampered or not can be deduced, and if the handshake response information and the handshake encryption information are matched, the test key information can be output.
As shown in fig. 4, in order to enable the use of functions with different rights when different users use the chip to be tested, in this embodiment, different levels may be set for the key information when different users use the chip to be tested, that is, the key generating unit may generate the key information to be tested of the corresponding level according to the security level of the user, and the higher the level, the higher the security of the key information to be tested.
Taking three security levels as key levels for example, the apparatus comprises a key selection unit 310. The decryption operation units comprise a primary decryption operation unit 3061, a secondary decryption operation unit 3062 and a tertiary decryption operation unit 3063. The handshake decryption operation circuit includes a primary handshake decryption operation circuit 3071, a secondary handshake decryption operation circuit 3072, and a tertiary handshake decryption operation circuit 3073. The handshake encryption operation circuit comprises a primary handshake encryption operation circuit 3081, a secondary handshake encryption operation circuit 3082 and a tertiary handshake encryption operation circuit 3083. The algorithm information storage unit 303 is provided with a plurality of encryption and decryption algorithms, including a primary encryption and decryption algorithm, a secondary encryption and decryption algorithm, and a tertiary encryption and decryption algorithm, and sequentially selects by a primary algorithm selection unit 3111, a secondary algorithm selection unit 3112, and a tertiary algorithm selection unit 3113. The hierarchical key information includes a first layer source key, a second layer source key, and a third layer source key.
The key generation unit 108 described in fig. 4 operates as follows: the key generating unit 108 obtains the current user class, and outputs a test key matched with the user class to the key recording unit 109 through the key selecting unit 310, and if the user class has three classes, the key selecting unit 310 sequentially selects a primary key, a secondary key and a tertiary key for output, wherein the security class of the tertiary key is greater than that of the secondary key, and the security class of the secondary key is greater than that of the primary key.
The primary key is generated as follows:
the source data decryption unit 302 obtains the source key and the hierarchical key encryption and decryption algorithm encrypted in the source data storage unit 301 to decrypt, obtains the source key and the hierarchical key encryption and decryption algorithm decrypted, sends the source key decrypted to the root key operation unit 305, and stores the hierarchical key encryption and decryption algorithm decrypted in the algorithm information storage unit 303. And the root key operation unit acquires the user identification information and the decrypted source key, and carries out hash operation on the user identification information according to the decrypted source key to obtain root key information.
The next-stage decryption operation unit 3061 receives the first-layer source key of the hierarchical information storage unit 304, and the first-stage algorithm selection unit 3111 selects a first-stage key encryption and decryption algorithm to the first-stage decryption operation unit 3061, so that the first-stage decryption operation unit 3061 decrypts the first-layer source key by applying the root key information with the first-stage key encryption and decryption algorithm, and obtains the first-stage key. The key selection unit 310 may select the primary key output if the security level of the current user is primary.
Before outputting, in order to prevent the primary key from being tampered in the transmission process, the generated primary key needs to be checked, specifically, the primary key is encrypted once by the primary handshake decryption operation circuit 3071, so as to obtain primary handshake encryption key information. And then, the first-layer handshake request data transmitted by the hierarchical information storage unit 304 is received by the first-layer handshake encryption operation circuit 3081, and the first-layer handshake request data is encrypted by adopting the first-layer handshake encryption key information, so as to obtain first-layer handshake encryption information. And then receiving the first-layer handshake response data transmitted by the hierarchical information storage unit 304, comparing the first-layer handshake response data with the first-layer handshake encryption information, if the first-layer handshake response data and the first-layer handshake encryption information are matched, the first-layer handshake encryption information indicates that the primary secret key is not tampered, the first-layer handshake encryption information can be output through the secret key selection unit 310, otherwise, prompt information can be sent.
The secondary key is generated as follows:
the generation process of the secondary key is similar to that of the primary key, except that the primary key is used as an input parameter (corresponding to a root key input during generation of the primary key) of the secondary key generation, specifically, the secondary decryption operation unit 3062 receives the second layer source key of the hierarchical information storage unit 304, and the secondary algorithm selection unit 3112 selects a secondary key encryption and decryption algorithm to the secondary decryption operation unit 3062, so that the secondary decryption operation unit 3062 uses the secondary key encryption and decryption algorithm to decrypt the second layer source key by applying the primary key to obtain the secondary key. The key selection unit 310 may select the secondary key output if the security level of the current user is secondary.
Before outputting, in order to prevent the secondary key from being tampered in the transmission process, the generated secondary key needs to be checked, specifically, the secondary key is encrypted once by using the secondary key through the secondary handshake decryption operation circuit 3072, so as to obtain secondary handshake encryption key information. And then, the second-layer handshake request data transmitted by the hierarchical information storage unit 304 is received by the second-layer handshake encryption operation circuit 3082, and the second-layer handshake request data is encrypted by adopting the second-layer handshake encryption key information, so as to obtain second-layer handshake encryption information. And then receiving the second-layer handshake response data transmitted by the hierarchical information storage unit 304, comparing the second-layer handshake response data with the second-layer handshake encryption information, if the second-layer handshake response data and the second-layer handshake encryption information are matched, the second-layer handshake encryption information indicates that the second-layer secret key is not tampered, the second-layer handshake encryption information can be output through the secret key selection unit 310, otherwise, prompt information can be sent.
The three-level key generation process is as follows:
the generation process of the tertiary key is similar to that of the secondary key, except that the secondary key is used as an input parameter (corresponding to the primary key input during the generation of the secondary key) of the tertiary key generation, specifically, the tertiary decryption operation unit 3063 receives the third layer source key of the hierarchical information storage unit 304, and the tertiary algorithm selection unit 3113 selects the tertiary key encryption and decryption algorithm to the tertiary decryption operation unit 3063, so that the tertiary decryption operation unit 3063 uses the tertiary key encryption and decryption algorithm to decrypt the third layer source key by applying the secondary key to obtain the tertiary key. The key selection unit 310 may select the tertiary key output if the security level of the current user is tertiary.
Before outputting, in order to prevent the tertiary key from being tampered in the transmission process, the generated tertiary key needs to be checked, specifically, the tertiary key is encrypted once by the tertiary handshake decryption operation circuit 3073 by using the tertiary key, so as to obtain the information of the tertiary handshake encryption key. And then, the third-layer handshake request data transmitted by the hierarchical information storage unit 304 is received by the three-layer handshake encryption operation circuit 3083, and the third-layer handshake request data is encrypted by adopting the three-layer handshake encryption key information, so as to obtain third-layer handshake encryption information. And then receiving the third-layer handshake response data transmitted by the hierarchical information storage unit 304, comparing the third-layer handshake response data with the third-layer handshake encryption information, if the third-layer handshake response data and the third-layer handshake encryption information are matched, the third-layer handshake encryption information indicates that the third-layer secret key is not tampered, the third-layer handshake encryption information can be output through the secret key selection unit 310, and otherwise, prompt information can be sent.
Of course, in other embodiments, the number of the user levels may also be other values, such as two security levels or more than four security levels, and correspondingly, the level of the test key information may also be other numbers, which are set specifically according to actual needs. When the level of the test key information is other, the method of generating the test key information can refer to the circuit application process shown in fig. 4, which is not described herein.
As shown in fig. 5, a SEMA attack prevention circuit to be tested safety simulation analysis method is applied to the device in the first aspect of the application, and the method includes the following steps:
firstly, entering step S501, a key signal storage unit stores key signals and path information corresponding to the key signals;
then, the step S502 is entered, and the simulation circuit unit receives the test excitation information to perform simulation test; the test stimulus information includes the key signal;
then, step S503 is entered, when the key signal monitoring unit is in simulation test, the key signal is monitored according to the path information corresponding to the key signal, when the change value of the key signal changes, the current time stamp information is recorded, and the current time stamp information is stored in the change time storage unit;
then, step S504 is carried out, an electromagnetic radiation calculation unit calculates electromagnetic radiation simulation data of the circuit to be tested in the whole simulation process, and the electromagnetic radiation simulation data are stored in an electromagnetic radiation information storage unit;
then, step S505 is entered, an electromagnetic radiation analysis unit calculates a change time zone according to the timestamp information stored in the change time storage unit, electromagnetic radiation information corresponding to the same key signal in the change time zone is output according to electromagnetic radiation simulation data in the electromagnetic radiation information storage unit, whether the electromagnetic radiation information corresponding to the same key signal in the change time zone has correlation or not is analyzed, and if so, related data is derived; the change time zone refers to a difference time period between the time stamp information of the change of the current key signal and the time stamp information of the previous change of the key signal.
In some embodiments, the key signal includes test key information generated by a key generation unit including a source data storage unit, a source data decryption unit, a hierarchy information storage unit, a root key operation unit, and a hierarchy operation decryption unit;
as shown in fig. 6, the method comprises the steps of:
first, step S601 is performed, where the source data storage unit stores encrypted source data, where the source data includes a source key and a hierarchical key encryption and decryption algorithm.
And then, the step S602 of the source data decryption unit obtaining the encrypted source data to decrypt, obtaining a decrypted source key and a decrypted hierarchical key encryption and decryption algorithm, sending the decrypted source key to the root key operation unit, and storing the decrypted hierarchical key encryption and decryption algorithm in the algorithm information storage unit.
In parallel with step S601 and step S602, step S603 may be entered in which the hierarchical information storage unit stores the hierarchical key information and the user identification information;
step S602 and step S603 may be followed by entering step S604, where the root key operation unit obtains the user identification information and the decrypted source key, and performs hash operation on the user identification information according to the decrypted source key, so as to obtain root key information.
Step S604 may be followed by entering step S605, where the hierarchical decryption operation unit obtains the hierarchical key encryption and decryption algorithm, the hierarchical key information and the root key information, and uses the hierarchical key encryption and decryption algorithm to decrypt the hierarchical key information by applying the root key information, so as to obtain the test key information.
It should be noted that, although the foregoing embodiments have been described herein, the scope of the present invention is not limited thereby. Therefore, based on the innovative concepts of the present invention, alterations and modifications to the embodiments described herein, or equivalent structures or equivalent flow transformations made by the present description and drawings, apply the above technical solution, directly or indirectly, to other relevant technical fields, all of which are included in the scope of the invention.

Claims (9)

1. A SEMA attack prevention circuit to be tested safety simulation analysis device, characterized in that the device comprises:
the key signal storage unit is used for storing a key signal and path information corresponding to the key signal, wherein the key signal comprises a plurality of change values;
the simulation circuit unit is used for receiving the test excitation information to perform simulation test; the test stimulus information includes the key signal;
The key signal monitoring unit is used for monitoring the key signal according to the path information corresponding to the key signal during simulation test, recording current time stamp information when the change value of the key signal changes, and storing the current time stamp information into the change time storage unit;
the electromagnetic radiation calculation unit is used for calculating electromagnetic radiation simulation data of the circuit to be tested in the whole simulation process and storing the electromagnetic radiation simulation data in the electromagnetic radiation information storage unit;
the electromagnetic radiation analysis unit is used for calculating a change time zone according to the timestamp information stored in the change time storage unit, outputting electromagnetic radiation information corresponding to the same key signal in the change time zone according to the electromagnetic radiation simulation data in the electromagnetic radiation information storage unit, analyzing whether the electromagnetic radiation information corresponding to the same key signal in the change time zone has correlation or not, and if so, deriving relevant data;
the analyzing whether the electromagnetic radiation information corresponding to the same key signal in the change time zone has correlation comprises the following steps:
if the difference between the electromagnetic radiation information corresponding to the change time zone when the key signal is a certain change value and the electromagnetic radiation information corresponding to other change values in the change time zone is larger than a preset error, judging that the electromagnetic radiation information of the key signal is relevant when the key signal is the change value;
The change time zone refers to a difference time period between time stamp information of change of a change value of a current key signal and time stamp information of change of a change value of a last key signal in the same simulation test.
2. The SEMA attack resistant circuit under test security simulation analysis device of claim 1, further comprising:
the simulation waveform storage unit is used for storing simulation waveform data obtained by the simulation test of the simulation circuit unit;
the logic synthesis unit is used for carrying out logic synthesis operation on the circuit to be tested to obtain netlist information;
an ICC layout wiring unit for calculating electromagnetic parameter file information according to the netlist information;
the electromagnetic radiation calculation unit is used for calculating electromagnetic radiation simulation data of the circuit to be measured in the whole simulation process, and comprises the following steps: the electromagnetic radiation calculation unit is used for acquiring the simulation waveform data and the electromagnetic parameter file information so as to calculate electromagnetic radiation simulation data of the circuit to be tested in the whole simulation process.
3. The SEMA attack prevention circuit to be tested safety simulation analysis device according to claim 1, wherein the key signal monitoring unit comprises a mark inserting unit;
The mark inserting unit is used for setting a mark signal, inserting the mark signal into path information corresponding to the key signal, and recording current time stamp information when the value of the mark signal changes; the value of the marking signal is equal to the value of the key signal in real time;
the electromagnetic radiation analysis unit is used for extracting the marking signals and calculating a change time zone corresponding to the key signals according to the time stamp information of each marking signal.
4. The SEMA attack resistant circuit under test security simulation analysis device of claim 1, further comprising:
a random number generation unit for generating a random number;
and the simulation excitation generating unit is used for generating test excitation information according to the random numbers generated by the random number generating unit and transmitting the test excitation information to the simulation circuit unit.
5. The SEMA attack resistant circuit to be tested security simulation analysis device of claim 1, wherein the key signal comprises test key information; the device comprises:
a key generation unit for generating the test key information;
and the key recording unit is used for storing the test key information.
6. The SEMA attack resistant circuit to be tested security simulation analysis device according to claim 5, wherein the key generation unit comprises:
the source data storage unit is used for storing encrypted source data, and the source data comprises a source key and a hierarchical key encryption and decryption algorithm;
the source data decryption unit is used for obtaining the encrypted source data to decrypt, obtaining a decrypted source key and a decrypted hierarchical key encryption and decryption algorithm, sending the decrypted source key to the root key operation unit, and storing the decrypted hierarchical key encryption and decryption algorithm in the algorithm information storage unit;
a hierarchical information storage unit for storing hierarchical key information and user identification information;
the root key operation unit is used for acquiring the user identification information and the decrypted source key, and carrying out hash operation on the user identification information according to the decrypted source key to obtain root key information;
and the hierarchical operation decryption unit is used for acquiring the hierarchical key encryption and decryption algorithm, the hierarchical key information and the root key information, and decrypting the hierarchical key information by applying the root key information by adopting the hierarchical key encryption and decryption algorithm to obtain the test key information.
7. The SEMA attack resistant circuit to be tested security simulation analysis device according to claim 6, wherein the hierarchical information storage unit is further configured to store handshake request information and handshake response information;
the key generation unit includes:
the handshake decryption operation circuit is used for decrypting the test key information by adopting the test key information to obtain handshake encryption key information;
the handshake encryption operation circuit is used for receiving the handshake request information and encrypting the handshake request information by adopting the handshake encryption key information to obtain handshake encryption information;
the handshake information checking circuit is used for acquiring the handshake response information and the handshake encryption information, judging whether the handshake response information and the handshake encryption information are matched, and if yes, checking and storing the test key information in the key recording unit; otherwise, checking is not passed, and the test key information is not stored in the key recording unit.
8. The SEMA attack prevention circuit to be tested safety simulation analysis method is characterized by comprising the following steps of:
the key signal storage unit stores key signals and path information corresponding to the key signals;
The simulation circuit unit receives the test excitation information to perform simulation test; the test stimulus information includes the key signal;
the key signal monitoring unit monitors the key signal according to the path information corresponding to the key signal during simulation test, records current time stamp information when the change value of the key signal changes, and stores the current time stamp information into the change time storage unit;
the electromagnetic radiation calculation unit calculates electromagnetic radiation simulation data of the circuit to be tested in the whole simulation process, and stores the electromagnetic radiation simulation data in the electromagnetic radiation information storage unit;
the electromagnetic radiation analysis unit calculates a change time zone according to the timestamp information stored in the change time storage unit, outputs electromagnetic radiation information corresponding to the same key signal in the change time zone according to the electromagnetic radiation simulation data in the electromagnetic radiation information storage unit, analyzes whether the electromagnetic radiation information corresponding to the same key signal in the change time zone has correlation or not, and derives relevant data if the electromagnetic radiation information corresponding to the same key signal in the change time zone has correlation;
the key signal comprises a plurality of change values, and the analyzing whether the electromagnetic radiation information corresponding to the same key signal in the change time zone has correlation comprises the following steps:
If the difference between the electromagnetic radiation information corresponding to the change time zone when the key signal is a certain change value and the electromagnetic radiation information corresponding to other change values in the change time zone is larger than a preset error, judging that the electromagnetic radiation information of the key signal is relevant when the key signal is the change value;
the change time zone refers to a difference time period between time stamp information of change of a change value of a current key signal and time stamp information of change of a change value of a last key signal in the same simulation test.
9. The SEMA attack prevention circuit to be tested security simulation analysis method according to claim 8, wherein the key signal includes test key information, the test key information is generated by a key generation unit, the key generation unit includes a source data storage unit, a source data decryption unit, a hierarchy information storage unit, a root key operation unit and a hierarchy operation decryption unit;
the method comprises the following steps:
the source data storage unit stores encrypted source data, wherein the source data comprises a source key and a hierarchical key encryption and decryption algorithm;
the source data decryption unit obtains encrypted source data to decrypt, obtains a decrypted source key and a decrypted hierarchical key encryption and decryption algorithm, sends the decrypted source key to the root key operation unit, and stores the decrypted hierarchical key encryption and decryption algorithm in the algorithm information storage unit;
The hierarchical information storage unit stores hierarchical key information and user identification information;
the root key operation unit obtains the user identification information and the decrypted source key, and carries out hash operation on the user identification information according to the decrypted source key to obtain root key information;
and the hierarchical operation decryption unit acquires the hierarchical key encryption and decryption algorithm, the hierarchical key information and the root key information, and decrypts the hierarchical key information by applying the root key information to the hierarchical key encryption and decryption algorithm to obtain the test key information.
CN202011183709.1A 2020-10-29 2020-10-29 SEMA attack-preventing circuit to be tested safety simulation analysis method and device Active CN112152780B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011183709.1A CN112152780B (en) 2020-10-29 2020-10-29 SEMA attack-preventing circuit to be tested safety simulation analysis method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011183709.1A CN112152780B (en) 2020-10-29 2020-10-29 SEMA attack-preventing circuit to be tested safety simulation analysis method and device

Publications (2)

Publication Number Publication Date
CN112152780A CN112152780A (en) 2020-12-29
CN112152780B true CN112152780B (en) 2024-02-27

Family

ID=73955131

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011183709.1A Active CN112152780B (en) 2020-10-29 2020-10-29 SEMA attack-preventing circuit to be tested safety simulation analysis method and device

Country Status (1)

Country Link
CN (1) CN112152780B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116842763B (en) * 2023-08-31 2024-01-26 国汽(北京)智能网联汽车研究院有限公司 Simulation test method, simulation test device, electronic equipment and storage medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1602496A (en) * 2001-12-13 2005-03-30 卡纳尔技术公司 Digital electronic component which is protected against electrical-type analyses
WO2010045843A1 (en) * 2008-10-23 2010-04-29 国民技术股份有限公司 An aes encryption method of anti-differential power attack
CN104992114A (en) * 2015-06-09 2015-10-21 北京电子科技学院 Analytic system and method of electromagnetism based on inserted-type cipher chip
CN105653502A (en) * 2016-03-17 2016-06-08 湘潭大学 Analysis method of electromagnetic radiation relevance of communication base station based on genetic algorithm

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1602496A (en) * 2001-12-13 2005-03-30 卡纳尔技术公司 Digital electronic component which is protected against electrical-type analyses
WO2010045843A1 (en) * 2008-10-23 2010-04-29 国民技术股份有限公司 An aes encryption method of anti-differential power attack
CN104992114A (en) * 2015-06-09 2015-10-21 北京电子科技学院 Analytic system and method of electromagnetism based on inserted-type cipher chip
CN105653502A (en) * 2016-03-17 2016-06-08 湘潭大学 Analysis method of electromagnetic radiation relevance of communication base station based on genetic algorithm

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
DES加密算法的差分电磁攻击实现;郭华;丁国良;刘昌杰;尹文龙;;微电子学与计算机(第12期);全文 *
一种针对DES密码芯片的M-DEMA攻击方法;柏代军;范黎恒;余浩;;兵工自动化(第02期);全文 *

Also Published As

Publication number Publication date
CN112152780A (en) 2020-12-29

Similar Documents

Publication Publication Date Title
CN109657426A (en) A kind of data source tracing method based on digital signature and digital watermarking
US7499552B2 (en) Cipher method and system for verifying a decryption of an encrypted user data key
CN110011794B (en) Cipher machine key attribute testing method
CN108199832B (en) Detection method for CLOC authentication encryption algorithm to resist differential fault attack
Abd El-Wahed et al. Efficiency and security of some image encryption algorithms
CN112115657A (en) Chip security simulation analysis method and device for preventing single time attack
CN112152780B (en) SEMA attack-preventing circuit to be tested safety simulation analysis method and device
JP5413010B2 (en) Analysis apparatus, analysis method, and program
CN112134685B (en) DPA attack-preventing circuit to be tested safety simulation analysis method and device
Hazarika et al. A novel partial image encryption using chaotic logistic map
CN213028070U (en) DPA attack prevention to-be-tested circuit safety simulation analysis device
CN213547530U (en) SPA attack prevention to-be-detected circuit safety simulation analysis device
Ziener et al. Configuration tampering of BRAM-based AES implementations on FPGAs
JP2019192101A (en) Brittleness information generator and brittleness evaluation device
CN106650504B (en) A kind of abstract extraction method and detection method for Web page face data
CN107171808A (en) A kind of verification method and device of electronic record authenticity
CN104935783B (en) A kind of safe active distorted image detection method and device
CN112114248A (en) Chip security simulation analysis method and device for preventing differential time attack
CN112559236B (en) Fault detection method and device for encryption operation processor chip
CN112104448B (en) DEMA attack prevention circuit to be tested safety simulation analysis method and device
WO2016063512A1 (en) Mac tag list generating apparatus, mac tag list verifying apparatus, mac tag list generating method, mac tag list verifying method and program recording medium
CN112104447B (en) SPA attack-preventing circuit to be tested safety simulation analysis method and device
CN112532374A (en) Method for detecting SILC authentication encryption algorithm to resist differential fault attack
CN213276647U (en) Safety simulation analysis device for preventing time attack
CN112468283A (en) Method for detecting iFeed [ AES ] algorithm to resist differential fault attack

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant