CN114328269B - Password chip security detection method - Google Patents

Password chip security detection method Download PDF

Info

Publication number
CN114328269B
CN114328269B CN202210053967.0A CN202210053967A CN114328269B CN 114328269 B CN114328269 B CN 114328269B CN 202210053967 A CN202210053967 A CN 202210053967A CN 114328269 B CN114328269 B CN 114328269B
Authority
CN
China
Prior art keywords
level
side channel
chip
register
fpga
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202210053967.0A
Other languages
Chinese (zh)
Other versions
CN114328269A (en
Inventor
柳建勇
陈燕
陈魁
葛炜
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Mold Micro Semiconductor Co ltd
Original Assignee
Shenzhen Mold Micro Semiconductor Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Mold Micro Semiconductor Co ltd filed Critical Shenzhen Mold Micro Semiconductor Co ltd
Priority to CN202210053967.0A priority Critical patent/CN114328269B/en
Publication of CN114328269A publication Critical patent/CN114328269A/en
Application granted granted Critical
Publication of CN114328269B publication Critical patent/CN114328269B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Storage Device Security (AREA)

Abstract

The application discloses a security detection method of a password chip, which comprises the following steps: simulating a register transmission stage realization code of a target cipher chip according to a plurality of groups of plaintext and a plurality of groups of keys to generate register transmission stage side channel information; counting the correlation between the variable value set of the side channel and the information of the transmission level side channel of the register, and generating a correlation result of the transmission level of the register; and judging whether to modify and iterate the register transmission stage realization codes according to the register transmission stage correlation result. The application solves the technical problem of how to improve the evaluation efficiency of the channel protection capability of the cipher chip side.

Description

Password chip security detection method
Technical Field
The application relates to the technical field of information security. More particularly, the application relates to a security detection method for a cryptographic chip.
Background
In the design process of the cipher chip, the side channel protection capability of the cipher algorithm is one of the important factors for considering the security of the cipher chip. In the prior art, the password chip is actually evaluated for the protection capability of the side channel of the password algorithm after being developed and produced, so that if the security of the password chip does not meet the requirement, the situation of adjusting the design is necessarily faced, namely the password chip is redesigned and manufactured. The situation not only ensures that the evaluation efficiency of the security is low, but also severely restricts the iteration speed of the password algorithm and the development speed of the password chip, and greatly increases the design cost of the password chip.
Disclosure of Invention
It is an object of the present application to solve at least the above problems and to provide corresponding advantages.
The application further aims to provide a security detection method for the password chip, which solves the technical problem of how to improve the evaluation efficiency of the protection capability of the channel at the side of the password chip. The application is realized mainly by the following technical scheme:
the application provides a security detection method of a password chip, which comprises the following steps:
simulating a register transmission stage realization code of a target cipher chip according to a plurality of groups of plaintext and a plurality of groups of keys to generate register transmission stage side channel information;
counting the correlation between the variable value set of the side channel and the information of the transmission level side channel of the register, and generating a correlation result of the transmission level of the register;
and judging whether to modify and iterate the register transmission stage realization codes according to the register transmission stage correlation result.
According to the password chip security detection method provided by the application, the register transmission level side channel information is generated by simulating the register transmission level implementation code of the target password chip, so that a designer can count the correlation between a side channel variable value set and the register transmission level side channel information, and the security of the register transmission level implementation code is determined according to the register transmission level correlation result, namely whether modification iteration is needed or not. Compared with the prior art, the method and the device can iterate the target cipher chip in the design process of the target cipher chip (namely, the register transmission stage realizes the code design stage), and the iteration update is not required to be started until the design of the target cipher chip is completed, so that the evaluation efficiency of the side channel protection capability can be greatly improved.
In some embodiments, the step of generating the correlation result of the transmission stage of the register includes:
generating the side channel variable value set according to the plurality of groups of plaintext and the plurality of groups of secret keys;
and calculating the correlation between the side channel variable value set and the register transmission stage side channel information, and generating a register transmission stage correlation result.
In some embodiments, the step of determining whether to modify the register transfer level implementation code according to the register transfer level correlation result includes:
acquiring a register transmission level maximum value of the register transmission level correlation result;
and judging whether the maximum value of the register transmission level exceeds a preset value of the register transmission level, and if so, carrying out modification iteration on the register transmission level realization code.
In some technical solutions, the method for detecting security of a cryptographic chip further includes:
the FPGA ((Field Programmable Gate Array, field programmable gate array)) is used for realizing the FPGA-level side channel information generated by codes according to a plurality of groups of plaintext and a plurality of groups of key acquisition target password chips;
counting the correlation between the side channel variable value set and the FPGA-level side channel information to generate an FPGA-level correlation result;
and judging whether to modify and iterate the FPGA implementation code and/or the register transmission level implementation code according to the FPGA level correlation result.
In some technical solutions, the step of counting the correlation between the set of side channel variable values and the FPGA-level side channel information, and generating an FPGA-level correlation result includes:
generating the side channel variable value set according to the plurality of groups of plaintext and the plurality of groups of secret keys;
and calculating the correlation between the side channel variable value set and the FPGA-level side channel information to generate an FPGA-level correlation result.
In some technical solutions, the step of determining whether to modify and iterate the FPGA implementation code and/or the register transmission level implementation code according to the FPGA level correlation result includes:
acquiring an FPGA-level maximum value of the FPGA-level correlation result;
and judging whether the maximum value of the FPGA level exceeds a preset value of the FPGA level, and if so, modifying and iterating the FPGA implementation code and/or the register transmission level implementation code.
In some technical solutions, the method for detecting security of a cryptographic chip further includes:
acquiring chip-level side channel information generated by a target cipher chip according to a plurality of groups of plaintext and a plurality of groups of keys;
counting the correlation between the side channel variable value set and the chip-level side channel information to generate a chip-level correlation result;
and judging whether to modify and iterate at least one code of the chip implementation code, the FPGA implementation code and the register transmission level implementation code according to the chip-level correlation result.
In some embodiments, the step of generating a chip-level correlation result includes:
generating the side channel variable value set according to the plurality of groups of plaintext and the plurality of groups of secret keys;
and calculating the correlation between the side channel variable value set and the chip-level side channel information to generate a chip-level correlation result.
In some technical solutions, the step of determining whether to modify and iterate at least one code of the chip implementation code, the FPGA implementation code, and the register transmission level implementation code according to the chip-level correlation result includes:
acquiring a chip-level maximum value of the chip-level correlation result;
and judging whether the chip-level maximum value exceeds a chip-level preset value, and if so, modifying and iterating at least one code of the chip implementation code, the FPGA implementation code and the register transmission-level implementation code.
In some embodiments, the calculation formula for calculating the correlation between the set of side channel variable values and the register transmission level side channel information, the correlation between the set of side channel variable values and the FPGA level side channel information, and the correlation between the set of side channel variable values and the chip level side channel information is
In some technical solutions, the method for detecting the security of the cryptographic chip includes:
simulating an algorithm-level realization code of the target cipher chip according to a plurality of groups of plaintext and a plurality of groups of keys to generate algorithm-level side channel information;
counting the correlation between the side channel variable value set and the algorithm-level side channel information to generate an algorithm-level correlation result;
and judging whether to modify and iterate the algorithm stage realization codes according to the algorithm stage correlation result.
In some technical solutions, the method for detecting the security of the cryptographic chip includes:
simulating a circuit-level implementation code of the target cipher chip according to a plurality of groups of plaintext and a plurality of groups of keys to generate circuit-level side channel information;
counting the correlation between the side channel variable value set and the circuit-level side channel information to generate a circuit-level correlation result;
and judging whether to modify and iterate the circuit-level implementation code according to the circuit-level correlation result.
The technical effects of the embodiment of the application at least comprise:
according to the password chip security detection method provided by the application, the register transmission level side channel information is generated by simulating the register transmission level implementation code of the target password chip, so that a designer can count the correlation between the side channel variable value set and the register transmission level side channel information, and the security of the register transmission level implementation code is determined according to the register transmission level correlation result, namely whether modification iteration is needed or not. Compared with the prior art, the method and the device can iterate the target cipher chip in the design process of the target cipher chip (namely, the register transmission stage realizes the code design stage), and the iteration update is not required to be started until the design of the target cipher chip is completed, so that the evaluation efficiency of the side channel protection capability can be greatly improved.
In some technical schemes, the security detection method of the cipher chip of the application further comprises FPGA-level side channel information generated by using FPGA to realize codes according to the multiple groups of plaintext and multiple groups of key acquisition target cipher chips; counting the correlation of the side channel variable value set and the FPGA-level side channel information to generate an FPGA-level correlation result; and judging whether to modify and iterate the FPGA implementation code and/or the register transmission level implementation code according to the FPGA level correlation result. Therefore, in the FPGA-level design stage, the code of the password chip can be iterated for the second time, and the design cost of the password chip is greatly reduced.
In some technical schemes, the method for detecting the security of the cipher chip further comprises the step of acquiring chip-level side channel information generated by a target cipher chip according to a plurality of groups of plaintext and a plurality of groups of keys; counting the correlation between the side channel variable value set and the chip-level side channel information to generate a chip-level correlation result; and judging whether to modify and iterate at least one code of the chip implementation code, the FPGA implementation code and the register transmission level implementation code according to the chip-level correlation result. Therefore, the password chip is subjected to iteration of codes corresponding to the register transmission level, the FPGA level and the chip level respectively, namely, the codes of the password chip are iterated for three times, so that the safety of the password chip in the whole design process can be ensured, and the trial-and-error cost in the code development process is reduced.
Unless defined otherwise, all technical and scientific terms used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this application belongs.
The various features and embodiments of the application mentioned in the above aspects can be applied to other aspects as appropriate, where appropriate. Thus, a particular feature in one aspect may be combined with a particular feature in another aspect as appropriate.
Additional advantages, objects, and features of the application will be set forth in part in the description which follows and in part will become apparent to those having ordinary skill in the art upon examination of the following or may be learned from practice of the application.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present application, the drawings that are needed in the description of the embodiments of the present application will be briefly described below, it being obvious that the drawings in the following description are only some embodiments of the present application, and that other drawings may be obtained according to these drawings without inventive effort for a person skilled in the art.
FIG. 1 is a flow chart of a cryptographic chip security detection method of the present application in some embodiments;
FIG. 2 is a flow chart of a method for detecting security of a cryptographic chip according to another embodiment of the application;
FIG. 3 is a flow chart of a cryptographic chip security detection method according to the present application in further embodiments;
FIG. 4 is a flow chart of a cryptographic chip security detection method according to the present application in further embodiments;
FIG. 5 is a reference diagram of the register transfer level correlation results of the present application in some embodiments;
FIG. 6 is a flow chart of a cryptographic chip security detection method according to the present application in further embodiments;
FIG. 7 is a flow chart of a cryptographic chip security detection method according to the present application in further embodiments;
FIG. 8 is a flow chart of a cryptographic chip security detection method of the present application in further embodiments;
FIG. 9 is a flow chart of a cryptographic chip security detection method of the present application in further embodiments;
FIG. 10 is a flow chart of a cryptographic chip security detection method of the present application in further embodiments;
FIG. 11 is a flowchart of a method for detecting security of a cryptographic chip according to the present application in still other embodiments.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, the technical solutions of the embodiments of the present application will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present application, and it is apparent that the described embodiments are some embodiments of the present application, but not all embodiments of the present application. All other embodiments, which can be made by those skilled in the art based on the embodiments of the application without making any inventive effort, are intended to be within the scope of the application.
In embodiments of the application, words such as "exemplary" or "such as" are used to mean serving as an example, instance, or illustration. Any embodiment or design described herein as "exemplary" or "e.g." in an embodiment should not be taken as preferred or advantageous over other embodiments or designs. Rather, the use of words such as "exemplary" or "such as" is intended to present related concepts in a concrete fashion.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements that are expressly listed or inherent to such process, method, article, or apparatus.
It should be appreciated that the present application may be used to perform side channel security detection on cryptographic chips embedded with symmetric cryptographic algorithms and public key cryptographic algorithms, such as DES (Data Encryption Standard) algorithm, AES (Advanced Encryption Standard) algorithm, SM4 algorithm, RSA encryption algorithm, ECC (elliptic curve encryption algorithm) or SM2 algorithm.
Hereinafter, various embodiments of the present application will be described with reference to the accompanying drawings.
As shown in FIG. 1, the method for detecting the security of the cryptographic chip is provided by the application. In fig. 1, the cryptographic chip security detection method includes:
s101, simulating a register transmission stage realization code of a target cipher chip according to a plurality of groups of plaintext and a plurality of groups of keys, and generating register transmission stage side channel information.
It should be understood that the simulation operation of step S101 may be performed using a power consumption simulator.
The register transfer level side channel information includes register transfer level power consumption information, which may be presented in the form of a power consumption curve.
S102, generating a register transmission level correlation result by counting correlation of the side channel variable value set and the register transmission level side channel information.
The set of side channel variable values is generated from the plurality of sets of plaintext and plurality of sets of key execution algorithms, which may be a set of a plurality of intermediate variable values. The intermediate variable value may be a power consumption value.
S103, judging whether to modify and iterate the register transmission stage implementation codes according to the register transmission stage correlation result.
According to the password chip security detection method provided by the application, the register transmission level side channel information is generated by simulating the register transmission level implementation code of the target password chip, so that a designer can count the correlation between a side channel variable value set and the register transmission level side channel information, and the security of the register transmission level implementation code is determined according to the register transmission level correlation result, namely whether iteration is needed or not. Compared with the prior art, the method and the device can iterate the target cipher chip in the design process of the target cipher chip (namely, the register transmission stage realizes the code design stage), and the iteration update is not required to be started until the design of the target cipher chip is completed, so that the evaluation efficiency of the side channel protection capability can be greatly improved.
In some embodiments, as shown in fig. 2, the step S102 includes:
s201, generating the side channel variable value set according to the plurality of groups of plaintext and the plurality of groups of secret keys.
S202, calculating the correlation between the side channel variable value set and the side channel information of the register transmission stage, and generating a register transmission stage correlation result.
The calculation formula for calculating the correlation between the side channel variable value set and the register transmission level side channel information is as followsWherein D represents the group number of the plaintext, D represents the D-th register transfer stageSide channel information (i.e., register transfer level side channel information obtained by the d-th group plaintext), i denotes a time point, h d,i Side channel variable value set representing the d-th register transmission stage side channel information at time i,/>Represents the average of all side channel variable values at time i, j represents the time point, t d,j Register transfer level side channel information representing the d-th group plaintext time j +.>The average value of all the register transmission stage side channel information at the time j is represented.
In some embodiments, as shown in fig. 3, the implementation of step S102 may be implemented by the following examples:
in FIG. 3, multiple sets of plaintext use d 1 、d 2 、d n Representing multiple sets of keys using k 1 、k 2 、k m Representing, from a plurality of sets of plaintext and a plurality of sets of keys, a set of register-level side channel variable values, which may be represented in the form of a power consumption model, which in fig. 3 uses v 11 、v 12 、v 1m 、v 21 、v 22 、v 2m 、v n1 、v n2 、v nm And (3) representing. And calculating the correlation between the side channel variable value set and the side channel information of the register transmission stage, and generating a register transmission stage correlation result. In fig. 3, the register transfer level side channel information uses t 11 、t 12 、t 1m 、t 21 、t 22 、t 2m 、t n1 、t n2 、t nm Representing that the register transfer level dependency result uses r 11 、r 12 、r 1m 、r 21 、r 22 、r 2m 、r n1 、r n2 、r nm And (3) representing. The designer can pass r 11 、r 12 、r 1m 、r 21 、r 22 、r 2m 、r n1 、r n2 、r nm It is determined whether the register transfer level algorithm requires iteration.
In some embodiments, as shown in fig. 4, the step S103 includes:
s301, obtaining a maximum value of the register transmission level of the correlation result of the register transmission level.
S302, judging whether the maximum value of the register transmission level exceeds a preset value of the register transmission level, and if so, modifying and iterating the register transmission level realization code.
It should be noted that the predetermined value of the register transfer level may be 2×10 -5 (reference herein to a "×" symbol is to be understood as a multiplier in a mathematical symbol). In some embodiments, reference may be made to FIG. 5, where the abscissa in FIG. 5 is time and the ordinate is the correlation value, i.e. the register transfer level correlation result. In fig. 5, the time is between 200ns and 250ns, there is a register transfer level maximum that exceeds the register transfer level by a predetermined value of 2 x 10 -5 It is therefore necessary to iterate the register transfer level algorithm. In other embodiments, the predetermined value of the register transfer stage may be other values, which may be set by those skilled in the art according to actual needs, and this is not limited herein.
In some embodiments, as shown in fig. 6, the cryptographic chip security detection method further includes:
s401, acquiring FPGA-level side channel information generated by using FPGA to realize codes according to a plurality of groups of plaintext and a plurality of groups of key acquisition target password chips.
The FPGA-level side channel information comprises FPGA-level power consumption information, and the FPGA-level side channel information can be presented in the form of a power consumption curve.
S402, counting correlation of the side channel variable value set and the FPGA-level side channel information, and generating an FPGA-level correlation result.
The set of side channel variable values is generated from the plurality of sets of plaintext and plurality of sets of key execution algorithms, which may be a set of a plurality of intermediate variable values.
S403, judging whether to modify and iterate the FPGA implementation code and/or the register transmission level implementation code according to the FPGA level correlation result.
Through the embodiment, the password chip can realize the register transmission stage to realize code iteration and/or the FPGA to realize code iteration. The security of the password chip is more perfect, and the design cost of the password chip is further reduced.
In some embodiments, as shown in fig. 7, the step S402 includes:
s501, generating the side channel variable value set according to the plurality of groups of plaintext and the plurality of groups of secret keys.
S502, calculating the correlation between the side channel variable value set and the FPGA-level side channel information, and generating an FPGA-level correlation result.
The calculation formula for calculating the correlation between the side channel variable value set and the FPGA-level side channel information is also
In some embodiments, the implementation of the step S402 may also be implemented with reference to fig. 3, and a specific implementation example may refer to an implementation example of the step S102, which will not be described in detail herein.
In some embodiments, as shown in fig. 8, the step S403 includes:
s601, obtaining an FPGA-level maximum value of the FPGA-level correlation result;
s602, judging whether the maximum value of the FPGA level exceeds a preset value of the FPGA level, and if so, modifying and iterating the algorithm implementation code and/or the register transmission level implementation code of the FPGA.
It should be noted that the predetermined value of the FPGA level may be 2×10 -5 . In some embodiments, reference may be made to FIG. 5, where in FIG. 5, the time is between 200ns and 250ns, with a maximum FPGA level that exceeds the predetermined FPGA level value by 2 x 10 -5 Therefore, it is necessary to stack FPGA implementation codes and/or register transfer level implementation codesAnd (3) replacing. In other embodiments, the predetermined FPGA value may be other values, which may be set by those skilled in the art according to actual needs, which is not limited herein.
In some embodiments, as shown in fig. 9, the cryptographic chip security detection method further includes:
s701, acquiring chip-level side channel information generated by a target cipher chip according to a plurality of groups of plaintext and a plurality of groups of keys.
The chip-level side channel information includes chip-level power consumption information, which may be presented in the form of a power consumption curve.
S702, counting correlation of a side channel variable value set and the chip-level side channel information, and generating a chip-level correlation result.
The set of side channel variable values is generated from the plurality of sets of plaintext and plurality of sets of key execution algorithms, which may be a set of a plurality of intermediate variable values.
S703, judging whether to modify and iterate at least one code of the chip implementation code, the FPGA implementation code and the register transmission level implementation code according to the chip level correlation result.
Through the embodiment, the password chip can realize register transmission level code iteration, FPGA code iteration and chip level code iteration, namely three iterations are performed. Through multiple iterations, the security of the password chip in the whole design process can be ensured, and the trial-and-error cost in the code development process is reduced.
In some embodiments, as shown in fig. 10, the step S702 includes:
s801, generating the side channel variable value set according to the plurality of groups of plaintext and the plurality of groups of secret keys.
S802, calculating the correlation between the side channel variable value set and the chip-level side channel information, and generating a chip-level correlation result.
The calculation formula for calculating the correlation between the side channel variable value set and the chip-level side channel information is also
In some embodiments, the implementation of the step S702 may also be implemented with reference to fig. 3, and a specific implementation example may refer to an implementation example of the step S102, which will not be described in detail herein.
In some embodiments, as shown in fig. 11, the step S703 includes:
and S901, acquiring a chip-level maximum value of the chip-level correlation result.
S902, judging whether the chip-level maximum value exceeds a chip-level preset value, and if so, modifying and iterating at least one code of the chip-level implementation code, the FPGA-implementation code and the register-level implementation code.
It should be noted that the chip-level predetermined value may be 2×10 -5 . In some embodiments, reference may be made to FIG. 5, where in FIG. 5, the time is between 200ns and 250ns, with a chip-level maximum that exceeds a chip-level predetermined value of 2 x 10 -5 Therefore, at least one code of the chip implementation code, the FPGA implementation code, and the register transfer level implementation code needs to be iterated. In other embodiments, the predetermined value on chip may be other values, which may be set by those skilled in the art according to actual needs, and this is not limited herein.
In some embodiments, the cryptographic chip security detection method further comprises:
simulating an algorithm-level realization code of the target cipher chip according to the plurality of groups of plaintext and the plurality of groups of keys to generate algorithm-level side channel information;
counting the correlation of the side channel variable value set and the algorithm level side channel information to generate an algorithm level correlation result;
and judging whether to modify and iterate the algorithm stage realization codes according to the algorithm stage correlation result.
In some embodiments, the cryptographic chip security detection method further comprises:
simulating a circuit-level implementation code of the target cipher chip according to the plurality of groups of plaintext and the plurality of groups of keys to generate circuit-level side channel information;
counting the correlation between the side channel variable value set and the circuit-level side channel information to generate a circuit-level correlation result;
and judging whether to modify and iterate the circuit-level implementation code according to the circuit-level correlation result.
In some embodiments, the cryptographic chip security detection method includes:
simulating a register transmission level realization code of a target cipher chip according to a plurality of groups of plaintext and a plurality of groups of keys to generate register level side channel information;
counting the correlation between the side channel variable value set and the register level side channel information to generate a register level correlation result;
and judging whether to iterate at least one code of the algorithm stage implementation code, the circuit stage implementation code, the register transmission stage implementation code, the FPGA implementation code and the chip implementation code according to the register stage correlation result.
It should be mentioned that the register transfer level mentioned herein refers to an implementation form of a cryptographic algorithm described from the register transfer level using a hardware description language; the FPGA level refers to a circuit level cryptographic algorithm implementation form realized by FPGA hardware; the chip level refers to the implementation form of the cryptographic algorithm IP in an actual chip; algorithm level refers to an implementation of a cryptographic algorithm described from algorithm level using a high-level language; the circuit level refers to an implementation form of the circuit level after logical synthesis using a cryptographic algorithm described in a hardware description language.
Although embodiments of the present application have been disclosed above, it is not limited to the details and embodiments shown and described, it is well suited to various fields of use for which the application would be readily apparent to those skilled in the art, and accordingly, the application is not limited to the specific details and illustrations shown and described herein, without departing from the general concepts defined in the claims and their equivalents.

Claims (6)

1. The method for detecting the security of the cipher chip is characterized by comprising the following steps:
simulating a register transmission stage realization code of a target cipher chip according to a plurality of groups of plaintext and a plurality of groups of keys to generate register transmission stage side channel information;
counting the correlation between the variable value set of the side channel and the information of the transmission level side channel of the register, and generating a correlation result of the transmission level of the register;
judging whether to modify and iterate the register transmission stage realization codes according to the register transmission stage correlation result;
the step of generating a register transmission level correlation result comprises generating the side channel variable value set according to the plurality of groups of plaintext and the plurality of groups of secret keys; calculating the correlation between the side channel variable value set and the register transmission level side channel information to generate a register transmission level correlation result;
the calculation formula for calculating the correlation between the side channel variable value set and the register transmission level side channel information is as followsWherein D represents the group number of the plaintext, D represents the transmission-level side channel information of the D-th register, i represents the time point, h d,i Side channel variable value set representing the d-th register transmission stage side channel information at time i,/>Represents the average of all side channel variable values at time i, j represents the time point, t d,j Register transfer level side channel information representing the d-th group plaintext time j +.>The average value of all the register transmission stage side channel information at the time j is represented.
2. The cryptographic chip security detection method according to claim 1, wherein the step of determining whether to modify iterated the register transfer level implementation code according to the register transfer level correlation result comprises:
acquiring a register transmission level maximum value of the register transmission level correlation result;
and judging whether the maximum value of the register transmission level exceeds a preset value of the register transmission level, and if so, carrying out modification iteration on the register transmission level realization code.
3. The cryptographic chip security detection method according to claim 1, further comprising:
acquiring FPGA-level side channel information generated by using FPGA to realize codes according to a plurality of groups of plaintext and a plurality of groups of secret keys;
counting the correlation between the side channel variable value set and the FPGA-level side channel information to generate an FPGA-level correlation result;
and judging whether to modify and iterate the FPGA implementation code and/or the register transmission level implementation code according to the FPGA level correlation result.
4. The method for detecting security of a cryptographic chip according to claim 3, wherein the step of determining whether to modify and iterate the FPGA implementation code and/or the register transfer level implementation code according to the FPGA level correlation result comprises:
acquiring an FPGA-level maximum value of the FPGA-level correlation result;
and judging whether the maximum value of the FPGA level exceeds a preset value of the FPGA level, and if so, modifying and iterating the FPGA implementation code and/or the register transmission level implementation code.
5. A cryptographic chip security detection method according to claim 1 or 3, further comprising:
acquiring chip-level side channel information generated by a target cipher chip according to a plurality of groups of plaintext and a plurality of groups of keys;
counting the correlation between the side channel variable value set and the chip-level side channel information to generate a chip-level correlation result;
and judging whether to modify and iterate at least one code of the chip implementation code, the FPGA implementation code and the register transmission level implementation code according to the chip-level correlation result.
6. The method for detecting security of a cryptographic chip according to claim 5, wherein the step of determining whether to modify and iterate at least one of a chip implementation code, an FPGA implementation code, and a register transfer level implementation code according to the chip level correlation result comprises:
acquiring a chip-level maximum value of the chip-level correlation result;
and judging whether the chip-level maximum value exceeds a chip-level preset value, and if so, modifying and iterating at least one code of the chip implementation code, the FPGA implementation code and the register transmission-level implementation code.
CN202210053967.0A 2022-01-18 2022-01-18 Password chip security detection method Active CN114328269B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210053967.0A CN114328269B (en) 2022-01-18 2022-01-18 Password chip security detection method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210053967.0A CN114328269B (en) 2022-01-18 2022-01-18 Password chip security detection method

Publications (2)

Publication Number Publication Date
CN114328269A CN114328269A (en) 2022-04-12
CN114328269B true CN114328269B (en) 2023-09-15

Family

ID=81029652

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210053967.0A Active CN114328269B (en) 2022-01-18 2022-01-18 Password chip security detection method

Country Status (1)

Country Link
CN (1) CN114328269B (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2010135881A (en) * 2008-12-02 2010-06-17 Nec Corp Device, method and program for evaluating side-channel attack resistance
CN104657680A (en) * 2013-11-20 2015-05-27 上海华虹集成电路有限责任公司 In-chip template attack resisting data transmission method
CN104796250A (en) * 2015-04-11 2015-07-22 成都信息工程学院 Side channel attack method for implementation of RSA (Rivest, Shamir and Adleman) cipher algorithms M-ary
CN106656459A (en) * 2016-11-17 2017-05-10 大唐微电子技术有限公司 Side channel energy analysis method and device for SM3-HMAC
CN106850203A (en) * 2017-02-22 2017-06-13 北京智慧云测科技有限公司 The security assessment method and device of cryptographic algorithm

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR101418962B1 (en) * 2009-12-11 2014-07-15 한국전자통신연구원 Secure device and method for preventing side chnannel attack

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2010135881A (en) * 2008-12-02 2010-06-17 Nec Corp Device, method and program for evaluating side-channel attack resistance
CN104657680A (en) * 2013-11-20 2015-05-27 上海华虹集成电路有限责任公司 In-chip template attack resisting data transmission method
CN104796250A (en) * 2015-04-11 2015-07-22 成都信息工程学院 Side channel attack method for implementation of RSA (Rivest, Shamir and Adleman) cipher algorithms M-ary
CN106656459A (en) * 2016-11-17 2017-05-10 大唐微电子技术有限公司 Side channel energy analysis method and device for SM3-HMAC
CN106850203A (en) * 2017-02-22 2017-06-13 北京智慧云测科技有限公司 The security assessment method and device of cryptographic algorithm

Also Published As

Publication number Publication date
CN114328269A (en) 2022-04-12

Similar Documents

Publication Publication Date Title
Yu et al. A lightweight masked AES implementation for securing IoT against CPA attacks
Sahari et al. A pseudo-random numbers generator based on a novel 3D chaotic map with an application to color image encryption
Liu et al. An image encryption algorithm based on Baker map with varying parameter
Boriga et al. A new hyperchaotic map and its application in an image encryption scheme
Azzaz et al. Synchronized hybrid chaotic generators: Application to real-time wireless speech encryption
EP2228941B1 (en) Encryption processing apparatus
Liu et al. A stream cipher algorithm based on 2D coupled map lattice and partitioned cellular automata
Al-Hazaimeh A new speech encryption algorithm based on dual shuffling Hénon chaotic map
Cheng et al. An asymmetric image cryptosystem based on the adaptive synchronization of an uncertain unified chaotic system and a cellular neural network
US11936768B2 (en) Obfuscating cryptographic parameters used in elliptical curve cryptography, and related systems and devices
CN106656459A (en) Side channel energy analysis method and device for SM3-HMAC
Karawia Image encryption based on fisher‐yates shuffling and three dimensional chaotic economic map
Crocetti et al. A simulated approach to evaluate side-channel attack countermeasures for the Advanced Encryption Standard
CN112260818A (en) Side channel curve enhancement method, side channel attack method and side channel attack device
Sbiaa et al. High-level implementation of a chaotic and AES based crypto-system
Liu et al. Machine learning-based similarity attacks for chaos-based cryptosystems
CN114328269B (en) Password chip security detection method
Ma et al. Improved conditional differential attacks on Grain v1
Othman et al. Implementation of neural-cryptographic system using FPGA
Liu et al. Characteristics of 3D coupled map lattice and its application in pseudo-random number generator
De Meyer Cryptography in the presence of physical attacks: Design, implementation and analysis
Tolba et al. Hardware speech encryption using a chaotic generator, dynamic shift and bit permutation
Joye Basics of side-channel analysis
CN102201912A (en) Blind recognition method for self-synchronization scrambling code generation polynomial
Hoang et al. Deep learning enhanced side channel analysis on crystals-kyber

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant