Unlock instant, AI-driven research and patent intelligence for your innovation.

Security chip

A security chip and encryption circuit technology, applied in computer security devices, instruments, digital data authentication, etc., can solve the problems of large extra power consumption current, unfavorable security chip application and system design, large power consumption current, etc., to reduce power consumption consumption effect

Inactive Publication Date: 2007-08-29
LENOVO (BEIJING) LTD
View PDF0 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The disadvantage of this method is that you must be proficient in cryptographic theory, design your own cryptographic algorithm, and not be known by others
Currently commonly used DES, 3DES, RSA and other algorithms are difficult to use this method
[0007] The third is to add random power consumption circuit
The disadvantage of this method is that the random power consumption circuit produces a randomly changing power consumption current, and its current must be equal to or greater than the power consumption of the original circuit in order to submerge the current characteristics of the original circuit, and the random power consumption circuit is always in the In the working state, a large additional power consumption current will be added; if the peak values ​​of the two currents are superimposed together, the instantaneous power consumption current will be very large
These are not conducive to the application and system design of security chips

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security chip
  • Security chip
  • Security chip

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0019] The present invention will be described in detail below in conjunction with the accompanying drawings.

[0020] As shown in Figure 1, the security chip of the present invention includes an encryption circuit and a protection circuit,

[0021] The encryption circuit is a circuit used to complete the cryptographic algorithm function, and can be any known circuit that uses hardware to implement encryption technology or a circuit that uses software to implement encryption technology;

[0022] The guard circuit is used to curtail and disrupt the power consumption characteristics of the encryption circuit.

[0023] As shown in FIG. 2, the above protection circuit includes a random number generating unit, a switch group and a capacitor group.

[0024] The random number generating unit is used to generate random numbers, that is, random high and low level signals, and its output is connected to the switch group for controlling the opening or closing of each switch in the switc...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a safety chip, preventing illegal user from attacking cipher algorithm inside the safety chip by energy analysis method but not increasing additional chip power consumption and comprising: encryption circuit and protecting circuit, where the former is used to implement function of cipher encryption algorithm and the latter is used to reduce and disorder power consumption characteristic of the former. And the safety chip further comprises control circuit to control ON-OFF of the protecting circuit. And the safety chip transfers energy by capacitor charging and discharging and can use the control circuit to control the protecting circuit to be switched on only when the encryption circuit runs. And these can reduce the safety chip power consumption and besides, achieve the purpose of preventing energy attack.

Description

technical field [0001] The invention relates to the technical field of integrated circuit security, in particular to a security chip. Background technique [0002] Security chip refers to an integrated circuit chip with encryption technology, which is widely used in digital signature, identity authentication, information encryption and other fields. Existing security chips generally include one or more encryption algorithms, some of which are implemented in software, and some are implemented in hardware. [0003] An attack method that does not destroy the encryption algorithm of the integrated circuit chip to obtain the ciphertext or key is the energy attack. The manufacture of integrated circuits uses a large number of CMOS (Complementary Metal-Oxide-Semiconductor Transistor, Complementary Metal Oxide Semiconductor) tubes, which leads to different energy consumption for executing different instructions. In addition, the storage of 0 or 1 can also reflect the difference in...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/00G06F1/00G06F21/34
Inventor 毛兴中谢巍吕渊王旭
Owner LENOVO (BEIJING) LTD