Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Quantification and evaluation method for cipher safe chip side channel safe degree

A technology of cryptographic security and security degree, which is applied in the field of quantitative evaluation of cryptographic security chip side channel security degree, and can solve problems such as inability to evaluate the security degree of cryptographic security chip

Active Publication Date: 2009-07-29
SHENZHEN INST OF ADVANCED TECH
View PDF0 Cites 15 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In view of this, it is necessary to provide a method that can solve the problem that the side channel analysis attack cannot evaluate the security degree of the key of the cryptographic security chip under the side channel analysis attack. Quantitative evaluation method for side channel security degree of cryptographic security chip to evaluate the security degree of cryptographic security chip key under side channel analysis attack

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Quantification and evaluation method for cipher safe chip side channel safe degree
  • Quantification and evaluation method for cipher safe chip side channel safe degree
  • Quantification and evaluation method for cipher safe chip side channel safe degree

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] The quantitative evaluation method for side channel security degree of cryptographic security chip includes: obtaining at least two correlation coefficients between power consumption and Hamming weight; calculating normalized difference; outputting evaluation results.

[0026] figure 1 It is a schematic diagram of the system for evaluating the security level of the side channel of the cryptographic security chip. The system 100 for evaluating the side channel security degree of a cryptographic security chip includes a computer 101 , an oscilloscope 102 , a cryptographic security chip 103 and a test resistor 104 . The common ground pin (VSS) of the cryptographic security chip 103 is grounded through the test resistor 104 . The voltage at both ends of the test resistor 104 represents the magnitude of the current flowing from the supply voltage pin (VCC) of the cryptographic security chip 103 to the common ground pin, thereby characterizing the power consumption of the cr...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a quantitative evaluation method of safety degree of a side channel of a code safety chip. The method comprises the following steps of: obtaining at least two relevant coefficients of power consumption and Hamming weight; calculating a normalized difference value; and calculating the safety coefficient of the side channel of the code safety chip. The method can evaluate the safety degree under the analytical attack of the side channel of a key of the code safety chip.

Description

technical field [0001] The invention relates to the field of electronic encryption and decryption, in particular to a quantitative evaluation method for side channel security degree of a cryptographic security chip. Background technique [0002] Cryptographic security chips are widely used in electronic products, such as smart cards, trusted computing modules, radio frequency identification (Radio Frequency Identification), online banking USB Key, etc. Cryptographic security chips refer to chips capable of performing cryptographic algorithm operations, including dedicated algorithm chips and general-purpose chips with encryption and decryption operations. In practical applications, analysts can obtain key information by obtaining electrical or electromagnetic signals during the operation of cryptographic algorithms and analyzing the changes of these electrical or electromagnetic signals with the input plaintext. This method of cryptanalysis is called Side-channel analysis a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/06H04L29/06
Inventor 李慧云于峰崎袁海
Owner SHENZHEN INST OF ADVANCED TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products