DPA (Differential Power Analysis) security evaluation and countercheck method and device

A security and analysis method technology, which is applied in the field of DPA security evaluation and countermeasures and its devices, can solve problems such as difficulty in ensuring chip security, and achieve the effect of realizing intelligence and improving analysis capabilities

Active Publication Date: 2012-01-18
WUHAN UNIV
View PDF3 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] Due to the existence of side-channel attacks, it is difficult to guarantee the security of the chip, so the chip designer needs to make a reasonable evaluation of the security of the chip

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • DPA (Differential Power Analysis) security evaluation and countercheck method and device
  • DPA (Differential Power Analysis) security evaluation and countercheck method and device
  • DPA (Differential Power Analysis) security evaluation and countercheck method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0057] A DPA security evaluation and confrontation method, comprising the following steps:

[0058] Step 1, system configuration by the system configuration module: including fitting tool settings, component library settings and tool path settings used in the analysis process; tool settings include: HSPICE, Design Compiler, HSIM component library settings include: HSPICE, Design Compiler , component library corresponding to HSIM; tool path settings include: installation path corresponding to HSPICE, Design Compiler, and HSIM; confrontation methods include: WDDL confrontation method, KANO confrontation method, user-defined method; performance parameters in the analysis report include: circuit resources Situation, signal-to-noise ratio; security parameter settings include: correlation coefficient, conditional entropy and mutual information, and number of energy traces.

[0059] Step 2, parameter setting is performed by the parameter setting module: including analysis mode, conf...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to the field of crypto chip security and particularly relates to a DPA (Differential Power Analysis) security evaluation and countercheck method and device. In the invention, a set of automated platforms, which is suitable to multiple angles and multiple layers and integrates the functions of power-consumption sampling, leakage analysis, evaluation and countercheck, is fitted by adding a novel DPA analysis method and a countercheck method on the basis of a plurality of layers of chip development tools, power-consumption testing tools, various power-consumption leakage analysis model and the like, and the automated platform can be used for assisting chip designers to objectively and reasonably analyze and evaluate a power-consumption resistant capability in a convenient and transparent manner as much as possible. Accordingly, the DPA security evaluation and countercheck method and device disclosed by the invention have the following advantages that: 1, by adding and introducing a novel polar DPA and reverse attack analysis method in the platform, the circuit can be evaluated more reasonably; and 2, by adding a novel KANO countercheck method in the platform, a new countercheck manner is provided for a user.

Description

technical field [0001] This patent relates to the security field of cryptographic chips, in particular to a DPA security evaluation and countermeasure method and its device. [0002] Background technique [0003] Side Channel Attack (Side Channel Attack) is an analysis method that relies on physical information such as power consumption, time, and electromagnetic radiation leaked during the encryption process to crack the key. [0004] DPA (Differential Power Analysis) attack is a type of side-channel attack (SCA), which uses the relationship between power consumption, running instructions, and data being executed to attack the key. DPA attacks use a digital oscilloscope to measure the circuit board, record several power consumption curves while encrypting a large amount of random plaintext data, and divide the curve groups according to a certain bit. Correct division will result in a peak on the differential power consumption curve, thereby obtaining the key and successfu...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/06
Inventor 唐明伍前红邱镇龙高思程平攀赵黎卢春红
Owner WUHAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products