Crypto chip system and secret key extraction method

A cryptographic chip and key technology, applied in encryption devices with shift registers/memory, etc., can solve the problems of difficulty in cloning by adversaries, difficulty in meeting the requirements of high security level keys with reliability and efficiency, and inability to produce PUF, etc. achieve good randomness

Inactive Publication Date: 2012-07-04
SOUTH CHINA UNIV OF TECH +1
View PDF1 Cites 22 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] 2) Difficult to clone: ​​the basis of PUF is the deviation beyond the control of the manufacturer, and the manufacturer cannot produce the same PUF, so it is diffi

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Crypto chip system and secret key extraction method
  • Crypto chip system and secret key extraction method
  • Crypto chip system and secret key extraction method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0068] Such as figure 1 The cryptographic chip shown includes a public key cryptographic engine, a symmetric cryptographic engine, a HASH engine, a one-way function engine, a non-volatile memory, an execution engine, t key coordinators and a dual arbiter physical unclonable module DAPUF, and the DAPUF Sensitive circuits are arranged on the periphery of the encryption chip, forming a cage structure to surround all execution engines. The t cryptographic coordinators are connected through the IO bus, and the non-volatile memory is integrated in the chip.

[0069] The public key cryptographic engine is used to perform encryption and verification of messages, extract keys from DAPUF for decryption and signature, and is also used to perform encryption operations on effective response shares in the key generation phase.

[0070] The symmetric cipher engine is used to encrypt and decrypt information, and the key used may be a key exchanged temporarily or extracted from DAPUF.

[007...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a crypto chip system and a secret key extraction method. The system comprises a public key crypto engine, a symmetry crypto engine, a HASH engine, a one-way function engine, a nonvolatile memory, an execution engine, t secret key assistant management parties and a double-arbiter physical unclonable function module DAPUF. The other purpose of the invention aims at providing a secret key extraction method of the crypto chip system. The method comprises the steps of (1) a secret key generation stage, and (2) a secret key reconstruction stage. According to the invention, an effective bit is selected by an exclusive-or result of the DAPUF, and in combination with the steps and under a condition that multiple challenge/response characteristics are provided, the system and the method enable the obtained response to have the characteristics of no 01 deviation on probability, reliable reconstruction certainty, low average time complexity, small challenge and response redundancy, physical invasion attack sensation and the like.

Description

technical field [0001] The invention relates to the security field of cryptographic chips in information security, in particular to a cryptographic chip system with a high security level and a key extraction method based on the cryptographic chip system. Background technique [0002] High security level keys are usually stored in volatile memory with a tamper detection network. The volatile memory needs long-term power supply to store the key. It can still keep the data for a long time after power failure at low temperature. The cost of the tamper detection network is not low and It has also been proved by the physical intrusion attack PIA experiment that it is not unbreakable. [0003] Extracting the key from the physical unclonable module PUF instead of the key storage scheme has attracted the attention of researchers. PUF is a complex physical system that utilizes the deviation of the production process, its input is called challenge (C), and its output is response (R), ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/06
Inventor 邹候文唐韶华唐屹唐春明彭俊好苏胡双
Owner SOUTH CHINA UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products