Side-channel attack resisting processor architecture based on random instruction delay

A processor architecture and bypass attack technology, applied in the field of information security, can solve problems such as reducing the signal-to-noise ratio of DPA attacks, and achieve the effect of enhancing the ability to resist side-channel attacks and increasing the number of states.

Active Publication Date: 2013-09-25
戴葵
View PDF3 Cites 18 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, a single random delay approach proved to be limited
Studies have shown that for DPA (Differential Power Analysis) attacks, after inserting random time delays, although a single bias spike is dispersed into several small spikes at different positions, which significantly reduces the signal-to-noise ratio of DPA attacks, but if the attacker can estimate the time The range of delays that may occur, that is, to determine the time delay window, then by analyzing the total power consumption in this time window, the signal-to-noise ratio of DPA attacks can be effectively improved, making the random delay technology invalid

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Side-channel attack resisting processor architecture based on random instruction delay
  • Side-channel attack resisting processor architecture based on random instruction delay

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0046] All features disclosed in this specification, or steps in all methods or processes disclosed, may be combined in any manner, except for mutually exclusive features and / or steps.

[0047] The present invention will be described in further detail below in conjunction with the accompanying drawings.

[0048] figure 1 Shown is a block diagram of the processor architecture of the present invention, and the instruction storage of the present invention is used to store all super long instruction words required by the instruction random scheduling module;

[0049] The instruction random scheduling module can randomly schedule multiple instructions that can be executed in parallel and issue them out of order;

[0050] The data memory is used to store the data required for execution by the central processing unit;

[0051] The central processing unit is used to execute instructions, that is, an instruction execution unit, and the instruction execution unit is divided into n pip...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a side-channel attack resisting processor architecture based on random instruction delay. The architecture is that an instruction memory is connected with an instruction random scheduling module, a central processing unit is connected with a multi-channel selector, a random flowing water section delay module and a data memory respectively, the multi-channel selector is connected with the instruction random scheduling module and a random waste instruction injection module respectively, and a random number generating module is connected with the random waste instruction injection module, the instruction random scheduling module and the random flowing water section delay module respectively. The side-channel attack resisting processor architecture enables a specific operation execution time point of side-channel attack not to be confirmed through an instruction random scheduling and out-of-order execution mode, a random waste instruction injection mode, a random flowing water section operation delay mode and the like, accordingly enables statistic analysis to be difficult to perform, greatly enhances the side-channel attack resisting capacity of a system and avoids cryptographic algorithm decryption caused by leakage of side-channel information.

Description

technical field [0001] The invention relates to the field of information security, and relates to a processor architecture against bypass attacks, in particular to a processor architecture against bypass attacks based on random instruction delay. Background technique [0002] Information security chips have been widely used in various fields, mainly to complete the safe storage of user key data, data encryption and decryption, digital signature and authentication, and identity authentication. The security chip is often used as the core of security control and the root of trust in various application systems, so the security of the security chip itself plays a key role in the entire system. [0003] The security of a security chip largely depends on the complexity of the cryptographic algorithm in the chip and the security of the key. Currently widely used cryptographic algorithms have reached a very high complexity, and cryptanalysis in the mathematical sense is almost impo...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F9/38G06F21/76
Inventor 贺章擎刘恺彭浩喻祖华敖天勇刘朝晖李隆戴葵
Owner 戴葵
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products