Supercharge Your Innovation With Domain-Expert AI Agents!

Hardware Trojan defense method and device based on fully homomorphic encryption algorithm

A fully homomorphic encryption and hardware Trojan horse technology, which is applied to secure communication devices, public keys for secure communication, electrical components, etc., can solve problems such as the inability of integrated circuits to prevent Trojan horse implantation, save time and costs, and defend against attacks Effect

Inactive Publication Date: 2017-02-22
SHENZHEN INST OF ADVANCED TECH CHINESE ACAD OF SCI
View PDF0 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] In view of this, the technical problem to be solved by the present invention is to provide a hardware Trojan horse defense method and device based on a fully homomorphic encryption algorithm, which solves the problem that the prior art cannot prevent Trojan horse implantation on the entire integrated circuit

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Hardware Trojan defense method and device based on fully homomorphic encryption algorithm
  • Hardware Trojan defense method and device based on fully homomorphic encryption algorithm
  • Hardware Trojan defense method and device based on fully homomorphic encryption algorithm

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0019] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention clearer, the spirit of the disclosure of the present invention will be clearly described below with the accompanying drawings and detailed descriptions. Any person skilled in the art will understand the embodiments of the present invention. , when it can be changed and modified by the technology taught in the content of the present invention, it does not depart from the spirit and scope of the content of the present invention.

[0020] The exemplary embodiments and descriptions of the present invention are used to explain the present invention, but not to limit the present invention. In addition, elements / members with the same or similar numbers used in the drawings and embodiments are used to represent the same or similar parts.

[0021] As used herein, "first", "second", ... etc. do not refer to a particular sequence or order, nor are they used to limit the pre...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a hardware Trojan defense method and device based on a fully homomorphic encryption algorithm. The method is characterized by comprising the following steps: encrypting plaintext data by use of a public key generated by the fully homomorphic encryption algorithm to produce initial ciphertext data; computing the initial ciphertext data by use of a ciphertext computing public key generated by the fully homomorphic encryption algorithm to obtain the final ciphertext data; and decrypting the final ciphertext data by use of a private key generated by the fully homomorphic encryption algorithm to obtain the final plaintext data. Through the adoption of the method disclosed by the invention, the hardware Trojan can be prevented from being implanted into an integrated circuit from the source; the technical scheme disclosed by the invention can be applied to the entire integrated circuit, the hardware Trojan cannot be implanted into any part of the integrated part, and the security is greatly improved.

Description

technical field [0001] The present invention relates to the field of computer security, in particular to a defense method for an integrated circuit hardware Trojan horse, specifically a hardware Trojan horse defense method and device based on a fully homomorphic encryption algorithm. Background technique [0002] With the rapid development of information technology, various smart products and equipment are increasingly dependent on integrated circuits. However, with the continuous improvement of integrated circuit functions and process complexity, the entire process from design to delivery of integrated circuits requires the cooperation of multiple parties. However, this multi-party integrated circuit development model gives attackers the opportunity to access the original design and Carry out some malicious modifications, and this malicious modification to the original hardware design is called a hardware Trojan horse. At present, there have been various examples of hardwa...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04L9/30H04L29/06
CPCH04L9/0822H04L9/0861H04L9/30H04L63/0428H04L63/145
Inventor 谢宏峰李慧云
Owner SHENZHEN INST OF ADVANCED TECH CHINESE ACAD OF SCI
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More