Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

On-chip power supply network verification method for side channel attack

A power supply network and side-channel attack technology, which is applied to electrical components, encryption devices with shift registers/memory, digital transmission systems, etc., can solve the problems of high cost, inability to verify chip anti-attack capabilities, low accuracy, etc. problems, to achieve the effect of low cost, improved coverage, and improved accuracy

Active Publication Date: 2017-06-09
TSINGHUA UNIV
View PDF5 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, in the current design, only the figure 1 The shown FPGA hardware platform verifies the anti-side-channel attack capability of the designed chip, which is costly
Moreover, this method can only verify the algorithm and circuit design, and cannot verify the impact of the actual physical parameters of the power supply network on the chip's anti-attack capability, and the accuracy is low.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • On-chip power supply network verification method for side channel attack
  • On-chip power supply network verification method for side channel attack
  • On-chip power supply network verification method for side channel attack

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0049] image 3 It is a flowchart of an on-chip power supply network verification method for side channel attacks in an embodiment of the present invention. Combine below image 3 Taking a test benchmark (a set of plaintext-ciphertext data pairs) as an example, each step and its principle are described in detail.

[0050] Step S110, performing logic synthesis and physical design on the register transfer level netlist file of the chip to obtain the transistor level netlist file.

[0051] Among them, the verification process from the register transfer level netlist file to the transistor level netlist file is compatible with the current mainstream electronic design automation software. In this embodiment, the existing electronic design automation software tools are used to perform logic synthesis and physical design on the register transfer level netlist file to obtain the transistor level netlist file. The specific process is as follows:

[0052] First, read in the register-t...

Embodiment 2

[0087] This embodiment is based on SMIC's 180nm process, and uses mainstream electronic design automation software to complete the design of an encryption chip using a 128-bit Advanced Encryption Standard (AES, Advanced Encryption Standard) encryption algorithm. The input of the chip is a 128-bit key and 128-bit plaintext, and the output is an encrypted 128-bit ciphertext. Next, different power supply networks are designed for the chip, and the design schemes AES-1 and AES-2 are obtained respectively, and the impact of different power supply networks on the ability to resist bypass attacks is verified and analyzed. The working process of the verification method of the present invention and the verification effect achieved are further described in detail.

[0088] Based on the Verilog language design of the encryption algorithm, and SMIC's 180nm standard cell library and process library files, the logic synthesis and physical design are completed.

[0089] Extract circuit para...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an on-chip power supply network verification method for a side channel attack. The method comprises: logical synthesis and physical design processing is carried out on a register transmission level netlist file of a chip to obtain a transistor level netlist file; according to the obtained transistor level netlist file, a circuit model including a power supply network and a load is established; according to a generated plaintext-ciphertext data pair and a corresponding secret key, a logic process for encryption operation execution on the chip is simulated to obtain a current waveform file of the load; on the basis of the circuit model and the current waveform file of the load, a physical process for encryption operation execution on the chip is simulated to obtain a power consumption curve of the chip; according to the obtained power consumption curve, a side channel attack is carried out on the chip to obtain a guess secret key of the attack; and on the basis of the obtained guess secret key, a side channel attack result is analyzed and an anti-side channel attack capability of the power supply network is verified. The method has advantages of low cost, high accuracy, and reduced design verification period.

Description

technical field [0001] The invention relates to the technical field of integrated circuit design verification, in particular to an on-chip power supply network verification method for bypass attacks. Background technique [0002] In recent years, various attacks of different levels and levels have appeared, making chips face more and more serious security challenges. Among them, the side-channel attack poses a serious threat to the security of the chip. The side-channel attack obtains the internal data of the chip from the bypass signal by statistically analyzing the power consumption and other bypass signals leaked by the chip, thereby deciphering the encrypted information. In addition, bypass signals such as power consumption generated by the chip during operation will be conducted to the outside of the chip through the on-chip power supply network, and then monitored by the outside world. Therefore, the power supply network plays an important role in the chip's ability ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/00H04L9/06
Inventor 蔡懿慈王晨光闫明周强
Owner TSINGHUA UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products