Safety detection method and device for cipher chip

A cryptographic chip and security detection technology, applied in the field of cryptographic chip security detection methods and devices, can solve the problems of lack of internal structure observation of cryptographic chips, lack of precise control of laser energy, lack of laser injection time and space coordinated control, etc. The effect of efficient laser scanning injection and ciphertext data screening, strong scalability and flexibility

Active Publication Date: 2018-06-15
NAT SPACE SCI CENT CAS
View PDF10 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

At present, the existing detection methods of laser injection into cryptographic chips lack the precise control of laser energy, the observation of the internal structure of cryptographic chips, and the lack of coordinated control of laser injection time and space.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Safety detection method and device for cipher chip
  • Safety detection method and device for cipher chip
  • Safety detection method and device for cipher chip

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0099]The present invention provides a specific embodiment, using a detection device for injecting laser into a cryptographic chip of the present invention to detect a cryptographic chip under test using the DES algorithm, and intends to adopt the 16th round of attack strategy, such as Figure 6 As shown, the laser is injected into the DES logic operation area of ​​the cryptographic chip under test at different times to obtain several sets of correct-wrong ciphertext data, screen the ciphertext samples that meet the attack strategy, and judge whether it can be recovered through the corresponding differential fault analysis method. A key or part of a key. Its specific steps include:

[0100] Step 1) Determine the attack strategy to be adopted according to the specific cryptographic system and implementation method of the cryptographic chip under test. This embodiment adopts the sixteenth round of attack strategy for the DES algorithm. It is hoped that the sixteenth round of the...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a safety detection method for a cipher chip. The method comprises the following steps: carrying out laser injection on the cipher chip at one or more first laser injection points according to a laser attack strategy, so that the cipher chip generates one or more first cipher texts; analyzing the one or more first cipher texts, and screening out one or more second laser injection points, which comply with the laser attack strategy, from the one or more first cipher texts, wherein the one or more first cipher texts are respectively associated with the one or more first cipher texts; carrying out laser injection on the cipher chip at the one or more second laser injection points at different laser triggering times; screening out one or more third laser injection points, which comply with the different laser triggering times, from the one or more second cipher texts generated by the cipher chip, wherein the one or more second cipher texts are respectively associated with the one or more second laser injection points; and carrying out key analysis according to the one or more third laser injection points to obtain a key for recovering the cipher chip.

Description

technical field [0001] The invention belongs to the technical field of information security, and in particular relates to a method for detecting security of a cryptographic chip and a device thereof. Background technique [0002] A cryptographic chip refers to an integrated circuit chip that implements one or more cryptographic algorithms and uses a cryptographic system to protect keys and sensitive information. The core of a cryptographic chip is usually an intelligent CPU chip that can run cryptographic algorithms. At present, encryption chips have been widely used in government affairs, finance, public security, national defense, civil affairs, communications, transportation, health, education, logistics, water, electricity and other fields. These fields are related to public security and economic and social development. The core foundation of information system security. Therefore, the development of security detection technology for cryptographic chips is very critica...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04L9/00G01R31/308H04L12/26
CPCG01R31/308H04L9/004H04L9/0861H04L43/50
Inventor 朱翔韩建伟马英起上官士鹏李悦
Owner NAT SPACE SCI CENT CAS
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products