Unlock instant, AI-driven research and patent intelligence for your innovation.

Side channel attack simulation system of cryptographic chip

A side-channel attack and simulation system technology, applied in the field of security testing, can solve problems such as high cost, error-prone costs, and time-consuming security assessment, and achieve the effect of strong flexibility

Inactive Publication Date: 2021-01-29
TIANJIN JINHANG COMP TECH RES INST
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] The technical problem to be solved in the present invention is: bypass attack is a powerful physical security analysis method, and the security assessment of cryptographic chip bypass attack is generally carried out in the later stage of production, but the safety assessment of side channel attack in the later stage of production has certain advantages. Time-consuming, error-prone and expensive disadvantages

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Side channel attack simulation system of cryptographic chip
  • Side channel attack simulation system of cryptographic chip

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] In order to make the purpose, content, and advantages of the present invention clearer, the specific implementation manners of the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments.

[0030] In order to solve the problems of the prior art, the present invention provides a side-channel attack simulation system of a cryptographic chip, such as figure 1 As shown, the side-channel attack simulation system includes: a system configuration module, a simulator and an analyzer;

[0031] The system configuration module is used to set the initial operating environment of the emulator module and the analyzer module according to the parameters input by the user; as figure 2 shown;

[0032] The emulator is used to run the algorithm program on a virtual specific hardware platform, establish a bypass leakage information database according to the pre-established bypass information leakage model, and analyze the e...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention belongs to the technical field of security testing, and particularly relates to a side channel attack simulation system of a cryptographic chip. The side channel attack simulation systemcomprises a system configuration module, a simulator and an analyzer. According to the method, the thought of software and hardware collaborative design is adopted, and a side channel attack simulation evaluation scheme is designed through a method of separating a leakage simulation mechanism from a security analysis strategy. Simulation implementation and analysis implementation of bypass leakage are separated, a component technology is adopted for packaging the bypass leakage, and high flexibility is achieved. Different bypass leakage information and attack strategies can be added into theenvironment in the form of components, so that a tester can flexibly select test data and analysis strategies according to test requirements, and simulation analysis can be performed on bypass attacksin the design stage of a cryptographic chip.

Description

technical field [0001] The invention belongs to the technical field of security testing, and in particular relates to a bypass attack simulation system of a cryptographic chip. Background technique [0002] Side-channel attack is a security testing method, that is, to find the existing security loopholes (or to crack the secret) by testing the leaked information of the cryptographic chip. This analysis method requires the support of corresponding bypass simulation tools, that is, simulates the bypass leakage information of cryptographic chips during operation through simulation technology in the design stage. [0003] Test methods for side channel attacks can be divided into two categories: test methods for side channel attacks in the later stage of chip production and test methods for side channel attacks in the chip design stage. [0004] The side-channel attack analysis method in the later stage of chip production is a relatively common method. Its main feature is to tes...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/57G06F16/242G06F30/30
CPCG06F21/577G06F16/242G06F30/30
Inventor 赵斌王辉鲁毅
Owner TIANJIN JINHANG COMP TECH RES INST