Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and circuit for detecting clock burrs of security chip

A security chip and clock burr technology, applied in computer security devices, electrical digital data processing, generation/distribution of signals, etc., can solve problems that cannot meet the requirements of security applications, and achieve the effect of preventing solidification attacks

Active Publication Date: 2021-02-19
SHANGHAI AISINOCHIP ELECTRONICS TECH
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This puts forward higher requirements for the anti-attack of the security chip. Only implementing encryption and decryption can no longer meet the requirements of security applications.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and circuit for detecting clock burrs of security chip
  • Method and circuit for detecting clock burrs of security chip
  • Method and circuit for detecting clock burrs of security chip

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0038] The technical solutions in the embodiments of the present invention will be clearly and completely described and discussed below in conjunction with the accompanying drawings of the present invention. Obviously, what is described here is only a part of the examples of the present invention, not all examples. Based on the present invention All other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0039] In order to facilitate the understanding of the embodiments of the present invention, specific embodiments will be taken as examples for further explanation below in conjunction with the accompanying drawings, and each embodiment does not constitute a limitation to the embodiments of the present invention.

[0040] like figure 1 As shown, this embodiment provides a method for detecting clock glitches of a security chip, including the following steps:

[0041] S101: Set the ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a method and a circuit for detecting clock glitches of a security chip, and the method for detecting the glitches comprises the following process: setting a plaintext inputted into a plaintext register, carrying out the round number selection, carrying out the encryption of the plaintext for a plurality of times through a single-round symmetric algorithm engine according tothe round number, and obtaining an encryption result; encrypting the plaintext and the detection clock corresponding to the round number to calculate a detection result, and setting and outputting anexpected register to obtain an expected result; comparing the encryption result with an expected result, and if the encryption result is not equal to the expected result, detecting that a clock is abnormal and giving an alarm, wherein the single-round symmetric algorithm engine directly uses a single-round engine of a symmetric algorithm in the security chip. According to the method, the single-round symmetric algorithm engine of the symmetric algorithm module embedded in a security chip is used, and an existing circuit is repeatedly used; different frequency points of a clock can be detected,and clock glitches can be well detected under the condition of working clock frequency division.

Description

technical field [0001] The invention relates to the technical field of security chip protection, in particular to a method and circuit for detecting clock burrs of a security chip. Background technique [0002] With the development and application of information technology, data security is becoming more and more important. Data transmission and storage rely on the encryption function of security chips, including symmetric encryption and asymmetric encryption. [0003] With the widespread use of security chips, hackers and attackers have used various methods to attack chips, from non-intrusive side-channel attacks to intrusive attacks. This puts forward higher requirements for the anti-attack of the security chip. Only implementing encryption and decryption can no longer meet the requirements of security applications. [0004] The working environment inspection of the security chip includes detection of working voltage, working temperature, working clock, etc.; wherein the ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/72G06F21/75G06F1/04
CPCG06F21/72G06F21/75G06F21/755G06F1/04
Inventor 孙坚周玉洁王大永
Owner SHANGHAI AISINOCHIP ELECTRONICS TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products