摘要:
An anti-tampering detector (10) and a method for detecting a physical attack are provided, wherein the anti-tampering detector (10) includes a temperature sensor (110), a voltage detector (120), a frequency detector (130) and a controller (100). The temperature sensor (110) is configured to generate a temperature code according to an operation temperature. The voltage detector (120) is configured to generate a voltage code according to a supply voltage and the temperature code. The frequency detector (130) is configured to generate a frequency code according to a system clock, the temperature code and the voltage code. The controller (100) is configured to generate an anti-tampering detection result according to the temperature code, the voltage code and the frequency code. The anti-tampering detection result indicates whether any of the operation temperature, the supply voltage and the system clock is tampered with due to the physical attack.
摘要:
The present invention relates to a test method of a circuit, comprising: acquiring a plurality of value sets comprising values of a physical quantity linked to the activity of a circuit to be tested when the circuit executes an operation of a set of distinct cryptographic operations applied to a secret data, selecting at least a first subset in each value set, for each value set, counting by a processing unit occurrence numbers of values transformed by a first surjective function applied to the values of the first subset of the value set, to form an occurrence number set for the value set, for each operation of the operation set, and each of the possible values of a part of the secret data, computing a partial operation result, computing cumulative occurrence number sets (CH) by adding the occurrence number sets corresponding to the operations of the operation set, which when applied to a same value or equivalent value of the possible values of the part of the secret data, provide a partial operation result having a same transformed value resulting from the application of a second surjective function, merging according to a selected merging scheme, cumulative occurrence numbers in the cumulative occurrence number sets (HT), and analyzing the merged cumulative occurrence number sets (HTR1) to determine the part of the secret data.
摘要:
The present invention relates to a test method comprising: acquiring a plurality of value sets (Ci), each value set comprising measurements or logic signals, linked to the activity of a circuit to be tested when it executes an operation of a set of distinct cryptographic operations applied to a same secret data, selecting at least two subsets (EC1 i, EC2i) of values in each value set (Ci), for each value set, computing combined values (Wi) combining together one value in each value subset, for each value set, counting occurrence numbers of values transformed by a first surjective function applied to the combined values of the value set, for each operation of the operation set, and each possible values of a part of the secret data, computing a partial operation result, computing cumulative occurrence number sets obtained by adding the occurrence number sets corresponding to the operations of the operation set, which when applied to a same value of the possible values of the part of the secret data, provide a partial operation result having a same transformed value by a second surjective function, and analyzing the cumulative occurrence number sets to determine the part of the secret data.
摘要:
A processing system includes a processor and a temperature security module coupled to provide a temperature tamper signal to the processor. The temperature security module includes a shelf mode trim value, an operating mode trim value, and a programmable temperature trim value. One of the programmable temperature trim value, the shelf mode trim value, and the operating mode trim value, is used based on a deployment mode of the processing system to set a temperature monitor trim value.
摘要:
A circuit configuration for secure application includes several internal frequency detectors (10) arranged in digital units at critical points of an integrated circuit (30). The clock detectors (10) are concealed in the digital part of the integrated circuit (30) each as a standard cell (flip-flop unit) in order to prevent any external manipulation and in order to hide its function. The clock detectors (10) are preferably disposed in a clock tree topology, which can be at several levels for distributing the clock signal through the different digital unit tree at critical points. Alarms are generated via a clock detector network if at any level an external clock attack has been monitored.
摘要:
A scan chain security capability is provided herein. The scan chain security capability enables secure control over normal use of a scan chain of a system, e.g., for purposes such as testing prior to deployment or sale of the system, in-field testing after deployment or sale of the system, in-field modification of the system, and the like. The scan chain security capability enables secure control over normal use of a scan chain by enabling control over interruption of a scan chain and re-establishment of an interrupted scan chain. A scan chain security component is configured for removing an open-circuit condition from the scan chain in response to a control signal. The control signal may be generated in response to validation of a security key, in response to successful completion of a challenge-based authentication process, or in response to any other suitable validation or authentication. The scan chain security component also may be configured for creating an open-circuit condition in the scan chain in response to a second control signal. The second control signal may be a scan register value received via the scan chain.
摘要:
Method and system for protecting content in a programmable system is provided. The system is connectable to an external device through one or more access ports. Content protection method/manager is implemented by assigning one or more access modes to the access port and switching the access modes. In response to a current access mode, the content protection method/manager restricts visibility of the system to the external device via the access port.
摘要:
The invention relates to a method for testing cryptographic circuits. The invention also relates to a cryptographic circuit that can be tested, the cryptographic circuit including registers and logic gates (211, 212, 213, 214). According to the invention, a test comprises carrying out a differential consumption analysis (DPA) of the circuit registers. In a cryptographic circuit being secured and including a first half-circuit (211, 214) combined with a second half-circuit (212, 213) operating in a complementary logic, the power supply (Vdd1, 23, 25) of the first half-circuit is separated from the power supply (Vdd2, 24) of the second half-circuit, the differential consumption analysis being carried out in parallel on each half-circuit and both power supplies being grouped together into the same power supply after the test.