The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The transition effect ring oscillator (TERO) based true random number generator (TRNG) was proposed by Varchola and Drutarovsky in 2010. There were several stochastic models for this advanced TRNG based on ring oscillator. This paper proposed an improved TERO based TRNG and implements both on Altera Cyclone series FPGA platform and on a 0.13um CMOS ASIC process. FPGA experimental results show that...
In a complex security SoC, multiple crypto IP cores are used in real-time, which brings a lot of interruptions to CPU by regular solutions. In this regard, a specific data transfer controller(SDTC) is proposed in this work, which can process encryption and decryption tasks with pipelined operations. Using SDTC to process these tasks can economize CPU source to improve entire performance of SoC. Besides,...
The Keyed-Hash Message Authentication Codes(HMAC) is a useful mechanism for message authentication. In this paper, a high-performance HMAC/SHA-3 processor which can generate HMAC message digest and hash message digest is presented. Not only the standard length (224,256,384,512) of the message digest can be generated, but also a length of 64-bit message digest. Due to the application of new generation...
For pursuing the high speed information transmission, the design and research of the high speed SerDes circuit are actively developing now. Due to the requirements for long transmission path, intensive equalization and high speed transmission circuit testing function, two high speed SerDes circuits are designed and fabricated based on 130nm SiGe BiCMOS technology. One is for the research of the equalization...
With the development of Public Key Infrastructure (PKI) information technology, USB Key are being more and more used. When the Side Channel Attacks (SCA) caused a huge threat to the smart card, we also concerned about the impact which will be given on USB Key's security. Because of the different implementation and interface protocols, the side channel security characteristics between them are different...
SM4 is a 128-bit block cipher used in the WAPI (Wireless LAN Authentication and Privacy Infrastructure) standard for protecting data packets in WLAN. This paper proposes a novel method of CPA (Correlation Power Analysis) on SM4 based on chosen-plaintext. Using SM4 as target algorithm, Sakura-G FPGA board as hardware verification platform, we only collect 1000 power consumption waveforms to obtain...
This paper presents a High-Voltage High-PSRR (HVHP) power management circuit used in high-precision battery parameters acquisition chip for Battery Management System for new energy vehicles. It consists of a pre-regulator, a high PSRR (power supply rejection ratio) self-regulated bandgap voltage reference (BGR), high voltage linear regulator, with the capability of soft start, over current detect,...
This Letter presents a self-controlled physical unclonable function (PUF) circuit and its application in encrypting on-chip memories of IC bank cards. The PUF circuit is based on cross-coupled NAND gates. Voting and Hamming code address the stability of its outputs. The Monte Carlo simulation and field-programmable gate array board are used for verification. The Voting method improves the error rate...
Hardware trojan detection is paid more and more attention in recent years due to the great potential threat imposed by hardware trojan to the whole integrated circuit industry. In this paper, ring oscillator network based hardware trojan detection method is tactfully implemented in FPGA and a novel corresponding detection algorithm is proposed. Incremental compilation technique is applied to design...
This paper introduces RC4 stream cipher which is widely used in the TLS/SSL protocol and several weaknesses in its algorithm. In order to enhance the security of RC4, this paper proposes a new masking scheme using random number for both input key and the internal states of RC4. This improved RC4 has destroyed the foundation of many attacks on RC4, especially the template attack. The new algorithm...
Side-channel analysis is becoming a major threat to the security chips of smart cards, including power analysis, electromagnetic analysis and fault injection. Based on software hardware co-design, we implemented a side-channel analysis platform covering CPA/DPA/TA/CA methods, which could effectively reveal the secret keys on security chips. Our work integrates power analysis, electromagnetic analysis...
True random number generator (TRNG) is a vital part of many cryptographic protocols. This paper introduces a ring oscillator based TRNG for smart IC card. To generate high quality random bits, inter-stage feedback ring is introduced to control the frequency of the high speed ring oscillator to accumulate the phase noise. To detect electromagnetic attack [1], a detection circuit is designed. This TRNG...
The Chinese hash algorithm SM3 is verified to be secure enough, but improper hardware implementation may lead to leakage. A masking scheme for SM3 algorithm is proposed to ensure the security of SM3 based Message Authentication Code (MAC). Our scheme was implemented in hardware, which utilizes hardware oriented secure conversion techniques between boolean and arithmetic masking. Security evaluation...
Side-channel power analysis attacks have been proven to be the most powerful attacks on implementations of cryptographic primitives. DPA and CPA are probably the most wide-spread practical attacks on numerous embedded cryptographic systems. Additive noise is a kind of typical power analysis resistant implementing technique. The success rate of the DPA and CPA attacks is significantly affected by the...
This paper propose a new masking scheme for SM4 s-box based on composite field. Through isomorphism bit matrices, we simplify the calculation by changing finite field inversion from GF(28) toGF(((22)2)2) to reduce the computational difficulty. We carefully modify the inversion to ensure every intermediate value is masked during the process. The theoretical analysis and simulated CPA proves the effectiveness...
Template attack is more powerful than SPA and CPA in some situations. In this paper, a novel template attack named DTTA is proposed to attack the wNAF algorithm of ECC. SM2 is the Chinese public key cryptosystem standard issued in 2010. Few results of side channel attack on SM2 have been found so far. We exploit the Riscure platform to analyze decryption of SM2 in a smart IC card. We also compare...
This paper proposed a Mixed-Voltage Bidirectional (MVB) I/O IP core for an automotive Body Control Module (BCM) SoC. It is based on a conventional bidirectional I/O circuit, four configuration signals with a constraints module, and level shifters to transform 1.8V core logic to 3.3V or 5V external logic are added. Data level shifter and input Schmitt trigger are modified to achieve low power strategy...
Bank IC cards are now widely used all over the world, particularly in Europe and Asia, and in the meantime facing serious security problems. To protect bus in the bank IC card against attacks, a novel bus security solution including two methods are proposed in this paper to protect AMBA (Advanced Microcontroller Bus Architecture), which is used for interconnection between the 32-bit CPU and memories...
This paper presents the design and implementation of a 433MHz low-power transmitter (LPT) using OOK modulation for Tire Pressure Monitor System (TPMS). The proposed direct modulation transmitter radiates −10dBm with 10mA power dissipation, which fulfill the requirement of the application. The transmitter has a direct PLL modulation architecture using an integral synthesizer and a power efficient power...
This paper presents a design of high precision voltage measurement IP core for aware battery management SoC which is the key chip of Battery Management System (BMS) in electric vehicles. To meet the battery voltage detection requirements of high precision, synchronization and speed, a voltage detecting circuit which collects voltage of each battery cell precisely and synchronously is presented. To...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.