期刊文献+

一种高可靠性微控制器的设计与VLSI实现 被引量:2

Design and VLSI Implementation of high-reliability MCU
下载PDF
导出
摘要 在对传统微控制器的攻击手段和防护措施介绍的基础上,提出了一种应用于安全控制领域的高可靠性微控制器的设计方法。该方法采用了新型程序下载方式,并使用硬件电路实现的分组密码对微控制器的执行程序进行了加密和解密;改进了传统微控制器内部架构,加入了总线控制器,实现了对微控制器工作过程中临时数据的安全存储;后端设计中,重要模块采用了双轨逻辑完成电路级设计。这款微控制器实现了可靠性较高的存储安全机制,并能够有效抵御物理攻击和旁路攻击。仿真结果验证了该微控制器功能正确,后端版图的完成可以进行流片及验证。 A high-reliability MCU (Micro Controller Unit) for security control is proposed, by the analysis of attack means and protective measure on traditional microcontroller. The architecture includes a new program loading method and uses DES (Data Encryption Standard) algorithm which is achieved by hardware circuit to encrypt and decrypt program. Improved traditional microcontroller internal structures, joined the bus controller, the design realizes temporary data security storage. Dual-rail logic circuit is used to design key mod- ule in backend design. This MCU establishes a high reliable storage security mechanism and can resist physical attacks and bypass attack effectively. The simulation results show that the function of the micro controller is right and the layout can be manufactured and verified.
出处 《计算机工程与应用》 CSCD 2012年第6期53-56,共4页 Computer Engineering and Applications
关键词 微控制器 存储安全机制 加解密算法 总线控制器 双轨逻辑 Micro Controller Unit (MCU) secure storage mechanism Data Encryption Standard (DES) bus controller dual-rail logic
  • 相关文献

参考文献7

二级参考文献38

  • 1Kocher P, Jaffe J, Jun B. Differential power analysis. Cryptographic hardware and embedded systems[C]. Proc. of CRYPTO'99. LNCS1666, 1999,388-397. 被引量:1
  • 2Messerges T S,Dabbish E A, Sloan R H. Investigations of power analysis attacks on smartcards [C]. Usenix Workshop on Smartcard Technology, Chicago, Illinois, USA, May, 1999, 151-162. 被引量:1
  • 3Mangard S, Pramstaller N, Oswald E. Successfully attacking masked AES hardware implementations [C]. Cryptographic Hardware and Embedded Systems, LNCS 3659, Springer-Verlag, 2005, 157-171. 被引量:1
  • 4Charvet X, Pelletier H. Improving the DPA attack using wavelet transform[C]. Physical Security Testing Workshop, Hawaii, USA, 2005, 1-15. 被引量:1
  • 5Shin J H, Park D J, Lee P J. A DPA attack on the improved hamoon algorithm[C]. Proc. Workshop on Information Security Applications 2005, LNCS3786, Springer-Verlag, 2006, 283- 29L 被引量:1
  • 6Ha J C, Moon S J. Randomized signed-scalar multiplication of ECC to resist power attacks[C]. Proc. Of Cryptographic Hardware and Embedded Systems (CHES 2002), LNCS 2523, Springer-Verlag, 2002,551-563. 被引量:1
  • 7Joye M, Paillier P, Schoenmakers B. On second-order differential power analysis[C]. Proc. of Cryptographic Hardware and Embedded Systems (CHES 2005), LNCS 3659, Springer-Verlag, 2005, 293-308. 被引量:1
  • 8Messerges T S. Using second-order power analysis to attack DPA resistant software[C]. Proc. of Cryptographic Hardware and Embedded Systems (CHES 2000), LNCS 1965, Springer- Verlag, 2000,27-28. 被引量:1
  • 9Akkar M L, Goubin L. A generic protection against high-order differential power analysis[C]. Proc. of Fast Software Encryption (FSE2003), LNCS 2887, Springer-Verlag, 2003, 192- 205. 被引量:1
  • 10Standaert F X, Peeters E, Quisquater J J. On the masking countermeasure and higher order power analysis attacks [C]. IEEE Conference on Information Technology: Coding and Computing, 2005,1 : 562-567. 被引量:1

共引文献10

同被引文献10

引证文献2

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部