How to protect smart card encryption chip security

I. Introduction:

With the increasing hacking of domestic pirates, the interests of product developers have been seriously affected. It has become more and more important to protect the intellectual property of developers' products from the technical point of view.

The market has a large number of various types of encryption chips. Which encryption chips can play the role of encryption protection? There are several major types of encryption chips currently on the market:

The first is a logic encryption chip. This chip is generally composed of an EEPROM and a peripheral logic circuit. It is protected and authenticated by a simple ID number or logical authentication password. This kind of chip is characterized by its low cost and the simplest development, but it is cracked. The difficulty is the lowest. At present, Shenzhen Huaqiang North can basically solve this kind of chip and it can be easily achieved. The cost of cracking can range from 150 yuan to several hundred yuan. It is very simple. This kind of chip is generally used for no pressure on piracy, just to add a look of protection, or basically no profit products.

The second is a cryptographic chip with a fixed algorithm that uses the comparison authentication mode. This kind of chip is more complex than the above kind of chip, but because it uses the comparison mode, even if the line is transmitted with a random number or is encrypted The random authentication code, but it does not play a high degree of protection, because the program in the protected CPU is complete, there are only a few isolated matching points directly with the encryption chip, and when the pirates to crack this In the system, it will not crack the encryption chip, but directly crack the CPU to get all the code, and then skip all the matching points. This completes the crack. This kind of fixed algorithm is not too difficult to compare with the development of the encryption chip of the mode, as long as the authentication process is developed according to the specification, of course, pirates also like this kind of chip, because his encryption process pirates are also very familiar. The cost of cracking several domestic and foreign encryption chips sold in the market in the past few years has been very low, and the cracking methods have been well-known in the cracking circle.

The third encryption chip is the core of high-end (EAL5+) smart card chip that has emerged in recent years. Software and hardware developers can download a part of their own software and code to run on the chip. The user uses standard C language to write the operation code. In the actual operation of the software, the program segment in the smart chip is run by calling the function mode, and the operation result is obtained, and the result is used as the input data for the further operation of the user program. The encryption chip becomes part of the software product. The program in the encryption chip cannot be read or copied, fundamentally eliminating the possibility of the program being cracked. This kind of product is the most advanced now, regardless of the hardware foundation or the internal operating system scheme, and is the most difficult to crack.

Second, smart card encryption chip security

However, not all cryptographic chips based on smart card platforms are the most secure. The following most recent concerns about the market are currently the highest performance security in the field of cryptographic chips. Lenovo Core Technology (Beijing) Co., Ltd. 32-bit (EAL5 + 32-bit kernel 32-bit operating system) LKT4200 encryption chip to do an analysis of the security:

High-end security smart card chips are mainly used in banking and other fields: such as credit cards and bank cards. At present, European bank cards have been fully adopted smart cards, and China is already set to replace the current magnetic stripe cards with smart cards by 2015. A smart card type bank card has an electronic purse, an electronic bankbook, and can store cash offline. Therefore, the smart card has a very high or even highest security requirement. In addition, it also uses e-passports, ID cards, conditional access cards, etc. in the fields of government, public utilities, and cable television.

At present, people who may attack the smart card chip mainly come from three fields.

1, major professional testing, evaluation laboratory

This kind of person has very high professional knowledge, has very advanced and perfect analytical equipment, and masters the inside knowledge of various chips. For such people, the money and time conditions for cracking the smart card chip need to have: at least Put in at least 500,000 Euros for 3 months to more than half a year. Of course, these are the basis of investment. Whether or not the time has already been solved depends on the actual situation.

2. Organized criminal groups

Such organizations generally have large amounts of capital, relatively high technology, relatively good equipment, and relatively speaking, they are relatively professional. The money and time they can invest in are: at least 200,000 - 1 million euros, for a few months. More than a few years.

3. Amateur organizations and student research activities

This kind of person does not have very high technology, basically does not have any specialized analysis equipment, he has relatively good public knowledge (or can understand some company's product information), this kind of personnel cracks that is pure interest or in order to challenge what technology, The conditions for money and time they can invest are: can invest 1 - 5000 euros, months or N years, and that's only days to know.

Third, the common attack means for the LKT4200 encryption chip 1, intrusive attack

Kaifeng etching microscope reverse engineering mechanical detection of focused ion beam 2, semi-invasive attack

- Single Failure Attack (SFI)

- Static/Differential Failure Analysis (SFA/DFA)

Outside the normal operating range - reset - clock - supply voltage - temperature - light perturbation attack - light flash - interference attack - electric and magnetic field induction - radiation attack 3, local non-intrusive attack

- Simple power analysis - timing and waveform attacks - power traces on contact pads (VCC, RST, I/O)

- Power supply due to traces of electromagnetic radiation - Differential power analysis - Multiple measurements - Code reverse engineering - Attack keys
Fourth, LKT4200 encryption chip protection measures 1, hardware protection measures

- Sensor (voltage, clock, temperature, light)

- Filter (prevents spikes/burrs)

- Separate internal clock (reader CLK)

- (SFI) Detection Mechanism - Passive and Active Shields - Glue Logic (Difficult to Reverse Engineer Circuits)

- Handshake circuit - High-density multi-layer technology - With a metal shield protection layer, self-destruction of internal data after detection of external attacks - Bus and memory encryption - Virtual address (SW = Hardware address address!)

- Chip tamper-proof design, unique serial number - hardware error detection - true random number generator (RNG)

- Generation of noise (attack to side channel)

- Pre-silicon power analysis 2, software - operating system protection

- Internal data cannot be read, copy-sensitive information is encrypted (key, pin)

- Double execution (such as encryption and decryption verification)

- Verification - Verification of program flow - unpredictable timing (eg random NOP)

- Cannot directly access the hardware platform, HAL (assembler), C

- Prevent buffer overflow - prevent incorrect offsets. .

- Firewall Mechanism - Exception Counter - Executing CAPTCHA - Zeroing Keys and Pins Since the LKT4200 crypto chip has the high security of EAL5+, it can protect 3-40 attack measures, which cannot be mentioned here due to limited space. It can be seen that, at present, LKT4200 is in the leading position in both the hardware platform and the internal operating system in the field of anti-piracy encryption chips.

9'' ATV Tyre

Atv Tires 20x10-9,Atv Tire Wholesale 9 Inch, Atv Tires

Qingdao Friend New Energy Development CO.,LTD , http://www.friendtyres.com