Secure-IC provide Chip Security Protection IP Cores: Cryptographic algorithm IP such as AES, DES, 3-DES, ECC, RSA, SM2, SM3, SM4, SHA1, SHA2, SHA3, HMAC, countermeasure IP such as TRNG, CTR-DRBG RNG, Digital Sensor, Active Shield, PUF, Smart Monitor, Scrambled Bus, Memory Ciphering, Cyber CPU, Secure Clock, Secure Book, Secure Monitor, Secure JTAG, etc.
Digital Sensor Anti Fault Injection Attacks, All-in-one Fault Injection Detector, Entirely Digital.
Digital Sensor Anti Fault Injection Attacks, All-in-one Fault Injection Detector, Entirely Digital.
1. PROBLEM SOLVED
In cryptography, an attack can be performed by injecting one or several faults into a device thus disrupting the functional behavior of the device. Techniques commonly used to inject faults consist in introducing variations in the source voltage, clock frequency, temperature, or irradiating with a laser beam etc.
Unlike analog sensors which are dedicated to the detection of a specific perturbation attack, the Digital Sensor is designed to detect various threats belonging to the family of Fault Injection Attacks (FIA):
• Input clock frequency (clock glitches, Overclocking): reduction of the clock period to provoke a critical path violation.
• Input voltage (power glitches, underfeeding): reduction of supply voltage to increase the propagation delay of combinational logic.
• Temperature (heating): modification of the temperature to increase the propagation delay.
• Radiations (laser spot, light spot, Electromagnetic): provoke bit set or reset in registers by irradiation.
2. OVERVIEW
• Fully digital and based on the standard cells of library design kit
• Transferable to any design kit
• Lightweight
• Difficult to identify by an attacker (melted within the rest of design)
• Customizable sensitivity
• Compatible with clock gating feature
• Several sensors can be regrouped around a unique bus interface.
• Real-time hardware alarm
• No calibration after design
Digital Sensor converts all monitored stresses into a timing stress which is then measured. When a threat is detected, it provides the system with a measurement of the threat’s level and it raises the hardware alarm.
Secure-IC provide various security IP cores as following list (keep updating).
AES | Encryption, against Side-Channel Attacks |
DES / 3-DES | Encryption, against Side-Channel Attacks |
RSA | Encryption, against Side-Channel Attacks |
ECC | Encryption, against Side-Channel Attacks |
HASH (SHA-1/MD-5) | Encryption, against Side-Channel Attacks |
SM2 | Encryption, against Side-Channel Attacks |
SM3 | Encryption, against Side-Channel Attacks |
SM4 | Encryption, against Side-Channel Attacks |
TRNG | True Random Number Generator,Digital,against Harmonic EM Attacks |
PUF | Digital, Anti Cloning/Counterfeiting,100% Unique, Random and Steady ID Generation |
Digital Sensor | Anti Fault Injection Attacks, All-in-one Fault Injection Detector, Entirely Digital |
Active Shield | Active Protection against Intrusive Attacks on ASIC, Anti Intrusive Hardware Modification. |
Scrambled BUS | Encrypted Information to Prevent Probing on BUS, Anti Eavesdroping |
Memory Ciphering | Memory Protection Against Reverse Engineering and Tampering |
Secure Clock | Anti Synchronization to prevent efficient SCA and FIA |
Secure JTAG | Authentication System to Secure the debugging channel on chip, Anti JTAG Violation |
Secure Boot | Maximum security-enabling root-on-trust, Anti Firmware Tampering |
Secure Monitor | Maximum security-enabling monitoring, Security policy bypass |
CyberCPU CPU | CPU-agnostic Cyber Attack Sensor |
Current Products:Security IP: Digital Sensor